From owner-man-jp@jp.freebsd.org  Sun Jul 25 15:33:51 1999
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id PAA17698;
	Sun, 25 Jul 1999 15:33:51 +0900 (JST)
	(envelope-from owner-man-jp@jp.FreeBSD.org)
Received: from mail.nk.rim.or.jp (root@mail.nk.rim.or.jp [202.247.130.165])
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with ESMTP id PAA17693
	for <man-jp@jp.freebsd.org>; Sun, 25 Jul 1999 15:33:50 +0900 (JST)
	(envelope-from kuma@nk.rim.or.jp)
Received: from laurel.nk.rim.or.jp (JYOcc-01p38.ppp.odn.ad.jp [143.90.98.38])
	by mail.nk.rim.or.jp (8.8.8/3.6W-RIMNET-98-06-09) with ESMTP id PAA15599
	for <man-jp@jp.freebsd.org>; Sun, 25 Jul 1999 15:33:47 +0900 (JST)
Received: from oasis.laurel.nk.rim.or.jp by laurel.nk.rim.or.jp (8.9.2/8.9.2oasis990320) with ESMTP id PAA00884
	for <man-jp@jp.freebsd.org>; Sun, 25 Jul 1999 15:32:19 +0900 (JST)
Message-Id: <199907250632.PAA00884@laurel.nk.rim.or.jp>
To: man-jp@jp.freebsd.org
In-reply-to: Your message of "25 Jul 1999 04:21:18 JST."
	 <19990724192118.9461.sada@rr.iij4u.or.jp> 
Date: Sun, 25 Jul 1999 15:32:19 +0900
From: Norihiro Kumagai <kuma@nk.rim.or.jp>
Reply-To: man-jp@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+990625
X-Sequence: man-jp 1593
Subject: [man-jp 1593] Re: bdes(1) 
Errors-To: owner-man-jp@jp.freebsd.org
Sender: owner-man-jp@jp.freebsd.org
X-Originator: kuma@nk.rim.or.jp

$B7'C+$G$9!#(B

In Message <19990724192118.9461.sada@rr.iij4u.or.jp>,
  sada@rr.IIJ4U.OR.JP (SADA Kenji) writes:
> $B:4ED$G$9!#(B

$B$^$$$I$*@$OC$K$J$C$H$j$^$9!#(B

> $BI,MW$,$"$C$?$N$GLu$7$^$7$?!#(B

$B$"$j$,$H$&$4$6$$$^$9!#(B

> man-jp $B$N:n6H7ABV$K$D$$$F=OCN$7$F$$$J$$$N$G!"(B
> $BIT<j:]$,$"$j$^$7$?$i$4MF<O$/$@$5$$!#(B

$B$J$s$N$J$s$N!"$3$3$^$GLu$7$FD:$1$l$P=<J,$G$9!#(B

> # $B:#(B section 1 $B$OMW$i$J$$$H$+!#(B

CURRENT $B$NDI$C$+$1$O!"KY@n$5$s$,@^$K$U$l?J$a$F$*$i$l$^$9!#$b$7:4ED$5$s(B
$B$N$3$l$,$J$1$l$P!"<!2s$NDI$C$+$1$GKY@n$5$s$,5c$-$J$,$iK]Lu$5$l$F$$$?2D(B
$BG=@-$,9b$$$G$9!#(B
$B$H$$$&$3$H$G!"(BCURRENT $B$KF~$C$?%^%K%e%"%k%Z!<%8$N@h9TK]Lu$H$$$&$N$bBg4?(B
$B7^$G$9!#6=L#$NIk$/$^$^$*5$7Z$KK]Lu$5$l$l$P9,$$$G$9!d3'MM!#(B

