{"id":674,"date":"2021-07-23T11:48:53","date_gmt":"2021-07-23T03:48:53","guid":{"rendered":"https:\/\/choson.lifenet.com.tw\/?p=674"},"modified":"2023-03-29T16:25:02","modified_gmt":"2023-03-29T08:25:02","slug":"aes%ef%bc%88%e9%ab%98%e7%b4%9a%e5%8a%a0%e5%af%86%e6%a8%99%e6%ba%96%ef%bc%89","status":"publish","type":"post","link":"https:\/\/choson.lifenet.com.tw\/?p=674","title":{"rendered":"AES\uff08\u9ad8\u7d1a\u52a0\u5bc6\u6a19\u6e96\uff09"},"content":{"rendered":"\n<p><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210723\/20132160tqxQvsYwr2.jpg\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210723\/20132160tqxQvsYwr2.jpg\"><br>-\u5bc6\u78bc\u5b78<br>\u9019\u5169\u7a2e<a href=\"https:\/\/en.wikipedia.org\/wiki\/Data_Encryption_Standard\" target=\"_blank\" rel=\"noreferrer noopener\">DES\uff08\u6578\u64da\u52a0\u5bc6\u6a19\u6e96\uff09<\/a>\u548c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" target=\"_blank\" rel=\"noreferrer noopener\">AES\uff08\u9ad8\u7d1a\u52a0\u5bc6\u6a19\u6e96\uff09<\/a>\u662f\u7f8e\u570b\u7684\u52a0\u5bc6\u6a19\u6e96\u3002\u50b3\u7d71 DES \u4f7f\u7528 IBM \u958b\u767c\u7684 Lucifer\uff0c\u800c\u7576\u524d\u6a19\u6e96 AES \u901a\u904e\u958b\u653e\u9078\u64c7\u6307\u5b9a Rijndael\u3002\u901a\u5e38\u5c07 DES \u548c AES \u7a31\u70ba\u5bc6\u78bc\u672c\u8eab\u3002\u4f8b\u5982\uff0cAES \u548c Rijndael \u7684\u4e0d\u540c\u4e4b\u8655\u5728\u65bc\uff0c\u201cRijndael \u672c\u8eab\u6307\u5b9a\u7684\u584a\u548c\u5bc6\u9470\u5927\u5c0f\u53ef\u4ee5\u662f 32 \u4f4d\u7684\u4efb\u610f\u500d\u6578\uff0c\u6700\u5c0f\u70ba 128 \u4f4d\uff0c\u6700\u5927\u70ba 256 \u4f4d\u3002\u201d \u4f46\u662f\uff0cAES \u6307\u5b9a\u4e86 128 \u4f4d\u7684\u201c\u56fa\u5b9a\u584a\u5927\u5c0f\u201d\uff0c\u4f46\u5bc6\u9470\u5927\u5c0f\u6709 128\u3001192 \u6216 256 \u4f4d\u4e09\u7a2e\u9078\u64c7\u3002\uff08<a href=\"https:\/\/en.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" target=\"_blank\" rel=\"noreferrer noopener\">\u7dad\u57fa\u767e\u79d1<\/a>\uff09<\/p>\n\n\n\n<p>DES \u548c AES \u662f<a href=\"https:\/\/en.wikipedia.org\/wiki\/Block_cipher\" target=\"_blank\" rel=\"noreferrer noopener\">\u5206\u7d44\u5bc6\u78bc<\/a>\u3002\u584a\u662f\u4e00\u7d44\u4f4d\u3002\u584a\u662f\u584a\u5bc6\u78bc\u7684\u57fa\u672c\u8655\u7406\u55ae\u5143\u3002DES \u5c07\u6578\u64da\u5206\u6210 64 \u4f4d\u584a\uff0c\u800c AES \u4ee5 128 \u4f4d\u584a\u8655\u7406\u6578\u64da\u3002\u4f46\u662f\uff0c\u5bc6\u9470\u53ef\u80fd\u4e0d\u7b49\u65bc\u6578\u64da\u584a\u3002DES \u5bc6\u9470\u5927\u5c0f\u540d\u7fa9\u4e0a\u662f 64 \u4f4d\uff088 \u5b57\u7bc0\uff09\uff0c\u4f46\u4e00\u500b\u5b57\u7bc0\u7684\u6bcf\u4e00\u4f4d\u90fd\u662f\u6240\u8b02\u7684\u7528\u65bc\u932f\u8aa4\u63a7\u5236\u7684\u5947\u5076\u6821\u9a57\u4f4d\u3002\u56e0\u6b64\uff0c\u6709\u6548\u5bc6\u9470\u9577\u5ea6\u70ba 56 \u4f4d\uff0864-8=56\uff09\u3002DES \u584a\u5927\u5c0f\u6bd4\u5176\u5f8c\u7e7c