亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 18-02.html

?? Wiley - Applied Cryptography, Protocols, Algorthms, and Source Code in C
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.funandgames1.html">Fun/Games			<option value="/reference/dir.groupwareandcollaboration1.html">Groupware			<option value="/reference/dir.hardware1.html">Hardware			<option value="/reference/dir.intranetandextranetdevelopment1.html">Intranet Dev			<option value="/reference/dir.middleware.html">Middleware			<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia			<option value="/reference/dir.networkservices1.html">Networks 			<option value="/reference/dir.operatingsystems.html">OS			<option value="/reference/dir.productivityapplications1.html">Prod Apps			<option value="/reference/dir.programminglanguages.html">Programming			<option value="/reference/dir.security1.html">Security				<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->			<option value="/reference/dir.userinterfaces.html">UI			<option value="/reference/dir.webservices.html">Web Services			<option value="/reference/dir.webmasterskills1.html">Webmaster			<option value="/reference/dir.y2k1.html">Y2K			<option value="">-----------			<option value="/reference/whatsnew.html">New Titles			<option value="">-----------			<option value="/reference/dir.archive1.html">Free Archive					</SELECT>			</font></td>	</tr>	</table>	</form><!-- LEFT NAV SEARCH END -->		</td>		<!-- PUB PARTNERS END --><!-- END LEFT NAV --><td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td><td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td><!-- end of ITK left NAV --><!-- begin main content --><td width="100%" valign="top" align="left"><!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471128457/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=18//-->
<!--PAGES=432-437//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="18-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="18-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>On 128-bit Snefru, their attacks work better than brute force for four passes or less. A birthday attack against Snefru takes 2<SUP>64</SUP> operations; differential cryptanalysis can find a pair of messages that hash to the same value in 2<SUP>28.5</SUP> operations for three-pass Snefru and 2<SUP>44.5</SUP> operations for four-pass Snefru. Finding a message that hashes to a given value by brute force requires 2<SUP>128</SUP> operations; differential cryptanalysis takes 2<SUP>56</SUP> operations for three-pass Snefru and 2<SUP>88</SUP> operations for four-pass Snefru.</P>
<P>Although Biham and Shamir didn&#146;t analyze 256-bit hash values, they extended their analysis to 224-bit hash values. Compared to a birthday attack that requires 2<SUP>112</SUP> operations, they can find messages that hash to the same value in 2<SUP>12.5</SUP> operations for two-pass Snefru, 2<SUP>33</SUP> operations for three-pass Snefru, and 2<SUP>81</SUP> operations for four-pass Snefru.</P>
<P>Currently, Merkle recommends using Snefru with at least eight passes [1073]. However, with this many passes the algorithm is significantly slower than either MD5 or SHA.</P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">18.3 N- Hash</FONT></H3>
<P><I>N</I>-Hash is an algorithm invented by researchers at Nippon Telephone and Telegraph, the same people who invented FEAL, in 1990 [1105, 1106]. <I>N</I>-Hash uses 128-bit message blocks, a complicated randomizing function similar to FEAL&#146;s, and produces a 128-bit hash value.</P>
<P>The hash of each 128-bit block is a function of the block and the hash of the previous block.</P>
<DL>
<DD><I>H</I><SUB>0</SUB> = <I>I</I>, where <I>I</I> is a random initial value
<DD><I>H</I><SUB>i</SUB> = g(<I>M</I><SUB>i</SUB>,<I>H</I><SUB>i- 1</SUB>) &#8853; <I>M</I><SUB>i</SUB> &#8853; <I>H</I><SUB>i- 1</SUB>
</DL>