> initialization vector $B$N%Q%j%F%#4X78$N$"$?$j$,!"(B
> $BFC$K<+?.$,$"$j$^$;$s!#(B

$B$H$$$&$3$H$G!"0lDL$j%A%c%A%cF~$l$5$;$F$b$i$$$^$7$?!#FbMFE*$K$O!"(B
$B!&%Q%j%F%#%S%C%H$r:F@_Dj5!G=$N$"$?$j!#(B
$B!&(Brace $B$N$"$?$j!#(B
$B$r>/!9=q$-49$($F$"$j$^$9!#$43NG'2<$5$$!#(B
$BB>$NItJ,$OB?J,$K<qL#$H!V(Bjpman $BE*(B .SH $B5,Ls!W$K=>$C$?=q$-49$($G$9!#(B
$B%b!<%IL>$J$I$N1QJ8$O6KNOLu$7=P$9$h$&$K$7$^$7$?!#(B

--- bdes.1-org	Sun Jul 25 14:08:43 1999
+++ bdes.1	Sun Jul 25 15:17:12 1999
@@ -34,11 +34,18 @@
 .\"
 .\"	@(#)bdes.1	8.1 (Berkeley) 6/29/93
 .\"
+.\" word: initialization vector	$B=i4|2=%Y%/%H%k(B[bdes.1]
+.\" word: alternative cipher feedback mode	$B?7$7$$(B CFB $B%b!<%I(B[bdes.1]
+.\" word: cipher block chaining mode	$B0E9f2=%V%m%C%/O":?%b!<%I(B[bdes.1]
+.\" word: electronic code book mode	$BEE;R0E9fI=%b!<%I(B[bdes.1]
+.\" word: message authentication code	$B%a%C%;!<%8G'>Z%3!<%I(B[bdes.1]
+.\"
 .TH BDES 1 "June 29, 1993"
 .UC 6
-.SH NAME
-bdes \- Data Encryption Standard $B$K$h$C$F0E9f2=(B / $BI|9f2=$7$^$9(B
-.SH SYNOPSIS
+.SH $BL>A0(B
+bdes \- Data Encryption Standard $B$K$h$k0E9f2=(B / $BI|9f2=(B
+.\"kuma: NAME $B%;%/%7%g%s$OBN8@;_$a(B($BJ8Kv$rL>;l$H$9$k(B)
+.SH $B=q<0(B
 .nf
 .ft B
 bdes [ \-abdp ] [ \-F N ] [ \-f N ] [ \-k key ]
@@ -46,19 +53,21 @@
 [ \-m N ] [ \-o N ] [ \-v vector ]
 .ft R
 .fi
-.SH DESCRIPTION
+.SH $B2r@b(B
 .I Bdes
 $B$O(B FIPS PUB 81 $B$G5,Dj$5$l$k$9$Y$F$N(B DES $B%b!<%I=hM}$N<BAu$G!"(B
-$B?7$7$$(B cipher feedback mode $B$HN>J}$NG'>Z%b!<%I$r4^$_$^$9!#(B
+$B?7$7$$0E9f2=%U%#!<%I%P%C%/%b!<%I(B (alternative cipher feedback mode
+(CFB)) $B$HN>J}$NG'>Z%b!<%I$r4^$_$^$9!#(B
 .I Bdes
 $B$OI8=`F~NO$rFI$s$GI8=`=PNO$X=q$-=P$7$^$9!#(B
 $B%*%W%7%g%s$r;XDj$7$J$1$l$P!"(B
-$BF~NO$O(B cipher block chaining mode $B$G0E9f2=$5$l$^$9!#(B
+$BF~NO$O0E9f2=%V%m%C%/O":?%b!<%I(B (cipher block chaining mode (CBC)) $B$G(B
+$B0E9f2=$5$l$^$9!#(B
 $B0E9f2=$HI|9f2=$KF10l$N80$r;H$&$3$H$GJ?J8$rI|85$7$^$9!#(B
 .PP
-electronic code book mode $B0J30$N$9$Y$F$N%b!<%I$O(B
-initialization vector $B$rI,MW$H$7!"(B
-$B;XDj$5$l$J$$>l9g$O(B zero  vector $B$,;H$o$l$^$9!#(B
