欢迎访问ic37.com |
会员登录 免费注册
发布采购

3DES-EV 参数 Datasheet PDF下载

3DES-EV图片预览
型号: 3DES-EV
PDF下载: 下载PDF文件 查看货源
内容描述: [Core3DES]
分类和应用:
文件页数/大小: 13 页 / 148 K
品牌: ACTEL [ Actel Corporation ]
 浏览型号3DES-EV的Datasheet PDF文件第1页浏览型号3DES-EV的Datasheet PDF文件第3页浏览型号3DES-EV的Datasheet PDF文件第4页浏览型号3DES-EV的Datasheet PDF文件第5页浏览型号3DES-EV的Datasheet PDF文件第6页浏览型号3DES-EV的Datasheet PDF文件第7页浏览型号3DES-EV的Datasheet PDF文件第8页浏览型号3DES-EV的Datasheet PDF文件第9页  
Core3DES
Contents
General Description
The Core3DES macro implements the Triple Data
Encryption Standard (3DES or Triple DES), which provides
a means of securing data. The Triple DES algorithm is
described in the
and is an
extension of the DES (Data Encryption Standard)
algorithm (Figure
1)
and also described in
The Triple DES algorithm takes as inputs 64 bits of
plaintext data and 192 bits of a cipher key, and after 48
cycles, produces a 64-bit ciphered version of the original
plaintext data as output.
1
The entire 168-bit cipher key
consists of three sub-keys, denoted as K1, K2, and K3,
representing the left third (MSB), the middle third, and
the right third (LSB) of the cipher key, respectively. During
the 48 cycles, or iterations, of the algorithm, the data bits
are subjected to permutation and addition functions,
which consist of key schedules, calculated by rotations and
permutations applied to the original 168-bit cipher key.
L0
R0
Left and Right
Data Halves after
Initial Permutation
K1
Key Schedule 1
+
f
Key
Input
Initial
Permutation
L1 = R0
R1 = L0
f(R0,K1)
K2
Left and Right
Data Halves after
Round 1
Key Schedule 2
16 Rounds
of Computation
+
Inverse Initial
Permutation
Output
L2 = R1
R2 = L1
f(R1,K2)
f
Left and Right
Data Halves
after Round 2
R16 = L15
f(R15,K16)
L16 = R15
Left and Right
Data Halves
after Round 16
Figure 1 •
DES Algorithm
1. Only 168 of the 192 bits of the key are used in the calculations, as the least significant bit of each byte of the cipher key is
used to provide odd parity for the key bytes.
2
v5.0