<P>The hash of the entire message is the hash of the last message block. The random initial value, <I>I</I>, can be any value determined by the user (even all zeros).</P>
<P>The function g is a complicated one. Figure 18.2 is an overview of the algorithm. Initially, the 128-bit hash of the previous message block, <I>H</I><SUB>i-1</SUB>, has its 64-bit left half and 64-bit right half swapped; it is then XORed with a repeating one/zero pattern (128 bits worth), and then XORed with the current message block, <I>M</I><SUB>i</SUB>. This value then cascades into <I>N</I>(<I>N</I> = 8 in the figures) processing stages. The other input to the processing stage is the previous hash value XORed with one of eight binary constant values.</P>
<I><P><A NAME="Fig2"></A><A HREF="javascript:displayWindow('images/18-02.jpg',297,297 )"><IMG SRC="images/18-02t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/18-02.jpg',297,297)"><FONT COLOR="#000077"><B>Figure 18.2</B></FONT></A>&nbsp;&nbsp;Outline of N-Hash.</I>
</P>
<P>One processing stage is given in Figure 18.3. The message block is broken into four 32-bit values. The previous hash value is also broken into four 32-bit values. The function f is given in Figure 18.4. Functions <I>S</I><SUB>0</SUB> and <I>S</I><SUB>1</SUB> are the same as they were in FEAL.</P>
<DL>
<DD><I>S</I><SUB>0</SUB>(<I>a,b</I>) = rotate left two bits ((<I>a &#43; b</I>) mod 256)
<DD><I>S</I><SUB>1</SUB>(<I>a,b</I>) = rotate left two bits ((<I>a</I> &#43; <I>b</I> &#43; 1) mod 256)
</DL>
<P>The output of one processing stage becomes the input to the next processing stage. After the last processing stage, the output is XORed with the <I>M</I><SUB>i</SUB> and <I>H</I><SUB>i-1</SUB>, and then the next block is ready to be hashed.</P>
<P><FONT SIZE="+1"><B><I>Cryptanalysis of N- Hash</I></B></FONT></P>
<P>Bert den Boer discovered a way to produce collisions in the round function of <I>N</I>-Hash [1262]. Biham and Shamir used differential cryptanalysis to break 6-round <I>N</I>-Hash [169, 172]. Their particular attack (there certainly could be others) works for any <I>N</I> that is divisible by 3, and is more efficient than the birthday attack for any <I>N</I> less than 15.</P>
<I><P><A NAME="Fig3"></A><A HREF="javascript:displayWindow('images/18-03.jpg',253,273 )"><IMG SRC="images/18-03t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/18-03.jpg',253,273)"><FONT COLOR="#000077"><B>Figure 18.3</B></FONT></A>&nbsp;&nbsp;One processing stage of</I> N-<I>Hash</I>.
<I></P>
<P><A NAME="Fig4"></A><A HREF="javascript:displayWindow('images/18-04.jpg',182,216 )"><IMG SRC="images/18-04t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/18-04.jpg',182,216)"><FONT COLOR="#000077"><B>Figure 18.4</B></FONT></A>&nbsp;&nbsp;Function f.</I>
</P>
<P>The same attack can find pairs of messages that hash to the same value for 12-round <I>N</I>-Hash in 2<SUP>56</SUP> operations, compared to 2<SUP>64</SUP> operations for a brute-force attack. <I>N</I>-hash with 15 rounds is safe from differential cryptanalysis: The attack requires 2<SUP>72</SUP> operations.</P>
<P>The algorithm&#146;s designers recommend using <I>N</I>-Hash with at least 8 rounds [1106]. Given the proven insecurity of <I>N</I>-Hash and FEAL (and its speed with 8 rounds), I recommend using another algorithm entirely.</P>
<H3><A NAME="Heading5"></A><FONT COLOR="#000077">18.4 MD4</FONT></H3>
<P>MD4 is a one-way hash function designed by Ron Rivest [1318, 1319, 1321]. MD stands for <B>Message Digest</B>; the algorithm produces a 128-bit hash, or message digest, of the input message.</P>
<P>In [1319], Rivest outlined his design goals for the algorithm:</P>
<DL>
<DD><I>Security</I>. It is computationally infeasible to find two messages that hashed to the same value. No attack is more efficient than brute force.
<DD><I>Direct Security</I>. MD4&#146;s security is not based on any assumption, like the difficulty of factoring.