+$BEE;R0E9fI=%b!<%I(B (electronic code book mode (EBC)) $B0J30$N$9$Y$F$N%b!<%I$O(B
+$B=i4|2=%Y%/%H%k(B (initialization vector) $B$rI,MW$H$7!"(B
+$B;XDj$5$l$J$$>l9g$O%<%m%Y%/%H%k$,;H$o$l$^$9!#(B
 $B%3%^%s%I%i%$%s$K(B
 .I $B80(B
 $B$r;XDj$7$J$$>l9g$O!"BPOCE*$KF~NO$r5a$a$^$9!#(B
@@ -66,36 +75,37 @@
 .IR getpass(3)
 $B$r;2>H(B)
 .PP
-$B%*%W%7%g%s$O0J2<$NDL$j$G$9(B:
+$B%*%W%7%g%s$O<!$NDL$j$G$9(B:
 .TP
 \-a
-$B80$H(B initialization vector strings $B$,(B ASCII $BJ8;zNs$H$7$F07$o$l!"(B
-``0X'', ``0x'', ``0B'', $B$*$h$S(B ``0b'' $B$G$O$8$^$kJ8;zNs$NFCJL$NJQ49$O$5$l$^$;$s!#(B
-$B80$H(B initialization vector $B$N(B
+$B80$H=i4|2=%Y%/%H%kJ8;zNs$,(B ASCII $BJ8;zNs$H$7$F07$o$l!"(B
+``0X'', ``0x'', ``0B'', $B$*$h$S(B ``0b'' $B$G$O$8$^$kJ8;zNs$KBP$9$k(B
+$BFCJL$NJQ49$O$5$l$^$;$s!#(B
+$B$3$N%U%i%0$O!"80$H=i4|2=%Y%/%H%k$N(B
 .I $BN>J}(B
 $B$K:nMQ$7$^$9!#(B
 .TP
 \-b
-electronic code book mode $B$GF0:n$7$^$9!#(B
+$BEE;R0E9fI=%b!<%I$GF0:n$7$^$9!#(B
 .TP
 \-d
 $BF~NO$rI|9f2=$7$^$9!#(B
 .TP
 \-F
 .IR N $B%S%C%H(B
-$B$N(B alternative cipher feedback mode $B$GF0:n$7$^$9!#(B
+$B$N?7$7$$(B CFB $B%b!<%I$GF0:n$7$^$9!#(B
 $B8=>u$G$O(B
 .I N
-$B$O(B 7 $B0J>e(B 56 $B0J2<$N(B 7 $B$NG\?t$G$J$/$F$O$J$j$^$;$s!#(B
-($B?7$7$$(B CFB mode $B<+BN$N;EMM$K$O$3$N@)8B$O$"$j$^$;$s(B)
+$B$O(B 7 $B0J>e(B 56 $B0J2<$N(B 7 $B$NG\?t$G$J$/$F$O$J$j$^$;$s(B
+($B$3$N@)8B$O?7$7$$(B CFB $B%b!<%I<+BN$N;EMM$K$OE,9g$7$^$;$s(B)$B!#(B
 .TP
 \-f
 .IR N $B%S%C%H(B
-$B$N(B cipher feedback mode $B$GF0:n$7$^$9!#(B
+$B$N(B CFB mode  $B$GF0:n$7$^$9!#(B
 $B8=>u$G$O(B
 .I N
-$B$O(B 8 $B0J>e(B 64 $B0J2<$N(B 8 $B$NG\?t$G$J$/$F$O$J$j$^$;$s!#(B
-(standard CFB mode $B<+BN$N;EMM$K$O$3$N@)8B$O$"$j$^$;$s(B)
+$B$O(B 8 $B0J>e(B 64 $B0J2<$N(B 8 $B$NG\?t$G$J$/$F$O$J$j$^$;$s(B
+($B$3$N@)8B$OI8=`$N(B CFB $B%b!<%I$N;EMM$K$OE,9g$7$^$;$s(B)$B!#(B
 .TP
 \-k
 .I key
@@ -104,43 +114,46 @@
 \-m
 $BF~NO$r(B
 .I N
-$B%S%C%H$N(B message authentication code (MAC) $B$G=hM}$7$^$9!#(B
+$B%S%C%H$N%a%C%;!<%8G'>Z%3!<%I(B (message authentication code (MAC))
+$B$G=hM}$7$^$9!#(B
 .I N
 $B$O(B 1 $B0J>e(B 64 $B0J2<$G$J$/$F$O$J$j$^$;$s(B;