AES \u5c0f\u5f97\u591a\uff0cAES \u4f7f\u7528 128 \u4f4d\u584a\u3002<\/p>\n\n\n\n<p>\u56e0\u70ba\u5206\u7d44\u5bc6\u78bc\u4f7f\u7528\u56fa\u5b9a\u5927\u5c0f\u7684\u584a\uff0c\u660e\u6587\u4e0d\u80fd\u7e3d\u662f\u5206\u6210\u6574\u500b\u584a\u6216\u584a\u5927\u5c0f\u7684\u500d\u6578\u3002\u201c&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Padding_(cryptography)\" target=\"_blank\" rel=\"noreferrer noopener\">Padding<\/a>&nbsp;\u201d\u662f\u5c07\u6578\u64da\u52a0\u5165\u660e\u6587\u4e2d\u4ee5\u4fbf\u5c07\u5176\u5283\u5206\u70ba\u5b8c\u6574\u584a\u7684\u904e\u7a0b\u3002\u4f4d\u7f6e\uff08\u958b\u59cb\u3001\u4e2d\u9593\u6216\u7d50\u675f\uff09\u3001\u55ae\u4f4d\uff08\u4f4d\u6216\u5b57\u7bc0\uff09\u548c\u6a21\u5f0f\uff08\u5168\u70ba\u96f6\u6216\u5168\u70ba 1\uff09\u662f\u586b\u5145\u554f\u984c\u3002ANSI X9.23\u3001PKCS#5\u3001PKCS#7\u3001ISO\/IEC 7816-4 \u7b49\u662f\u8655\u7406\u586b\u5145\u6578\u64da\u6a21\u5f0f\u7684\u6a19\u6e96\u3002<br>ECB \u6a21\u5f0f\u4e2d\u7684 AES \u53ef\u80fd\u4e0d\u6d89\u53ca<a href=\"https:\/\/en.wikipedia.org\/wiki\/Initialization_vector\" target=\"_blank\" rel=\"noreferrer noopener\">\u521d\u59cb\u5316\u5411\u91cf<\/a>&nbsp;(IV)\u3002\u5206\u7d44\u5bc6\u78bc\u53ef\u4ee5\u5728\u5404\u7a2e\u64cd\u4f5c\u6a21\u5f0f\u4e0b\u5de5\u4f5c\u3002\u6700\u8457\u540d\u7684\u96fb\u5b50\u4ee3\u78bc\u7c3f (ECB) \u4e0d\u6d89\u53ca\u555f\u52d5\u5411\u91cf\uff0c\u4f46\u53ef\u80fd\u6703\u751f\u6210\u91cd\u8907\u7684\u6a21\u5f0f\u3002<\/p>\n\n\n\n<p>DES \u65bc 1970 \u5e74\u4ee3\u521d\u7531 IBM \u958b\u767c\uff0c\u57fa\u65bc Horst Feistel \u7684\u65e9\u671f\u8a2d\u8a08\u3002\u5b83\u65bc 1976 \u5e74\u88ab\u6279\u51c6\u70ba\u7f8e\u570b\u52a0\u5bc6\u6a19\u6e96\u3002\u4e09\u91cd<a href=\"https:\/\/en.wikipedia.org\/wiki\/Triple_DES\" target=\"_blank\" rel=\"noreferrer noopener\">&nbsp;DES<\/a>&nbsp;(3DES\/TDES) \u662f DES \u5728 1990 \u5e74\u4ee3\u88ab\u7834\u58de\u5f8c\u7684\u4e00\u7a2e\u89e3\u6c7a\u65b9\u6cd5\u30023DES \u4f7f\u7528\u76f8\u540c\u7684 DES \u7b97\u6cd5\u4e09\u6b21\u4ee5\u589e\u52a0\u5de5\u4f5c\u56e0\u5b50\u30023DES \u9700\u8981\u4e09\u500b\u5bc6\u9470\uff08\u6bcf\u500b DES \u64cd\u4f5c\u4e00\u500b\uff09\uff1b\u4f46\u662f\uff0c\u7b2c\u4e00\u6b21\u4f7f\u7528\u7684\u5bc6\u9470\u53ef\u4ee5\u5728\u7b2c\u4e09\u6b21\u8655\u7406\u6642\u4f7f\u7528\u3002\u540d\u7fa9\u4e0a\uff0c3DES \u4f7f\u7528\u4e09\u500b\u5bc6\u9470\uff0c\u4f46\u5be6\u969b\u4e0a\u5b83\u53ef\u4ee5\u4f7f\u7528\u5169\u500b\u5bc6\u9470\uff08\u7b2c\u4e00\u6b21\u548c\u7b2c\u4e09\u6b21\u4f7f\u7528\u76f8\u540c\u7684\u5bc6\u9470\uff09\u3002DES3-EEE \u610f\u5473\u8457\u4f7f\u7528\u4e09\u500b\u4e0d\u540c\u7684\u5bc6\u9470\u61c9\u7528 DES \u52a0\u5bc6\u4e09\u6b21\u3002<\/p>\n\n\n\n<p>\u53c3\u8003<br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Block_cipher\" target=\"_blank\" rel=\"noreferrer noopener\">\u5206\u7d44\u5bc6\u78bc<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" target=\"_blank\" rel=\"noreferrer