亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 18-09.html

?? Wiley - Applied Cryptography, Protocols, Algorthms, and Source Code in C
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.security1.html">Security				<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->			<option value="/reference/dir.userinterfaces.html">UI			<option value="/reference/dir.webservices.html">Web Services			<option value="/reference/dir.webmasterskills1.html">Webmaster			<option value="/reference/dir.y2k1.html">Y2K			<option value="">-----------			<option value="/reference/whatsnew.html">New Titles			<option value="">-----------			<option value="/reference/dir.archive1.html">Free Archive					</SELECT>			</font></td>	</tr>	</table>	</form><!-- LEFT NAV SEARCH END -->		</td>		<!-- PUB PARTNERS END --><!-- END LEFT NAV --><td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td><td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td><!-- end of ITK left NAV --><!-- begin main content --><td width="100%" valign="top" align="left"><!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471128457/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=18//-->
<!--PAGES=457-459//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="18-08.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch19/19-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Bidirectional MAC</I></B></FONT></P>
<P>This MAC produces a hash value twice the length of the block algorithm [978]. First, compute the CBC-MAC of the message. Then, compute the CBC-MAC of the message with the blocks in reverse order. The bidirectional MAC value is simply the concatenation of the two. Unfortunately, this construction is insecure [1097].
</P>
<P><FONT SIZE="+1"><B><I>Jueneman&#146;s Methods</I></B></FONT></P>
<P>This MAC is also called a quadratic congruential manipulation detection code (QCMDC) [792, 789]. First, divide the message into m- bit blocks. Then:
</P>
<DL>
<DD><I>H</I><SUB>0</SUB> = <I>I</I><SUB>H,</SUB> where <I>I</I><SUB>H</SUB> is the secret key
<DD><I>H</I><SUB>i</SUB> = (<I>H</I><SUB>i- 1</SUB> &#43; <I>M</I><SUB>i</SUB>)2 mod <I>p,</I> where <I>p</I> is a prime less than 2<SUP>m </SUP>- 1 and &#43; denotes integer addition
</DL>
<P>Jueneman suggests <I>n</I> = 16 and <I>p</I> = 2<SUP>31</SUP> - 1. In [792] he also suggests that an additional key be used as <I>H</I><SUB>1,</SUB> with the actual message starting at <I>H</I><SUB>2</SUB>.</P>
<P>Because of a variety of birthday-type attacks discovered in conjunction with Don Coppersmith, Jueneman suggested computing the QCMDC four times, using the result of one iteration as the IV for the next iteration, and then concatenating the results to obtain a 128-bit hash value [793]. This was further strengthened by doing the four iterations in parallel and cross-linking them [790, 791]. This scheme was broken by Coppersmith [376].</P>
<P>Another variant [432, 434] replaced the addition operation with an XOR and used message blocks significantly smaller than <I>p. H</I><SUB>0</SUB> was also set, making it a keyless one-way hash function. After this scheme was attacked [612], it was strengthened as part of the European Open Shop Information-TeleTrust project [1221], quoted in CCITT X.509 [304], and adopted in ISO 10118 [764, 765]. Unfortunately, Coppersmith has broken this scheme as well [376]. There has been some research using exponents other than 2 [603], but none of it has been promising.</P>
<P><FONT SIZE="+1"><B><I>RIPE-MAC</I></B></FONT></P>
<P>RIPE-MAC was invented by Bart Preneel [1262] and adopted by the RIPE project [1305] (see Section 18.8). It is based on ISO 9797 [763], and uses DES as a block encryption function. RIPE-MAC has two flavors: one using normal DES, called RIPE-MAC1, and another using triple-DES for even greater security, called RIPE-MAC3. RIPE-MAC1 uses one DES encryption per 64-bit message block; RIPE-MAC3 uses three.