 .I N
 $B$,(B 8 $B$NG\?t$G$J$$$H$-!"(B
 MAC $B$N%S%C%HD9$,(B 8 $B$NG\?t$K$J$k$^$G(B 0 $B$N%S%C%H$,IU$12C$($i$l$^$9!#(B
 $B=PNO$OI,$:(B MAC $B$K$J$j$^$9!#(B
-MAC $B$O(B cipher block chaining mode $B$"$k$$$O(B cipher feedback mode $B$G$N$_(B
+MAC $B$O0E9f2=%V%m%C%/O":?%b!<%I$"$k$$$O(B CFB $B%b!<%I$G$N$_(B
 $BM-8z$G$9!#(B
 .TP
 \-o
 .IR N $B%S%C%H(B
-$B$N(B output feedback mode $B$GF0:n$7$^$9!#(B
+$B$N=PNO%U%#!<%I%P%C%/%b!<%I(B (output feedback mode (OFB)) $B$GF0:n$7$^$9!#(B
 $B8=>u$G$O(B
 .I N
 $B$O(B 8 $B0J>e(B 64 $B0J2<$N(B 8 $B$NG\?t$G$J$/$F$O$J$j$^$;$s!#(B
-(OFB mode $B<+BN$N;EMM$K$O$3$N@)8B$O$"$j$^$;$s(B)
+(OFB $B%b!<%I<+BN$N;EMM$K$O$3$N@)8B$O$"$j$^$;$s(B)
 .TP
 \-p
-parity bit $B$N%j%;%C%H$r$7$^$;$s!#(B
-$B$3$N%U%i%0$K$h$j80$N(B parity bit $B$OF~NO$5$l$?DL$j$K2r<a$5$l!"(B
+$B%Q%j%F%#%S%C%H$N%j%;%C%H$r$7$^$;$s!#(B
+$B$3$N%U%i%0$K$h$j80$N%Q%j%F%#%S%C%H$OF~NO$5$l$?DL$j$K2r<a$5$l!"(B
 $B$=$l$>$l$NJ8;z$r4q?t%Q%j%F%#$KD>$9$3$H$O$7$^$;$s!#(B
 $B80$,(B ASCII $BJ8;zNs$N>l9g$K$N$_;HMQ$5$l$^$9!#(B
 .TP
 \-v
-initialization vector $B$H$7$F(B
+$B=i4|2=%Y%/%H%k$H$7$F(B
 .IR vector
 $B$r;HMQ$7$^$9!#(B
 vector $B$O80$HF1$8J}<0$G2r<a$5$l$^$9!#(B
-vector $B$O(B electronic codebook mode $B$G$OL58z$G$9!#(B
+vector $B$OEE;R0E9fI=%b!<%I$G$OL58z$G$9!#(B
 .PP
-$B80$H(B initialization vector $B$O(B ASCII $BJ8;zNs$H$7$FM?$($i$l!"(B
+$B80$H=i4|2=%Y%/%H%k$O(B ASCII $BJ8;zNs$H$7$FM?$($i$l!"(B
 $B$=$N$^$^$N%S%C%HJB$S$H$7$F07$o$l$^$9!#(B
-``0X'' $B$"$k$$$O(B ``0x'' $B$G$O$8$^$C$F$$$k>l9g!"(B16 $B?J?tCM$H$7$F07$o$l$^$9!#(B
-``0B'' $B$"$k$$$O(B ``0b'' $B$G$O$8$^$C$F$$$k>l9g$O!"(B2 $B?J?tCM$H$7$F07$o$l$^$9!#(B
+``0X'' $B$"$k$$$O(B ``0x'' $B$G$O$8$^$C$F$$$k>l9g!"%S%C%HJB$S$rI=$9(B 16 $B?J?tCM(B
+$B$H$7$F07$o$l$^$9!#(B
+``0B'' $B$"$k$$$O(B ``0b'' $B$G$O$8$^$C$F$$$k>l9g$O!"%S%C%HJB$S$rI=$9(B 2 $B?J?tCM(B
+$B$H$7$F07$o$l$^$9!#(B
 $B$I$A$i$N>l9g$G$b!"(B
-$B:G=i$N(B 64 $B%S%C%H$^$G$,80$"$k$$$O(B initialization  vector $B$H$7$F;H$o$l!"(B
+$B:G=i$N(B 64 $B%S%C%H$^$G$,80$"$k$$$O=i4|2=%Y%/%H%k$H$7$F;H$o$l!"(B
 64 $B%S%C%H$KK~$?$J$$>l9g$O(B 64 $B%S%C%H$K$J$k$^$G(B 0 $B$N%S%C%H$,DI2C$5$l$^$9!#(B