<DD><I>Speed</I>. MD4 is suitable for high-speed software implementations. It is based on a simple set of bit manipulations on 32-bit operands.
<DD><I>Simplicity and Compactness</I>. MD4 is as simple as possible, without large data structures or a complicated program.
<DD><I>Favor Little-Endian Architectures</I>. MD4 is optimized for microprocessor architectures (specifically Intel microprocessors); larger and faster computers make any necessary translations.
</DL>
<P>After the algorithm was first introduced, Bert den Boer and Antoon Bosselaers successfully cryptanalyzed the last two of the algorithm&#146;s three rounds [202]. In an unrelated cryptanalytic result, Ralph Merkle successfully attacked the first two rounds [202]. Eli Biham discussed a differential cryptanalysis attack against the first two rounds of MD4 [159]. Even though these attacks could not be extended to the full algorithm, Rivest strengthened the algorithm. The result is MD5.
</P>
<H3><A NAME="Heading6"></A><FONT COLOR="#000077">18.5 MD5</FONT></H3>
<P>MD5 is an improved version of MD4 [1386, 1322]. Although more complex than MD4, it is similar in design and also produces a 128-bit hash.
</P>
<P><FONT SIZE="+1"><B><I>Description of MD5</I></B></FONT></P>
<P>After some initial processing, MD5 processes the input text in 512-bit blocks, divided into 16 32-bit sub-blocks. The output of the algorithm is a set of four 32-bit blocks, which concatenate to form a single 128-bit hash value.
</P>
<P>First, the message is padded so that its length is just 64 bits short of being a multiple of 512. This padding is a single 1-bit added to the end of the message, followed by as many zeros as are required. Then, a 64-bit representation of the message&#146;s length (before padding bits were added) is appended to the result. These two steps serve to make the message length an exact multiple of 512 bits in length (required for the rest of the algorithm), while ensuring that different messages will not look the same after padding.</P>
<P>Four 32-bit variables are initialized:</P>
<DL>
<DD><I>A</I> = 0x01234567
<DD><I>B</I> = 0x89abcdef
<DD><I>C</I> = 0xfedcba98
<DD><I>D</I> = 0x76543210
</DL>
<P>These are called <B>chaining variables</B>.</P>
<P>Now, the main loop of the algorithm begins. This loop continues for as many 512-bit blocks as are in the message.</P>
<P>The four variables are copied into different variables: <I>a</I> gets <I>A, b</I> gets <I>B, c</I> gets <I>C,</I> and <I>d</I> gets <I>D</I>.</P>
<P>The main loop has four rounds (MD4 had only three rounds), all very similar. Each round uses a different operation 16 times. Each operation performs a nonlinear function on three of <I>a, b, c,</I> and <I>d</I>. Then it adds that result to the fourth variable, a sub-block of the text and a constant. Then it rotates that result to the right a variable number of bits and adds the result to one of <I>a, b, c,</I> or <I>d</I>. Finally the result replaces one of <I>a, b, c,</I> or <I>d</I>. See Figures 18.5 and 18.6.</P>
<I><P><A NAME="Fig5"></A><A HREF="javascript:displayWindow('images/18-05.jpg',356,173 )"><IMG SRC="images/18-05t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/18-05.jpg',356,173)"><FONT COLOR="#000077"><B>Figure 18.5</B></FONT></A>&nbsp;&nbsp;MD5 main loop.</I>
</P>
<P>There are four nonlinear functions, one used in each operation (a different one for each round).
</P>
<DL>
<DD>F(<I>X,Y,Z</I>) = (<I>X</I> &#8869; <I>Y</I>) &#8870; ((&#172; <I>X</I>) &#8869; <I>Z</I>)
<DD>G(<I>X,Y,Z</I>) = (<I>X</I> &#8869; <I>Z</I>) &#172; (<I>Y</I> (&#172; <I>Z</I>))
<DD>H(<I>X,Y,Z</I>) = <I>X</I> &#8853; <I>Y</I> &#8853; <I>Z</I>
<DD>I(<I>X,Y,Z</I>) = <I>Y</I> &#8853; (<I>X</I> &#8870; (&#172; <I>Z</I>))
</DL>
<P>(&#8853; is XOR,&#8869; is AND, &#8870; is OR, and &#172; is NOT.)