</P>
<P>The algorithm consists of three parts. First, the message is expanded to a length that is a multiple of 64 bits. Next, the expanded message is divided up into 64-bit blocks. A keyed compression function is used to hash these blocks, under the control of a secret key, into a single block of 64 bits. This is the step that uses either DES or triple-DES. Finally, the output of this compression is subjected to another DES-based encryption with a different key, derived from the key used in the compression. See [1305] for details.</P>
<P><FONT SIZE="+1"><B><I>IBC-Hash</I></B></FONT></P>
<P>IBC-Hash is another MAC adopted by the RIPE project [1305] (see Section 18.8). It is interesting because it is provably secure; the chance of successful attack can be quantified. Unfortunately, every message must be hashed with a different key. The chosen level of security puts constraints on the maximum message size that can be hashed&#151;something no other function in this chapter does. Given these considerations, the RIPE report recommends that IBC-Hash be used only for long, infrequently sent messages.
</P>
<P>The heart of the function is</P>
<DL>
<DD><I>h</I><SUB>i</SUB> = ((<I>M</I><SUB>i</SUB> mod <I>p</I>) &#43; <I>v</I> ) mod 2<SUB>n</SUB>
</DL>
<P>The secret key is the pair <I>p</I> and <I>v,</I> where <I>p</I> is an N- bit prime and <I>v</I> is a random number less than 2<SUP>n</SUP>. The Mi values are derived by a carefully specified padding procedure. The probabilities of breaking both the one-wayness and the collision-resistance can be quantified, and users can choose their security level by changing the parameters.</P>
<P><FONT SIZE="+1"><B><I>One-Way Hash Function MAC</I></B></FONT></P>
<P>A one-way hash function can also be used as a MAC [1537]. Assume Alice and Bob share a key <I>K,</I> and Alice wants to send Bob a MAC for message <I>M</I>. Alice concatenates <I>K</I> and <I>M,</I> and computes the one-way hash of the concatenation: <I>H</I> (<I>K,M</I> ). This hash is the MAC. Since Bob knows <I>K,</I> he can reproduce Alice&#146;s result. Mallory, who does not know <I>K,</I> can&#146;t.</P>
<P>This method works with MD-strengthening techniques, but has serious problems. Mallory can always add new blocks to the end of the message and compute a valid MAC. This attack can be thwarted if you put the message length at the beginning, but Preneel is suspicious of this scheme [1265]. It is better to put the key at the end of the message, <I>H</I> (<I>M,K</I> ), but this has some problems as well [1265]. If <I>H</I> is one-way but not collision-free, Mallory can forge messages. Still better is <I>H</I> (<I>K,M,K</I> ), or <I>H</I> (<I>K</I><SUB>1</SUB><I>,M,K</I><SUB>2</SUB> ), where <I>K</I><SUB>1</SUB> and <I>K2</I> are different [1537]. Preneel is still suspicious [1265].</P>
<P>The following constructions seem secure:</P>
<DL>
<DD><I>H</I> (<I>K</I><SUB>1</SUB>,H(<I>K</I><SUB>2</SUB>, <I>M</I>))
<DD><I>H</I> (<I>K, H</I> (<I>K,M</I>))
<DD><I>H</I> (<I>K,p,M,K</I> ), where <I>p</I> pads <I>K</I> to a full message block.
</DL>
<I><P><A NAME="Fig15"></A><A HREF="javascript:displayWindow('images/18-15.jpg',228,128 )"><IMG SRC="images/18-15t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/18-15.jpg',228,128)"><FONT COLOR="#000077"><B>Figure 18.15</B></FONT></A>&nbsp;&nbsp;Stream cipher MAC.</I>
</P>
<P>The best approach is to concatenate at least 64 bits of the key with each message block. This makes the one-way hash function less efficient, because the message blocks are smaller, but it is much more secure [1265].
