亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 18-04.html

?? Wiley - Applied Cryptography, Protocols, Algorthms, and Source Code in C
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
<!-- PUB PARTNERS END --><!-- END LEFT NAV --><td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td><td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td><!-- end of ITK left NAV --><!-- begin main content --><td width="100%" valign="top" align="left"><!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471128457/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=18//-->
<!--PAGES=442-445//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="18-03.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="18-05.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading8"></A><FONT COLOR="#000077">18.7 Secure Hash Algorithm (SHA)</FONT></H3>
<P>NIST, along with the NSA, designed the Secure Hash Algorithm (SHA) for use with the Digital Signature Standard (see Section 20.2) [1154]. (The standard is the Secure Hash Standard (SHS); SHA is the algorithm used in the standard.) According to the <I>Federal Register</I> [539]:</P>
<BLOCKQUOTE><P>A Federal Information Processing Standard (FIPS) for Secure Hash Standard (SHS) is being proposed. This proposed standard specified a Secure Hash Algorithm (SHA) for use with the proposed Digital Signature Standard .... Additionally, for applications not requiring a digital signature, the SHA is to be used whenever a secure hash algorithm is required for Federal applications.
</P>
</BLOCKQUOTE><P>And
</P>
<BLOCKQUOTE><P>This Standard specifies a Secure Hash Algorithm (SHA), which is necessary to ensure the security of the Digital Signature Algorithm (DSA). When a message of any length &lt 264 bits is input, the SHA produces a 160-bit output called a message digest. The message digest is then input to the DSA, which computes the signature for the message. Signing the message digest rather than the message often improves the efficiency of the process, because the message digest is usually much smaller than the message. The same message digest should be obtained by the verifier of the signature when the received version of the message is used as input to SHA. The SHA is called secure because it is designed to be computationally infeasible to recover a message corresponding to a given message digest, or to find two different messages which produce the same message digest. Any change to a message in transit will, with a very high probability, result in a different message digest, and the signature will fail to verify. The SHA is based on principles similar to those used by Professor Ronald L. Rivest of MIT when designing the MD4 message digest algorithm [1319], and is closely modelled after that algorithm.
</P>
</BLOCKQUOTE><P>SHA produces a 160-bit hash, longer than MD5.
</P>
<P><FONT SIZE="+1"><B><I>Description of SHA</I></B></FONT></P>
<P>First, the message is padded to make it a multiple of 512 bits long. Padding is exactly the same as in MD5: First append a one, then as many zeros as necessary to make it 64 bits short of a multiple of 512, and finally a 64-bit representation of the length of the message before padding.
</P>
<P>Five 32-bit variables (MD5 has four variables, but this algorithm needs to produce a 160-bit hash) are initialized as follows:</P>
<DL>
<DD><I>A</I> = 0x67452301
<DD><I>B</I> = 0xefcdab89
<DD><I>C</I> = 0x98badcfe
<DD><I>D</I> = 0x10325476
<DD><I>E</I> = 0xc3d2e1f0
</DL>
<P>The main loop of the algorithm then begins. It processes the message 512 bits at a time and continues for as many 512-bit blocks as are in the message.
</P>
<P>First the five variables are copied into different variables: <I>a</I> gets <I>A, b</I> gets <I>B, c</I> gets <I>C, d</I> gets <I>D,</I> and <I>e</I> gets <I>E</I>.</P>
<P>The main loop has four rounds of 20 operations each (MD5 has four rounds of 16 operations each). Each operation performs a nonlinear function on three of <I>a, b, c, d,</I> and <I>e,</I> and then does shifting and adding similar to MD5.</P>
<P>SHA&#146;s set of nonlinear functions is:</P>
<DL>
<DD><I>f</I><SUB>t</SUB>(<I>X,Y,Z</I> ) = (<I>X</I>&#8869; <I>Y</I>) &#8870; ((&#172; X )&#8869; <I>Z</I>), for <I>t</I> = 0 to 19.
<DD><I>f</I><SUB>t</SUB> (<I>X,Y,Z</I> ) = <I>X</I> &#8853; <I>Y</I> &#8853; <I>Z</I>, for <I>t</I> = 20 to 39.
<DD><I>f</I><SUB>t</SUB> (<I>X,Y,Z</I> ) = (<I>X</I>&#8869; <I>Y</I> ) &#8870; (<I>X</I>&#8869; <I>Z</I>) &#8870; (<I>Y</I>&#8869; <I>Z</I>), for <I>t</I> = 40 to 59.
