From owner-man-jp@jp.freebsd.org  Sun Jul 25 04:21:22 1999
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id EAA94899;
	Sun, 25 Jul 1999 04:21:22 +0900 (JST)
	(envelope-from owner-man-jp@jp.FreeBSD.org)
Received: from rr.iij4u.or.jp (h066.p060.iij4u.or.jp [210.130.60.66])
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with SMTP id EAA94894
	for <man-jp@jp.freebsd.org>; Sun, 25 Jul 1999 04:21:20 +0900 (JST)
	(envelope-from sada@rr.iij4u.or.jp)
Received: (qmail 9462 invoked by uid 1000); 25 Jul 1999 04:21:18 +0900
Date: 25 Jul 1999 04:21:18 +0900
Message-ID: <19990724192118.9461.sada@rr.iij4u.or.jp>
To: man-jp@jp.freebsd.org
Cc: sada@rr.IIJ4U.OR.JP
From: sada@rr.IIJ4U.OR.JP (SADA Kenji)
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-2022-JP
X-Mailer: mnews [version 1.21] 1997-12/23(Tue)
Reply-To: man-jp@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+990625
X-Sequence: man-jp 1592
Subject: [man-jp 1592] bdes(1)
Errors-To: owner-man-jp@jp.freebsd.org
Sender: owner-man-jp@jp.freebsd.org
X-Originator: sada@rr.IIJ4U.OR.JP

$B:4ED$G$9!#(B
$BI,MW$,$"$C$?$N$GLu$7$^$7$?!#(B
man-jp $B$N:n6H7ABV$K$D$$$F=OCN$7$F$$$J$$$N$G!"(B
$BIT<j:]$,$"$j$^$7$?$i$4MF<O$/$@$5$$!#(B

# $B:#(B section 1 $B$OMW$i$J$$$H$+!#(B

initialization vector $B$N%Q%j%F%#4X78$N$"$?$j$,!"(B
$BFC$K<+?.$,$"$j$^$;$s!#(B

--
.\" Copyright (c) 1991, 1993
.\"	The Regents of the University of California.  All rights reserved.
.\"
.\" This code is derived from software contributed to Berkeley by
.\" Matt Bishop of Dartmouth College.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\"    notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\"    notice, this list of conditions and the following disclaimer in the
.\"    documentation and/or other materials provided with the distribution.
.\" 3. All advertising materials mentioning features or use of this software
.\"    must display the following acknowledgement:
.\"	This product includes software developed by the University of
.\"	California, Berkeley and its contributors.
.\" 4. Neither the name of the University nor the names of its contributors
.\"    may be used to endorse or promote products derived from this software