</P>
<P>These functions are designed so that if the corresponding bits of <I>X, Y,</I> and <I>Z</I> are independent and unbiased, then each bit of the result will also be independent and unbiased. The function F is the bit-wise conditional: If <I>X</I> then <I>Y</I> else <I>Z</I>. The function H is the bit-wise parity operator.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="18-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="18-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
<!-- all of the reference materials (books) have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- BEGIN SUB FOOTER -->		<br><br>		</TD>    </TR>	</TABLE>			<table width="640" border=0 cellpadding=0 cellspacing=0>		<tr>		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>				<!-- END SUB FOOTER -->
<!-- all of the books have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- FOOTER -->					<td width="515" align="left" bgcolor="#FFFFFF"><font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>		<br><br>				Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p></td>		</tr></table></BODY></HTML><!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
中文字幕制服丝袜成人av| 欧美激情一区二区| 国产天堂亚洲国产碰碰| 亚洲欧美日韩一区| 久久精品国产**网站演员| 成人福利视频网站| 欧美一区二区三区在线观看 | 成人国产免费视频| 欧美三级午夜理伦三级中视频| 久久午夜国产精品| 午夜精品久久久久影视| 成人妖精视频yjsp地址| 欧美不卡视频一区| 精品综合久久久久久8888| 欧美制服丝袜第一页| 国产精品无圣光一区二区| 日韩专区欧美专区| 色婷婷av一区二区三区软件 | 欧美日韩高清在线播放| 国产精品美女www爽爽爽| 久久97超碰国产精品超碰| 欧美日韩成人综合| 一区二区三区国产精华| 色综合欧美在线| 国产精品动漫网站| 成人动漫一区二区| 久久久三级国产网站| 国模无码大尺度一区二区三区| 欧美一区二区私人影院日本| 亚洲国产毛片aaaaa无费看| 色综合色综合色综合| 亚洲欧美日韩中文字幕一区二区三区| 成人午夜视频在线观看| 久久久久青草大香线综合精品| 麻豆精品一二三| 91.