<DD><I>ft</I> (<I>X,Y,Z</I> ) = <I>X</I> &#8853; <I>Y</I> &#8853; <I>Z</I>, for <I>t</I> = 60 to 79.
</DL>
<P>Four constants are used in the algorithm:
</P>
<DL>
<DD><I>K</I><SUB>t</SUB> = 0x5a827999, for <I>t</I> = 0 to 19.
<DD><I>K</I><SUB>t</SUB> = 0x6ed9eba1, for <I>t</I> = 20 to 39.
<DD><I>K</I><SUB>t</SUB> = 0x8f1bbcdc, for <I>t</I> = 40 to 59.
<DD><I>K</I><SUB>t</SUB> = 0xca62c1d6, for <I>t</I> = 60 to 79.
</DL>
<P>(If you wonder where those numbers came from: 0x5a827999 = 2<SUP>1/2</SUP> /4, 0x6ed9eba1 = 3<SUP>1/2</SUP> /4, 0x8f1bbcdc = 5<SUP>1/2</SUP> /4, and 0xca62c1d6 = 10<SUP>1/2</SUP> /4; all times 2<SUP>32</SUP>.)</P>
<P>The message block is transformed from 16 32-bit words (<I>M</I><SUB>0</SUB> to <I>M</I><SUB>15</SUB> ) to 80 32-bit words (<I>W</I><SUB>0</SUB> to <I>W</I><SUB>79</SUB>) using the following algorithm:</P>
<DL>
<DD><I>W</I><SUB>t</SUB> = <I>M</I><SUB>t</SUB>, for <I>t</I> = 0 to 15
<DD><I>W</I><SUB>t</SUB> = (<I>W</I><SUB>t- 3</SUB> &#8853; <I>W</I><SUB>t - 8</SUB> &#8853; <I>W</I><SUB>t - 14</SUB> &#8853; <I>W</I><SUB>t - 16</SUB> ) &lt&lt&lt 1, for <I>t</I> = 16 to 79.
</DL>
<P>(As an interesting aside, the original SHA specification did not have the left circular shift. The change &#147;corrects a technical flaw that made the standard less secure than had been thought&#148; [543]. The NSA has refused to elaborate on the exact nature of the flaw.)
</P>
<P>If <I>t</I> is the operation number (from 0 to 79), <I>W</I><SUB>t</SUB> represents the <I>t</I> th sub-block of the expanded message, and &lt&lt&lt <I>s</I> represents a left circular shift of <I>s</I> bits, then the main loop looks like:</P>
<DL>
<DD>FOR <I>t</I> = 0 to 79
<DL>
<DD><I>TEMP</I> = (<I>a</I> &lt&lt&lt 5) &#43; <I>f</I><SUB>t</SUB> (<I>b,c,d</I>) &#43; <I>e</I> &#43; <I>W</I><SUB>t</SUB> &#43; <I>K</I><SUB>t</SUB>
<DD><I>e</I> = <I>d</I>
<DD><I>d</I> = <I>c</I>
<DD><I>c</I> = <I>b</I> &lt&lt&lt 30
<DD><I>b</I> = <I>a</I>
<DD><I>a</I> = <I>TEMP</I>
</DL>
</DL>
<I><P><A NAME="Fig7"></A><A HREF="javascript:displayWindow('images/18-07.jpg',231,256 )"><IMG SRC="images/18-07t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/18-07.jpg',231,256)"><FONT COLOR="#000077"><B>Figure 18.7</B></FONT></A>&nbsp;&nbsp;One SHA operation.</I>
</P>
<P>Figure 18.7 shows one operation. Shifting the variables accomplishes the same thing as MD5 does by using different variables in different locations.
</P>
<P>After all of this, <I>a, b, c, d,</I> and <I>e</I> are added to <I>A, B, C, D,</I> and <I>E</I> respectively, and the algorithm continues with the next block of data. The final output is the concatenation of <I>A, B, C, D,</I> and <I>E</I>.</P>
<P><FONT SIZE="+1"><B><I>Security of SHA</I></B></FONT></P>
<P>SHA is very similar to MD4, but has a 160-bit hash value. The main changes are the addition of an expand transformation and the addition of the previous step&#146;s output into the next step for a faster avalanche effect. Ron Rivest made public the design decisions behind MD5, but SHA&#146;s designers did not. Here are Rivest&#146;s MD5 improvements to MD4 and how they compare with SHA&#146;s:
</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;&#147;A fourth round has been added.&#148; SHA does this, too. However, in SHA the fourth round uses the same f function as the second round.