.\"    without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\"	@(#)bdes.1	8.1 (Berkeley) 6/29/93
.\"
.TH BDES 1 "June 29, 1993"
.UC 6
.SH NAME
bdes \- Data Encryption Standard $B$K$h$C$F0E9f2=(B / $BI|9f2=$7$^$9(B
.SH SYNOPSIS
.nf
.ft B
bdes [ \-abdp ] [ \-F N ] [ \-f N ] [ \-k key ]
.ti +5
[ \-m N ] [ \-o N ] [ \-v vector ]
.ft R
.fi
.SH DESCRIPTION
.I Bdes
$B$O(B FIPS PUB 81 $B$G5,Dj$5$l$k$9$Y$F$N(B DES $B%b!<%I=hM}$N<BAu$G!"(B
$B?7$7$$(B cipher feedback mode $B$HN>J}$NG'>Z%b!<%I$r4^$_$^$9!#(B
.I Bdes
$B$OI8=`F~NO$rFI$s$GI8=`=PNO$X=q$-=P$7$^$9!#(B
$B%*%W%7%g%s$r;XDj$7$J$1$l$P!"(B
$BF~NO$O(B cipher block chaining mode $B$G0E9f2=$5$l$^$9!#(B
$B0E9f2=$HI|9f2=$KF10l$N80$r;H$&$3$H$GJ?J8$rI|85$7$^$9!#(B
.PP
electronic code book mode $B0J30$N$9$Y$F$N%b!<%I$O(B
initialization vector $B$rI,MW$H$7!"(B
$B;XDj$5$l$J$$>l9g$O(B zero  vector $B$,;H$o$l$^$9!#(B
$B%3%^%s%I%i%$%s$K(B
.I $B80(B
$B$r;XDj$7$J$$>l9g$O!"BPOCE*$KF~NO$r5a$a$^$9!#(B
($B>\$7$/$O(B
.IR getpass(3)
$B$r;2>H(B)
.PP
$B%*%W%7%g%s$O0J2<$NDL$j$G$9(B:
.TP
\-a
$B80$H(B initialization vector strings $B$,(B ASCII $BJ8;zNs$H$7$F07$o$l!"(B
``0X'', ``0x'', ``0B'', $B$*$h$S(B ``0b'' $B$G$O$8$^$kJ8;zNs$NFCJL$NJQ49$O$5$l$^$;$s!#(B
$B80$H(B initialization vector $B$N(B
.I $BN>J}(B
$B$K:nMQ$7$^$9!#(B
.TP
\-b
electronic code book mode $B$GF0:n$7$^$9!#(B
.TP
\-d
$BF~NO$rI|9f2=$7$^$9!#(B
.TP
\-F
.IR N $B%S%C%H(B
$B$N(B alternative cipher feedback mode $B$GF0:n$7$^$9!#(B
$B8=>u$G$O(B
.I N
$B$O(B 7 $B0J>e(B 56 $B0J2<$N(B 7 $B$NG\?t$G$J$/$F$O$J$j$^$;$s!#(B
($B?7$7$$(B CFB mode $B<+BN$N;EMM$K$O$3$N@)8B$O$"$j$^$;$s(B)
.TP
\-f
.IR N $B%S%C%H(B
$B$N(B cipher feedback mode $B$GF0:n$7$^$9!#(B
$B8=>u$G$O(B
.I N
$B$O(B 8 $B0J>e(B 64 $B0J2<$N(B 8 $B$NG\?t$G$J$/$F$O$J$j$^$;$s!#(B
(standard CFB mode $B<+BN$N;EMM$K$O$3$N@)8B$O$"$j$^$;$s(B)
.TP
\-k
.I key
$B$r0E9f2=J}<0$N80$H$7$^$9!#(B
.TP
\-m
$BF~NO$r(B
.I N
$B%S%C%H$N(B message authentication code (MAC) $B$G=hM}$7$^$9!#(B
.I N
$B$O(B 1 $B0J>e(B 64 $B0J2<$G$J$/$F$O$J$j$^$;$s(B;
.I N
$B$,(B 8 $B$NG\?t$G$J$$$H$-!"(B
MAC $B$N%S%C%HD9$,(B 8 $B$NG\?t$K$J$k$^$G(B 0 $B$N%S%C%H$,IU$12C$($i$l$^$9!#(B
$B=PNO$OI,$:(B MAC $B$K$J$j$^$9!#(B
MAC $B$O(B cipher block chaining mode $B$"$k$$$O(B cipher feedback mode $B$G$N$_(B
$BM-8z$G$9!#(B
.TP
\-o
.IR N $B%S%C%H(B