</P>
<P>Alternatively, use a one-way hash function and a symmetric algorithm. Hash the file, then encrypt the hash. This is more secure than first encrypting the file and then hashing the encrypted file, but it is vulnerable to the same attack as the <I>H</I> (<I>M,K</I> ) approach [1265].</P>
<P><FONT SIZE="+1"><B><I>Stream Cipher MAC</I></B></FONT></P>
<P>This MAC scheme uses stream ciphers (see Figure 18.15) [932]. A cryptographically secure pseudo-random-bit generator demultiplexes the message stream into two substreams. If the output bit of the bit generator <I>k</I><SUB>i</SUB>, is 1, then the current message bit <I>m</I><SUB>i</SUB>, is routed to the first substream; if the <I>k</I><SUB>i</SUB> is 0, the <I>mi</I> is routed to the second substream. The substreams are each fed into a different LFSR (see Section 16.2). The output of the MAC is simply the final states of the shift registers.</P>
<P>Unfortunately, this method is not secure against small changes in the message [1523]. For example, if you alter the last bit of the message, then only 2 bits in the corresponding MAC value need to be altered to create a fake MAC; this can be done with reasonable probability. The author presents a more secure, and more complicated, alternative.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="18-08.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch19/19-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
<!-- all of the reference materials (books) have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- BEGIN SUB FOOTER -->		<br><br>		</TD>    </TR>	</TABLE>			<table width="640" border=0 cellpadding=0 cellspacing=0>		<tr>		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>				<!-- END SUB FOOTER -->
<!-- all of the books have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- FOOTER -->					<td width="515" align="left" bgcolor="#FFFFFF"><font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>		<br><br>				Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p></td>		</tr></table></BODY></HTML><!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91麻豆福利精品推荐| 丝袜诱惑制服诱惑色一区在线观看 | 久久综合99re88久久爱| 免费成人性网站| 欧美不卡一区二区三区四区| 激情综合一区二区三区| 国产亚洲污的网站| 成人爱爱电影网址| 亚洲欧美日韩国产综合在线| 91福利视频在线| 午夜一区二区三区在线观看| 日韩精品一区二区在线| 欧美一级二级三级蜜桃| 精品一二三四区| 国产色婷婷亚洲99精品小说| 91免费在线视频观看| 亚洲成人黄色影院| 精品88久久久久88久久久| 国产最新精品免费| 综合亚洲深深色噜噜狠狠网站| 色婷婷综合久久久久中文 | 午夜精品视频一区| 日韩欧美成人一区| www.