noopener\">\u9ad8\u7d1a\u52a0\u5bc6\u6a19\u6e96<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Data_Encryption_Standard\" target=\"_blank\" rel=\"noreferrer noopener\">\u6578\u64da\u52a0\u5bc6\u6a19\u6e96<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Triple_DES\" target=\"_blank\" rel=\"noreferrer noopener\">\u4e09\u91cdDES<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Parity_bit\" target=\"_blank\" rel=\"noreferrer noopener\">\u5947\u5076\u6821\u9a57\u4f4d\uff08\u7dad\u57fa\u767e\u79d1\uff09<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Padding_(cryptography)\" target=\"_blank\" rel=\"noreferrer noopener\">\u586b\u5145\uff08\u5bc6\u78bc\u5b78\uff09<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Initialization_vector\" target=\"_blank\" rel=\"noreferrer noopener\">\u521d\u59cb\u5316\u5411\u91cf<\/a><br>.&nbsp;<a href=\"https:\/\/www.google.com\/search?q=initiation+vector+block+size+and+key+size&amp;sxsrf=ALeKk022ddN8nEUY3K_FT9dds7sM_3SPDw%3A1624966000269&amp;ei=cAPbYJj2D7iEr7wP7qi_4Ag&amp;oq=initiation+vector+block+size+and+key+size&amp;gs_lcp=Cgdnd3Mtd2l6EAM6BAgjECc6BwghEAoQoAFKBAhBGAFQuApY1xFghhNoAXAAeACAAXGIAaIDkgEDNS4xmAEAoAEBqgEHZ3dzLXdpesABAQ&amp;sclient=gws-wiz&amp;ved=0ahUKEwiY7t6J3rzxAhU4wosBHW7UD4wQ4dUDCA4&amp;uact=5\" target=\"_blank\" rel=\"noreferrer noopener\">java\u4e2dAES-256\u52a0\u5bc6\u9700\u8981\u591a\u5927\u7684\u521d\u59cb\u5316\u5411\u91cf\uff1f<\/a><br>.&nbsp;<a href=\"https:\/\/crypto.stackexchange.com\/questions\/32692\/what-is-the-typical-block-size-in-rsa\" target=\"_blank\" rel=\"noreferrer noopener\">RSA \u4e2d\u7684\u5178\u578b\u584a\u5927\u5c0f\u662f\u591a\u5c11\uff1f<\/a><\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/wentzwu.com\/2021\/06\/29\/cissp-practice-questions-20210629\/\" target=\"_blank\">Wentz Wu QOTD-20210629<\/a><\/p>\n\n\n\n<p>PS:\u6b64\u6587\u7ae0\u7d93\u904e\u4f5c\u8005\u540c\u610f\u520a\u767b \u4e26\u4e14\u6388\u6b0a\u53ef\u4ee5\u7ffb\u8b6f\u6210\u4e2d\u6587<\/p>\n","protected":false},"excerpt":{"rendered":"<p>-\u5bc6\u78bc\u5b78\u9019\u5169\u7a2eDES\uff08\u6578\u64da\u52a0\u5bc6\u6a19\u6e96\uff09\u548cAES\uff08\u9ad8\u7d1a\u52a0\u5bc6\u6a19\u6e96\uff09\u662f\u7f8e\u570b\u7684\u52a0\u5bc6\u6a19\u6e96\u3002\u50b3\u7d71 DES \u4f7f\u7528 IBM \u958b\u767c [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-674","post","type-post","status-publish","format-standard","hentry","category-cisspcertified-information-systems-security-professional"],"_links":{"self":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=674"}],"version-history":[{"count":2,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/674\/revisions"}],"predecessor-version":[{"id":2835,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/674\/revisions\/2835"}],"wp:attachment":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}