$B$N(B output feedback mode $B$GF0:n$7$^$9!#(B
$B8=>u$G$O(B
.I N
$B$O(B 8 $B0J>e(B 64 $B0J2<$N(B 8 $B$NG\?t$G$J$/$F$O$J$j$^$;$s!#(B
(OFB mode $B<+BN$N;EMM$K$O$3$N@)8B$O$"$j$^$;$s(B)
.TP
\-p
parity bit $B$N%j%;%C%H$r$7$^$;$s!#(B
$B$3$N%U%i%0$K$h$j80$N(B parity bit $B$OF~NO$5$l$?DL$j$K2r<a$5$l!"(B
$B$=$l$>$l$NJ8;z$r4q?t%Q%j%F%#$KD>$9$3$H$O$7$^$;$s!#(B
$B80$,(B ASCII $BJ8;zNs$N>l9g$K$N$_;HMQ$5$l$^$9!#(B
.TP
\-v
initialization vector $B$H$7$F(B
.IR vector
$B$r;HMQ$7$^$9!#(B
vector $B$O80$HF1$8J}<0$G2r<a$5$l$^$9!#(B
vector $B$O(B electronic codebook mode $B$G$OL58z$G$9!#(B
.PP
$B80$H(B initialization vector $B$O(B ASCII $BJ8;zNs$H$7$FM?$($i$l!"(B
$B$=$N$^$^$N%S%C%HJB$S$H$7$F07$o$l$^$9!#(B
``0X'' $B$"$k$$$O(B ``0x'' $B$G$O$8$^$C$F$$$k>l9g!"(B16 $B?J?tCM$H$7$F07$o$l$^$9!#(B
``0B'' $B$"$k$$$O(B ``0b'' $B$G$O$8$^$C$F$$$k>l9g$O!"(B2 $B?J?tCM$H$7$F07$o$l$^$9!#(B
$B$I$A$i$N>l9g$G$b!"(B
$B:G=i$N(B 64 $B%S%C%H$^$G$,80$"$k$$$O(B initialization  vector $B$H$7$F;H$o$l!"(B
64 $B%S%C%H$KK~$?$J$$>l9g$O(B 64 $B%S%C%H$K$J$k$^$G(B 0 $B$N%S%C%H$,DI2C$5$l$^$9!#(B
.PP
DES $BI8=`$K=>$$!"80J8;zNs$N3FJ8;z$N:G2<0L%S%C%H$O:o$i$l$^$9!#(B
$B$[$H$s$I$N(B ASCII $BJ8;z$N:G>e0L%S%C%H$O(B 0 $B$J$N$G!"(B
$BC1=c$K2<0L%S%C%H$r:o$k$H!"(B
$BM-8z$J806u4V$NBg$-$5$O(B 2\u\s-356\s0\d $B8D$+$i(B 2\u\s-348\s0\d $B8D$^$G=L>.$7$^$9!#(B
$B$3$l$rKI$0$?$a!"(B
$B:G>e0L%S%C%H$O:G2<0L%S%C%H$K0MB8$9$k4X?t$G$J$/$F$O$J$i$:!"(B
$B:G>e0L%S%C%H$O4q?t%Q%j%F%#$rK~$?$9$J$s$i$+$NCM$G$J$/$F$O$J$j$^$;$s!#(B
$B$3$l$G806u4V$,J];}$5$l$^$9!#(B
$B$3$N%Q%j%F%#%S%C%H$N%j%;%C%H$O80$,Fs?J?t$"$k$$$O==O;?J?t$G(B
$BM?$($i$l$?>l9g$K$O(B
.I $B9T$J$o$l$J$$(B
$B$3$H$K2C$($F!"(B
ASCII $B$N80$G$"$C$F$b6X;_$G$-$k$3$H$KCm0U$7$F$/$@$5$$!#(B
.PP
DES $B$OHs>o$K6/8G$J0E9fK!$H$5$l$F$*$j!"(B
table lookup attacks, key search attacks, $B$*$h$S(B Hellman's time-memory tradeoff
($B$3$l$i$O$9$Y$F$?$$$X$s$J<j4V$H;~4V$rMW$7$^$9(B) $B$r=|$1$P!"(B
$B8x$NJ88%$K4X$9$k8B$j(B DES $B$rFMGK$9$k2r@OK!$OCN$i$l$F$$$^$;$s!#(B
$B80$NA*Br$H80$=$N$b$N$NJ]0B$,(B
.IR bdes
$B$N?.Mj@-$r7hDj$9$k$b$N$H?.$8$F4V0c$$$"$j$^$;$s!#(B
.SH IMPLEMENTATION NOTES
$B$3$N%W%m%0%i%`$H8_49@-$N$"$k%=%U%H%&%'%"$r<BAu$7$?$$?M$O!"(B
$B0J2<$NE@$KCm0U$7$F$/$@$5$$!#(B
$B$3$N%=%U%H%&%'%"$O(B Sun Microsystems $B$,8x3+$7$F$$$k(B