 .PP
 DES $BI8=`$K=>$$!"80J8;zNs$N3FJ8;z$N:G2<0L%S%C%H$O:o$i$l$^$9!#(B
@@ -148,43 +161,46 @@
 $BC1=c$K2<0L%S%C%H$r:o$k$H!"(B
 $BM-8z$J806u4V$NBg$-$5$O(B 2\u\s-356\s0\d $B8D$+$i(B 2\u\s-348\s0\d $B8D$^$G=L>.$7$^$9!#(B
 $B$3$l$rKI$0$?$a!"(B
-$B:G>e0L%S%C%H$O:G2<0L%S%C%H$K0MB8$9$k4X?t$G$J$/$F$O$J$i$:!"(B
-$B:G>e0L%S%C%H$O4q?t%Q%j%F%#$rK~$?$9$J$s$i$+$NCM$G$J$/$F$O$J$j$^$;$s!#(B
+$B:G>e0L%S%C%H$O:G2<0L%S%C%H$KItJ,E*$K0MB8$9$k4X?t$G$J$/$F$O$J$j$^$;$s!#(B
+$BNc$($P!":G>e0L%S%C%H$O4q?t%Q%j%F%#$rK~$?$9$h$&$JCM$K$J$k$h$&$K(B
+$B@_Dj$5$l$k$h$&$K$9$kJ}K!$,$"$j$^$9!#(B
 $B$3$l$G806u4V$,J];}$5$l$^$9!#(B
-$B$3$N%Q%j%F%#%S%C%H$N%j%;%C%H$O80$,Fs?J?t$"$k$$$O==O;?J?t$G(B
+$B$3$N%Q%j%F%#%S%C%H$N:F@_Dj$O!"80$,(B 2 $B?J?t$"$k$$$O(B 16 $B?J?t$G(B
 $BM?$($i$l$?>l9g$K$O(B
-.I $B9T$J$o$l$J$$(B
-$B$3$H$K2C$($F!"(B
-ASCII $B$N80$G$"$C$F$b6X;_$G$-$k$3$H$KCm0U$7$F$/$@$5$$!#(B
+.I $B9T$J$o$l$^$;$s!#(B
+$B$5$i$K!"(B
+ASCII $B$N80$G$"$C$F$bDd;_$G$-$k$3$H$rCm0U$7$F$*$-$^$9!#(B
 .PP
 DES $B$OHs>o$K6/8G$J0E9fK!$H$5$l$F$*$j!"(B
-table lookup attacks, key search attacks, $B$*$h$S(B Hellman's time-memory tradeoff
+table lookup attacks, key search attacks, $B$*$h$S(B
+Hellman's time-memory tradeoff
 ($B$3$l$i$O$9$Y$F$?$$$X$s$J<j4V$H;~4V$rMW$7$^$9(B) $B$r=|$1$P!"(B
 $B8x$NJ88%$K4X$9$k8B$j(B DES $B$rFMGK$9$k2r@OK!$OCN$i$l$F$$$^$;$s!#(B
 $B80$NA*Br$H80$=$N$b$N$NJ]0B$,(B
 .IR bdes
 $B$N?.Mj@-$r7hDj$9$k$b$N$H?.$8$F4V0c$$$"$j$^$;$s!#(B
-.SH IMPLEMENTATION NOTES
+.SH $B<BAu$K4X$9$kCm<a(B
 $B$3$N%W%m%0%i%`$H8_49@-$N$"$k%=%U%H%&%'%"$r<BAu$7$?$$?M$O!"(B
 $B0J2<$NE@$KCm0U$7$F$/$@$5$$!#(B
 $B$3$N%=%U%H%&%'%"$O(B Sun Microsystems $B$,8x3+$7$F$$$k(B
 data encryption standard $B$N<BAu$H8_49$G$"$k$b$N$H$5$l$F$$$^$9!#(B
 .PP
-ECB $B$*$h$S(B CBC $B%b!<%I$G$O!"(B
+$BEE;R0E9fI=(B (ECB) $B%b!<%I$*$h$S0E9f2=%V%m%C%/O":?(B (CBC) $B%b!<%I$G$O!"(B
 $BJ?J8$,(B 64 bit (8 $B%P%$%H(B = 1 $B%V%m%C%/(B) $BC10L$G0E9f2=$5$l$^$9!#(B
 $BJ?J8$N%U%!%$%k$,@5$7$/0E9f2=$5$l$k$3$H$rJ]>Z$9$k$?$a$K!"(B
 .I bdes
-$B$O(B ($BFbItF0:n$H$7$F(B) 1 $B$J$$$7(B 8 $B%P%$%H$rDI2C$7!"(B
-$B$=$NFb$N:G8e$N%P%$%H$O:G8e$N%V%m%C%/$,J?J8$N%U%!%$%k$+$i$NF~NO$H$7$F(B
