文件名称:DES
-
所属分类:
- 标签属性:
- 上传时间:2012-11-16
-
文件大小:196.38kb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
The Data Encryption Standard (DES) shall consist of the following Data Encryption Algorithm
(DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices
shall be designed in such a way that they may be used in a computer system or network to provide
cryptographic protection to binary coded data. The method of implementation will depend on the
application and environment. The devices shall be implemented in such a way that they may be
tested and validated as accurately performing the transformations specified in the following
algorithm s . -The Data Encryption Standard (DES) shall consist of the following Data Encryption Algorithm
(DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices
shall be designed in such a way that they may be used in a computer system or network to provide
cryptographic protection to binary coded data. The method of implementation will depend on the
application and environment. The devices shall be implemented in such a way that they may be
tested and validated as accurately performing the transformations specified in the following
algorithm s .
(DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices
shall be designed in such a way that they may be used in a computer system or network to provide
cryptographic protection to binary coded data. The method of implementation will depend on the
application and environment. The devices shall be implemented in such a way that they may be
tested and validated as accurately performing the transformations specified in the following
algorithm s . -The Data Encryption Standard (DES) shall consist of the following Data Encryption Algorithm
(DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices
shall be designed in such a way that they may be used in a computer system or network to provide
cryptographic protection to binary coded data. The method of implementation will depend on the
application and environment. The devices shall be implemented in such a way that they may be
tested and validated as accurately performing the transformations specified in the following
algorithm s .
(系统自动生成,下载前可以参看下载内容)
下载文件列表
DES/
DES/fips46-3.pdf
DES/fips46-3.pdf
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.