data encryption standard $B$N<BAu$H8_49$G$"$k$b$N$H$5$l$F$$$^$9!#(B
.PP
ECB $B$*$h$S(B CBC $B%b!<%I$G$O!"(B
$BJ?J8$,(B 64 bit (8 $B%P%$%H(B = 1 $B%V%m%C%/(B) $BC10L$G0E9f2=$5$l$^$9!#(B
$BJ?J8$N%U%!%$%k$,@5$7$/0E9f2=$5$l$k$3$H$rJ]>Z$9$k$?$a$K!"(B
.I bdes
$B$O(B ($BFbItF0:n$H$7$F(B) 1 $B$J$$$7(B 8 $B%P%$%H$rDI2C$7!"(B
$B$=$NFb$N:G8e$N%P%$%H$O:G8e$N%V%m%C%/$,J?J8$N%U%!%$%k$+$i$NF~NO$H$7$F(B
$B2?%P%$%H$rFI$_9~$s$G0E9f2=$7$?$+$r<($7$^$9!#(B
$B$7$?$,$C$FI|9f2=$N$H$-$K$O:G8e$N%V%m%C%/$O(B 0 $B$J$$$7(B 7 $BJ8;z$N(B
$BJ?J8%G!<%?$H!"KvHx$N%P%$%H$H$7$F$=$NJ8;z?t$r4^$_$^$9!#(B
$BI|9f2=$N:]$K%U%!%$%k$N:G8e$N%P%$%H$,(B 0 $B$J$$$7(B 7 $B$N@0?t$G$J$+$C$?>l9g!"(B
$B%U%!%$%k$,GK2u$5$l$F$$$k$+4V0c$C$?80$,;XDj$5$l$?$+$N$I$A$i$+$G$"$k$3$H$K(B
$BCm0U$7$F$/$@$5$$!#(B
$BF1MM$N5!9=$,(B OFB $B$H(B CFB $B$N%b!<%I$G$bMxMQ$5$l$F$$$^$9$,!"(B
$B$=$l$i$G$OF~NO$ND9$5$,(B mode size $B$NG\?t$G$"$k$3$H$@$1$,I,MW$G!"(B
$B:G8e$N%P%$%H$O(B 0 $B$J$$$7%b!<%I$H$7$F;H$o$l$k%P%$%H?t$h$j(B 1 $B8:$8$??tCM$K$J$j$^$9!#(B
($B$3$l$O(B mode size $B$,(B 8 $B$NG\?t$G$J$/$F$O$J$i$J$$M}M3$N0l$D$G$9(B)
.PP
SUN $B$N<BAu$H0[$J$j!":G8e$N%V%m%C%/Fb$NMxMQ$5$l$J$$%P%$%H$OITDj$G$O$J$/!"(B
$B0l$DA0$N%V%m%C%/$NBP1~$9$k%P%$%H$HF1$8$K$J$j$^$9!#(B
$B$3$l$K$h$j!"0E9f2=$N6/EY$rB;$J$&$3$H$J$/!"=hM}B.EY$H0\?"@-$r2~A1$7$F$$$^$9!#(B
.PP
$B80$,(B ASCII $BJ8;zNs$GF~NO$5$l$?>l9g!"(B
$B80$N3FJ8;z$N%Q%j%F%#%S%C%H$O4q?t%Q%j%F%#$H$J$k$h$&$K@_Dj$5$l$^$9!#(B
SUN $B$N<BAu$H0[$J$j!"(B
$BFs?J$"$k$$$O==O;?J$N80$b%3%^%s%I%i%$%s$G;XDj$G$-$^$9$,!"(B
$B$=$N>l9g!"%Q%j%F%#%S%C%H$,E]$l$k$3$H$O(B
.I $B$"$j$^$;$s(B
$B!#(B
$B$3$l$K$h$jG$0U$N%S%C%H%Q%?!<%s$r80$H$7$F;n$9$3$H$,$G$-$^$9!#(B
.PP
SUN $B$N<BAu$G$O>o$K(B initialization vector $B$r(B 0 ($BA4It(B 0) $B$H$7$F$$$^$9!#(B
.I bdes
$B$G$b4{DjF0:n$OF1MM$G$9$,!"%3%^%s%I%i%$%s$+$i;XDj$7$FJQ99$G$-$^$9!#(B
.SH SEE ALSO
crypt(3), getpass(3)
.sp
.IR "Data Encryption Standard" ,
Federal Information Processing Standard #46,
National Bureau of Standards,
U.S. Department of Commerce,
Washington DC
(Jan. 1977)
.sp
.IR "DES Modes of Operation" ,
Federal Information Processing Standard #81,
National Bureau of Standards,
U.S. Department of Commerce
Washington DC
(Dec. 1980)
.sp
Dorothy Denning,
.IR "Cryptography and Data Security" ,
Addison-Wesley Publishing Co.,
Reading, MA
\(co1982.