+$B$O(B ($BFbItF0:n$H$7$F(B) 1 $B$+$i(B 8 $B%P%$%H$rDI2C$7!"(B
+$B$=$N$&$A$N:G8e$N%P%$%H$O!":G8e$N%V%m%C%/$,J?J8$N%U%!%$%k$+$i$NF~NO$H$7$F(B
 $B2?%P%$%H$rFI$_9~$s$G0E9f2=$7$?$+$r<($7$^$9!#(B
-$B$7$?$,$C$FI|9f2=$N$H$-$K$O:G8e$N%V%m%C%/$O(B 0 $B$J$$$7(B 7 $BJ8;z$N(B
+$B$7$?$,$C$F!"I|9f2=$N$H$-$K$O:G8e$N%V%m%C%/$O(B 0 $B$+$i(B 7 $BJ8;z$^$G$N(B
 $BJ?J8%G!<%?$H!"KvHx$N%P%$%H$H$7$F$=$NJ8;z?t$r4^$_$^$9!#(B
-$BI|9f2=$N:]$K%U%!%$%k$N:G8e$N%P%$%H$,(B 0 $B$J$$$7(B 7 $B$N@0?t$G$J$+$C$?>l9g!"(B
+$BI|9f2=$N:]$K%U%!%$%k$N:G8e$N%P%$%H$,(B 0 $B$+$i(B 7 $B$^$G$N4V$N@0?t$G$J$+$C$?>l9g!"(B
 $B%U%!%$%k$,GK2u$5$l$F$$$k$+4V0c$C$?80$,;XDj$5$l$?$+$N$I$A$i$+$G$"$k$3$H$K(B
 $BCm0U$7$F$/$@$5$$!#(B
 $BF1MM$N5!9=$,(B OFB $B$H(B CFB $B$N%b!<%I$G$bMxMQ$5$l$F$$$^$9$,!"(B
-$B$=$l$i$G$OF~NO$ND9$5$,(B mode size $B$NG\?t$G$"$k$3$H$@$1$,I,MW$G!"(B
-$B:G8e$N%P%$%H$O(B 0 $B$J$$$7%b!<%I$H$7$F;H$o$l$k%P%$%H?t$h$j(B 1 $B8:$8$??tCM$K$J$j$^$9!#(B
+$B$=$l$i$G$OF~NO$ND9$5$,(B mode size $B$NG\?t$G$"$k$3$H$,I,MW$J$@$1$G!"(B
+$B:G8e$N%P%$%H$O(B 0 $B$J$$$7(B mode $B$H$7$F;H$o$l$k%P%$%H?t$h$j(B
+1 $B8:$8$??tCM$K$J$j$^$9!#(B
 ($B$3$l$O(B mode size $B$,(B 8 $B$NG\?t$G$J$/$F$O$J$i$J$$M}M3$N0l$D$G$9(B)
 .PP
 SUN $B$N<BAu$H0[$J$j!":G8e$N%V%m%C%/Fb$NMxMQ$5$l$J$$%P%$%H$OITDj$G$O$J$/!"(B
@@ -195,15 +211,15 @@
 $B80$N3FJ8;z$N%Q%j%F%#%S%C%H$O4q?t%Q%j%F%#$H$J$k$h$&$K@_Dj$5$l$^$9!#(B
 SUN $B$N<BAu$H0[$J$j!"(B
 $BFs?J$"$k$$$O==O;?J$N80$b%3%^%s%I%i%$%s$G;XDj$G$-$^$9$,!"(B
-$B$=$N>l9g!"%Q%j%F%#%S%C%H$,E]$l$k$3$H$O(B
+$B$=$N>l9g!"%Q%j%F%#%S%C%H$,:F@_Dj$5$l$k$3$H$O(B
 .I $B$"$j$^$;$s(B
 $B!#(B
 $B$3$l$K$h$jG$0U$N%S%C%H%Q%?!<%s$r80$H$7$F;n$9$3$H$,$G$-$^$9!#(B
 .PP
-SUN $B$N<BAu$G$O>o$K(B initialization vector $B$r(B 0 ($BA4It(B 0) $B$H$7$F$$$^$9!#(B
+SUN $B$N<BAu$G$O>o$K=i4|2=%Y%/%H%k$r(B 0 ($BA4It(B 0) $B$H$7$F$$$^$9!#(B
 .I bdes
 $B$G$b4{DjF0:n$OF1MM$G$9$,!"%3%^%s%I%i%$%s$+$i;XDj$7$FJQ99$G$-$^$9!#(B
-.SH SEE ALSO
+.SH $B4XO"9`L\(B
 crypt(3), getpass(3)
 .sp
 .IR "Data Encryption Standard" ,
@@ -247,29 +263,33 @@
 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 SUCH DAMAGE.