日韩av| 午夜精品久久久久久久99水蜜桃| 日韩精品一区在线| 99视频一区二区| 午夜精品久久久久久久| 国产日韩欧美不卡| 欧美日韩国产高清一区| 国产精品自拍一区| 亚洲一区二区三区四区不卡| 精品粉嫩aⅴ一区二区三区四区| 成人短视频下载| 日本视频一区二区三区| 国产一区视频导航| 亚洲女与黑人做爰| 精品91自产拍在线观看一区| 91福利视频在线| 国产伦理精品不卡| 亚洲国产日日夜夜| 中文字幕第一页久久| 欧美一区二区三区四区视频| 成人国产电影网| 久久成人免费网站| 亚洲电影你懂得| 国产精品成人午夜| 久久综合网色—综合色88| 欧美亚男人的天堂| voyeur盗摄精品| 韩国毛片一区二区三区| 亚洲成人av在线电影| 亚洲欧洲在线观看av| 精品久久久久久久久久久久久久久久久 | 欧美日韩一区二区在线视频| 成人午夜免费电影| 精品一区二区三区免费观看| 亚洲一区在线视频| 国产精品情趣视频| 26uuu色噜噜精品一区二区| 欧美曰成人黄网| caoporen国产精品视频| 国产一区二区三区香蕉| 日本不卡的三区四区五区| 亚洲曰韩产成在线| 亚洲精品日日夜夜| 国产三区在线成人av| 日韩精品一区二区三区蜜臀| 欧美精品久久久久久久多人混战 | 一区二区三区丝袜| 中文字幕日韩av资源站| 国产日韩欧美综合在线| 欧美精品一区二区三区蜜桃视频| 欧美电影在哪看比较好| 欧美日韩亚洲综合在线 欧美亚洲特黄一级 | 日本一区二区动态图| 久久综合精品国产一区二区三区 | 午夜国产精品影院在线观看| 一级精品视频在线观看宜春院| 亚洲欧美电影院| 亚洲综合一区在线| 一区二区三国产精华液| 一区二区三区四区av| 亚洲一区二区三区美女| 午夜影院在线观看欧美| 日韩不卡一区二区三区| 男人的j进女人的j一区| 欧美一区二区三区四区久久| 欧美一区二区三区影视| 精品99一区二区三区| 久久丝袜美腿综合| 国产精品欧美综合在线| 亚洲人成7777| 性久久久久久久| 久久精品国产一区二区三| 国产伦精品一区二区三区视频青涩| 国产经典欧美精品| 99国产精品久久久久久久久久| 一本大道久久a久久综合| 欧美又粗又大又爽| 日韩女优毛片在线| 久久久久亚洲蜜桃| 亚洲精品免费在线播放| 午夜视频一区二区三区| 免费观看一级特黄欧美大片| 国产一区二区毛片| 一本色道a无线码一区v| 欧美一区二区三区性视频| 久久久久久夜精品精品免费| 亚洲欧洲av另类| 日韩精品一二三| 国产aⅴ综合色| 在线国产电影不卡| 精品处破学生在线二十三| 国产精品国产自产拍高清av王其 | 国产91精品免费| 欧美性猛交xxxx黑人交| 日韩欧美www| 亚洲伦在线观看| 九九视频精品免费| 色婷婷亚洲精品| 久久综合久久综合亚洲| 亚洲黄色av一区| 国内精品不卡在线| 欧美性猛交一区二区三区精品| 欧美精品一区二区三区四区 | 91香蕉视频在线| 日韩欧美精品三级| 亚洲裸体在线观看| 韩国在线一区二区| 欧美日韩一区二区三区四区| 国产午夜精品久久久久久免费视 | 99视频在线精品| 欧美r级电影在线观看| 一区二区三区四区蜜桃| 国产成人免费在线观看不卡| 欧美三级日韩三级国产三级| 国产精品久久网站| 国产一区二区精品久久| 欧美日韩成人综合天天影院| 亚洲欧洲性图库| 国产成人免费视频精品含羞草妖精 | 一区二区三区欧美视频| 国产精品99久久久久久久女警 | 成人免费av在线| 精品国产亚洲在线| 日韩专区在线视频| 色欲综合视频天天天| 国产精品无遮挡| 韩国欧美国产1区| 日韩一区二区电影| 天堂久久一区二区三区| 色婷婷久久久久swag精品 | 樱桃视频在线观看一区| 成人激情av网| 国产欧美日韩亚州综合| 狠狠色综合播放一区二区| 欧美疯狂做受xxxx富婆| 亚洲午夜免费电影| 日本韩国精品在线| 亚洲免费观看高清完整版在线 | 在线精品视频小说1| 一区视频在线播放| 97久久精品人人做人人爽50路| 久久久精品国产免大香伊| 狠狠狠色丁香婷婷综合久久五月| 日韩视频永久免费| 欧美aaaaaa午夜精品| 亚洲一区二区中文在线| 色综合天天综合狠狠| 亚洲欧美视频在线观看| 91丨九色丨国产丨porny| 亚洲视频资源在线| 一本大道av伊人久久综合| 亚洲精品久久久久久国产精华液| 91蜜桃网址入口| 亚洲一二三四久久| 欧美高清视频在线高清观看mv色露露十八 | 久久精品国产77777蜜臀| 日韩午夜激情免费电影| 久久爱www久久做| 欧美精品一区二区三区蜜桃| 国产精品一卡二| 国产精品久99| 欧美色图第一页| 毛片基地黄久久久久久天堂| 精品国产污污免费网站入口 | 五月天一区二区| 日韩一区二区免费在线电影 | 成人久久久精品乱码一区二区三区| 国产无人区一区二区三区| a亚洲天堂av| 亚洲国产日韩a在线播放性色| 欧美久久久久中文字幕| 精品无人码麻豆乱码1区2区 | 色综合久久中文字幕| 婷婷国产在线综合| 亚洲精品一区二区三区香蕉| av亚洲精华国产精华| 无码av中文一区二区三区桃花岛|