.sp
Matt Bishop,
.IR "Implementation Notes on bdes(1)" ,
Technical Report PCS-TR-91-158,
Department of Mathematics and Computer Science,
Dartmouth College,
Hanover, NH  03755
(Apr. 1991).
.SH DISCLAIMER
.nf
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
.fi
.SH BUGS
DES $B$,:#8e$N?tG/4V$b0BA4$G$"$k$+$I$&$+$K$D$$$F7c$7$$O@Ah$,$"$j$^$7$?!#(B
$B@lMQ%O!<%I%&%'%"$N=P8=$K$h$jA0=R$N3F<o967bJ}K!$NHqMQ$,Dc8:$5$l$k$3$H$O(B
$B$"$jF@$k$N$G!"(B
$B7W;;5!$r;H$o$l$?>l9g$K$O$b$O$d@dBP0BA4$H$O8@$($^$;$s!#(B
.PP
$B80$"$k$$$O80$N0lMw$,%a%b%j$KG<$a$i$l$k$N$G!"(B
$B%a%b%j$rFI$_=P$;$k>l9g$O0E9f2=$N0BA4@-$,B;$J$o$l$k2DG=@-$,$"$j$^$9!#(B
$B$5$i$K!"(B
$B%3%^%s%I%i%$%s$G80$d(B initialization vector $B$r;XDj$7$?$H$-$K$O!#(B
$B%W%m%0%i%`$N0z?t$rI=<($9$k%W%m%0%i%`$K$h$C$FK5<u$5$l$k2DG=@-$b$"$j$^$9!"(B
$B$3$l$r2sHr$9$k$?$a$K(B
.I bdes
$B$O0z?t$r>e=q$-$7$^$9$,!"(B
$B;DG0$J$,$i!"L@Gr$J6%Ah(B ($BLuCm(B: ?) $B$O8=>u$G$O2sHr$G$-$^$;$s!#(B
.PP
$B$"$k<o$N80$O@x:_E*$J4m81$rO*Dh$9$k$N$G!"(B
$B;HMQ$rHr$1$k$Y$-$G$9(B
$B$3$l$i$N80$O!"(B
.I $B<e$$80(B
$B$H(B
.I $B$d$d<e$$80(B
$B$H8F$P$l$k!"0J2<$N$b$N$G$9(B
($B==O;?JI=5-$G(B p $B$r(B 0 $B$"$k$$$O(B 1 $B$H$7!"(BP $B$r(B e $B$"$k$$$O(B f $B$H$9$k(B) :
.sp
.nf
.in +10n
.ta \w'0x0p0p0p0p0p0p0p0p\0\0\0'u+5n
0x0p0p0p0p0p0p0p0p	0x0p1P0p1P0p0P0p0P
0x0pep0pep0pfp0pfp	0x0pfP0pfP0pfP0pfP
0x1P0p1P0p0P0p0P0p	0x1P1P1P1P0P0P0P0P
0x1Pep1Pep0Pfp0Pfp	0x1PfP1PfP0PfP0PfP
0xep0pep0pfp0pfp0p	0xep1Pep1pfp0Pfp0P
0xepepepepepepepep	0xepfPepfPfpfPfpfP
0xfP0pfP0pfP0pfP0p	0xfP1PfP1PfP0PfP0P
0xfPepfPepfPepfPep	0xfPfPfPfPfPfPfPfP
.fi
.in -10n
.sp
$B$3$l$O(B DES $B%"%k%4%j%:%`$K8GM-$N@-<A$G$9!#(B
(Moore $B$H(B Simmons $B$N(B
\*(LqCycle structure of the DES with weak and semi-weak keys,\*(Rq
.I "Advances in Cryptology \- Crypto '86 Proceedings" ,
Springer-Verlag New York, \(co1987, pp. 9-32 $B$r;2>H(B)