成人天堂一区| 日本不卡123| 日韩一区二区视频在线观看| 男男成人高潮片免费网站| 欧美伦理视频网站| 午夜欧美电影在线观看| 欧美日韩国产大片| 日本一道高清亚洲日美韩| 5月丁香婷婷综合| 久久精品理论片| 久久综合九色综合欧美98| 看电影不卡的网站| 国产亚洲福利社区一区| 国产成人在线影院| 国产精品国产三级国产有无不卡 | 亚洲卡通动漫在线| 91原创在线视频| 亚洲一区二区高清| 91精品国模一区二区三区| 日韩精品色哟哟| 亚洲一二三四在线| 欧美日韩免费观看一区三区| 久久精品国产精品亚洲综合| 亚洲精品一区二区在线观看| 高清成人免费视频| 亚洲精品国产无天堂网2021 | 成人avav影音| 一级中文字幕一区二区| 日韩一区二区在线观看| 丁香网亚洲国际| 午夜影视日本亚洲欧洲精品| 精品国产髙清在线看国产毛片 | 久久福利视频一区二区| 中文字幕第一区第二区| 色诱视频网站一区| 免费观看一级特黄欧美大片| 久久久久久**毛片大全| 色婷婷久久久综合中文字幕| 久久精品久久99精品久久| 国产精品久久三区| 91精品国产黑色紧身裤美女| 99久久免费国产| 美女网站在线免费欧美精品| 亚洲视频1区2区| 精品欧美一区二区在线观看| 91福利在线观看| 国产精品综合av一区二区国产馆| 亚洲一区二区视频在线| 久久久国产精品午夜一区ai换脸| 欧美亚洲动漫另类| 国产成人av一区二区三区在线| 天天操天天色综合| 国产欧美精品国产国产专区| 欧美一区国产二区| 成人国产一区二区三区精品| 久久99精品久久久久久动态图| 亚洲一区二区三区四区在线观看| 欧美激情中文字幕一区二区| 日韩一区二区在线观看| 欧美午夜一区二区三区免费大片| 欧美日韩视频专区在线播放| 99v久久综合狠狠综合久久| 美国十次了思思久久精品导航| 一区二区不卡在线播放 | 国产三级欧美三级| 欧美人与z0zoxxxx视频| 91碰在线视频| 成人免费观看av| 国产激情视频一区二区三区欧美 | 毛片一区二区三区| 亚洲一区二区三区国产| 日韩毛片视频在线看| 久久夜色精品国产欧美乱极品| 欧美性受xxxx黑人xyx性爽| 91在线无精精品入口| jiyouzz国产精品久久| 国产精品系列在线播放| 国产一区二区免费在线| 久久国产精品99精品国产 | 欧美亚洲一区二区在线| 一本到不卡免费一区二区| av成人免费在线| 91丨porny丨户外露出| 99在线热播精品免费| 成人成人成人在线视频| 国产91富婆露脸刺激对白| 色av综合在线| 日本乱码高清不卡字幕| 日本高清成人免费播放| 91久久精品网| 日本乱码高清不卡字幕| 色94色欧美sute亚洲线路一ni| av一区二区久久| 99视频精品免费视频| 色综合视频在线观看| 欧美午夜精品久久久久久超碰 | 中文字幕一区二区三区精华液 | 成人一区二区三区视频在线观看| 国产精品原创巨作av| 成人一区在线看| 色噜噜夜夜夜综合网| 欧美性受xxxx| 欧美成人性战久久| 国产视频在线观看一区二区三区| 亚洲欧洲一区二区三区| 一区二区三区美女| 日韩经典一区二区| 国产精一品亚洲二区在线视频| 成人av在线一区二区三区| 一本到不卡精品视频在线观看| 欧美人妖巨大在线| 久久久久久久综合色一本| 亚洲欧美日韩综合aⅴ视频| 丝袜亚洲另类欧美| 国产毛片精品一区| 91碰在线视频| 精品国产一区二区精华| 亚洲欧美一区二区久久| 蜜桃一区二区三区四区| 成a人片国产精品| 欧美精品vⅰdeose4hd| 国产日产精品一区| 亚洲一区二区三区中文字幕在线| 麻豆成人在线观看| 91视频观看视频| 精品国产三级电影在线观看| 一区二区三区.www| 国产在线国偷精品产拍免费yy| 色哟哟精品一区| 欧美不卡123| 亚洲亚洲人成综合网络| 国产美女在线观看一区| 51精品秘密在线观看| 亚洲欧洲日韩综合一区二区| 日本大胆欧美人术艺术动态| 91偷拍与自偷拍精品| 精品免费99久久| 午夜视频在线观看一区| 成人aaaa免费全部观看| 久久久久久久久久久电影| 亚洲电影一区二区三区| 成人app软件下载大全免费| 精品久久久三级丝袜| 亚洲国产日韩一区二区| 成人av在线影院| 久久久久久日产精品| 日产国产高清一区二区三区| 欧美性做爰猛烈叫床潮| 中文字幕制服丝袜一区二区三区 | 日韩电影一区二区三区| 91免费在线视频观看| 亚洲国产高清在线| 麻豆成人91精品二区三区| 欧美日韩国产首页| 亚洲小说春色综合另类电影| 91麻豆免费看片| 国产精品麻豆视频| 国产成人av电影免费在线观看| 欧美成人a视频| 色屁屁一区二区| 亚洲天堂2016| 色综合亚洲欧洲| 亚洲欧美激情插| 欧美亚洲国产bt| 亚洲国产成人av网|