 .fi
-.SH BUGS
+.SH $B%P%0(B
 DES $B$,:#8e$N?tG/4V$b0BA4$G$"$k$+$I$&$+$K$D$$$F7c$7$$O@Ah$,$"$j$^$7$?!#(B
 $B@lMQ%O!<%I%&%'%"$N=P8=$K$h$jA0=R$N3F<o967bJ}K!$NHqMQ$,Dc8:$5$l$k$3$H$O(B
 $B$"$jF@$k$N$G!"(B
-$B7W;;5!$r;H$o$l$?>l9g$K$O$b$O$d@dBP0BA4$H$O8@$($^$;$s!#(B
+$B$3$l$i$N967bJ}K!$,$O7W;;NL$NE@$+$iHs8=<BE*$H$O$b$O$d8@$($^$;$s!#(B
 .PP
 $B80$"$k$$$O80$N0lMw$,%a%b%j$KG<$a$i$l$k$N$G!"(B
 $B%a%b%j$rFI$_=P$;$k>l9g$O0E9f2=$N0BA4@-$,B;$J$o$l$k2DG=@-$,$"$j$^$9!#(B
 $B$5$i$K!"(B
-$B%3%^%s%I%i%$%s$G80$d(B initialization vector $B$r;XDj$7$?$H$-$K$O!#(B
+$B%3%^%s%I%i%$%s$G80$d=i4|2=%Y%/%H%k$r;XDj$7$?$H$-$K$O!#(B
 $B%W%m%0%i%`$N0z?t$rI=<($9$k%W%m%0%i%`$K$h$C$FK5<u$5$l$k2DG=@-$b$"$j$^$9!"(B
 $B$3$l$r2sHr$9$k$?$a$K(B
 .I bdes
 $B$O0z?t$r>e=q$-$7$^$9$,!"(B
-$B;DG0$J$,$i!"L@Gr$J6%Ah(B ($BLuCm(B: ?) $B$O8=>u$G$O2sHr$G$-$^$;$s!#(B
+$B;DG0$J$,$i!"$3$l$i$,6%9g$G$"$k$3$H$OL@$i$+$G!"8=>u$G$O2sHr$G$-$^$;$s!#(B
+.\"kuma race ... 2 $B$D0J>e$N(B ($BFHN)$J(B) $B=hM}$N=g=x4X78$,J]>Z$5$l$J$$>u67$G!"(B
+.\"kuma         $B$=$l$i$rF1;~$K<B9T$5$;$k:]$NIT3N<B@-$rI=$98@MU!#(B
+.\"kuma         $BJBNs=hM}6H3&MQ8l!#$3$N>l9g$O!"(Bbdes $B$N0z?t>e=q$-$H(B
+.\"kuma         $BB>%W%m%;%9$N0z?tGA$-8+$H$,(B race $B4X78$H$J$k!#(B
 .PP
-$B$"$k<o$N80$O@x:_E*$J4m81$rO*Dh$9$k$N$G!"(B
-$B;HMQ$rHr$1$k$Y$-$G$9(B
+$B$"$k<o$N80$O@x:_E*$J4m81$r;}$A9~$`$3$H$K$J$k$N$G!"(B
+$B;HMQ$rHr$1$k$Y$-$G$9!#(B
 $B$3$l$i$N80$O!"(B
-.I $B<e$$80(B
+.I "$B<e$$80(B (week key)"
 $B$H(B
-.I $B$d$d<e$$80(B
-$B$H8F$P$l$k!"0J2<$N$b$N$G$9(B
+.I "$B$d$d<e$$80(B (semiweek key)"
+$B$H8F$P$l$F$*$j!"0J2<$N$b$N$G$9(B
 ($B==O;?JI=5-$G(B p $B$r(B 0 $B$"$k$$$O(B 1 $B$H$7!"(BP $B$r(B e $B$"$k$$$O(B f $B$H$9$k(B) :
 .sp
 .nf
