Lines Matching +full:ascii +full:. +full:d

1 .\" Copyright (c) 1991, 1993
2 .\" The Regents of the University of California. All rights reserved.
3 .\"
4 .\" This code is derived from software contributed to Berkeley by
5 .\" Matt Bishop of Dartmouth College.
6 .\"
7 .\" Redistribution and use in source and binary forms, with or without
8 .\" modification, are permitted provided that the following conditions
9 .\" are met:
10 .\" 1. Redistributions of source code must retain the above copyright
11 .\" notice, this list of conditions and the following disclaimer.
12 .\" 2. Redistributions in binary form must reproduce the above copyright
13 .\" notice, this list of conditions and the following disclaimer in the
14 .\" documentation and/or other materials provided with the distribution.
15 .\" 3. Neither the name of the University nor the names of its contributors
16 .\" may be used to endorse or promote products derived from this software
17 .\" without specific prior written permission.
18 .\"
19 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 .\" SUCH DAMAGE.
30 .\"
31 .\" @(#)bdes.1 8.1 (Berkeley) 6/29/93
32 .\" $FreeBSD: src/secure/usr.bin/bdes/bdes.1,v 1.7 2003/06/02 19:10:59 markm Exp $
33 .\"
55 .%T "FIPS PUB 81" ,
57 modes.
61 and writes to the standard output.
64 using cipher block chaining (CBC) mode.
67 preserves plain text.
72 the zero vector is used.
78 for more details).
85 .Tn ASCII ,
92 characters.
95 the key and initialization vector.
97 Use ECB mode.
98 .It Fl d
99 Decrypt the input.
103 alternative CFB mode.
108 (this does not conform to the alternative CFB mode specification).
112 CFB mode.
116 to the standard CFB mode specification).
120 as the cryptographic key.
124 bits on the input.
132 to the nearest multiple of 8.
133 Only the MAC is output.
136 or in CFB mode.
140 output feedback (OFB) mode.
144 to the OFB mode specification).
146 Disable the resetting of the parity bit.
151 each character be of odd parity.
153 .Tn ASCII .
157 the vector is interpreted in the same way as the key.
158 The vector is ignored in ECB mode.
163 .Tn ASCII
165 into their bit representations.
179 indicating the bit pattern.
186 to pad the key to 64 bits.
192 in the key string is deleted.
194 .Tn ASCII
199 from 2^56 to 2^48 keys.
205 to whatever value gives odd parity.
206 This preserves the key space size.
212 .Tn ASCII
213 keys as well.
225 are known in the open literature.
229 .Nm .
233 the following notes are provided.
237 distributed by Sun Microsystems, Inc.
241 (8 bytes, also called a block).
249 and encrypt the resulting block.
254 and the last byte tells how many.
259 or an incorrect key has been given.
267 of bytes being used as the mode.
270 a multiple of 8 for those modes.)
277 in the preceding block.
279 and does not weaken the encryption significantly.
282 .Tn ASCII ,
285 is of odd parity.
292 reset.
294 using arbitrary bit patterns as keys.
298 (that is, all zeroes).
303 from the command line.
307 .%T "Data Encryption Standard"
308 .%R "Federal Information Processing Standard #46"
309 .%Q "National Bureau of Standards, U.S. Department of Commerce, Washington DC"
310 .%D "January 1977"
313 .%T "DES Modes of Operation"
314 .%R "Federal Information Processing Standard #81"
315 .%Q "National Bureau of Standards, U.S. Department of Commerce, Washington DC"
316 .%D "December 1980"
319 .%A "Dorothy Denning"
320 .%B "Cryptography and Data Security"
321 .%Q "Addison-Wesley Publishing Co., Reading, MA"
322 .%D 1982
325 .%A "Matt Bishop"
326 .%T "Implementation Notes on bdes(1)"
327 .%R "Technical Report PCS-TR-91-158"
328 .%Q "Department of Mathematics and Computer Science, Dartmouth College, Hanover, NH 03755"
329 .%D "April 1991"
336 ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
343 SUCH DAMAGE.
349 in a few years.
354 computationally infeasible.
359 compromised if memory is readable.
363 if they are specified on the command line.
369 cannot currently be avoided.
404 .%A Moore
405 .%A Simmons
406 .%T "Cycle structure of the DES with weak and semi-weak keys"
407 .%B "Advances in Cryptology \- Crypto '86 Proceedings"
408 .%Q "Springer-Verlag New York"
409 .%D 1987
410 .%P "pp. 9-32"