<DD><B>2.</B>&nbsp;&nbsp;&#147;Each step now has a unique additive constant.&#148; SHA keeps the MD4 scheme where it reuses the constants for each group of 20 rounds.
<DD><B>3.</B>&nbsp;&nbsp;&#147;The function G in round 2 was changed from ((<I>X</I>&#8869; <I>Y</I>) &#8870; (<I>X</I>&#8869; <I>Z</I>) &#8870; (<I>Y</I>&#8869; <I>Z</I>)) to ((<I>X</I>&#8869; <I>Z</I>) &#8870; (<I>Y</I>&#8869; &#172; (<I>Z</I>))) to make <I>G</I> less symmetric.&#148; SHA uses the MD4 version: ((<I>X</I>&#8869; <I>Y</I>) &#8870; (<I>X</I>&#8869; <I>Z</I>) &#8870; (<I>Y</I>&#8869; <I>Z</I>)).
<DD><B>4.</B>&nbsp;&nbsp;&#147;Each step now adds in the result of the previous step. This promotes a faster avalanche effect.&#148; This change has been made in SHA as well. The difference in SHA is that a fifth variable is added, and not <I>b, c,</I> or <I>d,</I> which is already used in <I>f</I><SUB>t</SUB>. This subtle change makes the den Boer-Bosselaers attack against MD5 impossible against SHA.
<DD><B>5.</B>&nbsp;&nbsp;&#147;The order in which message sub-blocks are accessed in rounds 2 and 3 is changed, to make these patterns less alike.&#148; SHA is completely different, since it uses a cyclic error-correcting code.
<DD><B>6.</B>&nbsp;&nbsp;&#147;The left circular shift amounts in each round have been approximately optimized, to yield a faster avalanche effect. The four shifts used in each round are different from the ones used in other rounds.&#148; SHA uses a constant shift amount in each round. This shift amount is relatively prime to the word size, as in MD4.
</DL>
<P>This leads to the following comparison: SHA is MD4 with the addition of an expand transformation, an extra round, and better avalanche effect; MD5 is MD4 with improved bit hashing, an extra round, and better avalanche effect.
</P>
<P>There are no known cryptographic attacks against SHA. Because it produces a 160-bit hash, it is more resistant to brute-force attacks (including birthday attacks) than 128-bit hash functions covered in this chapter.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="18-03.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="18-05.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
<!-- all of the reference materials (books) have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- BEGIN SUB FOOTER -->		<br><br>		</TD>    </TR>	</TABLE>			<table width="640" border=0 cellpadding=0 cellspacing=0>		<tr>		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>				<!-- END SUB FOOTER -->
<!-- all of the books have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- FOOTER -->					<td width="515" align="left" bgcolor="#FFFFFF"><font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>		<br><br>				Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p></td>		</tr></table></BODY></HTML><!-- END FOOTER -->

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美一区二区精品| 91在线视频播放地址| 日韩欧美一区二区免费| 日韩高清一区二区| 欧美一级欧美一级在线播放| 三级欧美在线一区| 日韩女同互慰一区二区| 九色综合狠狠综合久久| 国产女人18毛片水真多成人如厕 | 成人自拍视频在线| 国产精品理论片| 欧美亚洲国产bt| 日韩精品乱码免费| 久久久美女艺术照精彩视频福利播放| 国产成人精品亚洲午夜麻豆| 中文字幕一区二区在线观看| 欧美色国产精品| 久久不见久久见免费视频1| 欧美精品一区二区三区在线| 欧美tickling挠脚心丨vk| 国产成人鲁色资源国产91色综| 最新国产の精品合集bt伙计| 欧美精品一二三| 国产99久久久国产精品免费看| 亚洲美女偷拍久久| 日韩精品一区二区三区四区视频| 成人激情午夜影院| 午夜影视日本亚洲欧洲精品| 久久亚洲二区三区| 在线亚洲高清视频| 国产传媒一区在线| 亚洲电影第三页| 亚洲国产精品成人综合色在线婷婷| 色综合天天综合网天天看片 | 久久精品国产网站| 亚洲图片另类小说| 精品三级在线观看| 在线观看视频一区二区欧美日韩| 久久国产免费看| 一区二区三区中文字幕在线观看| 日韩三级伦理片妻子的秘密按摩| 91天堂素人约啪| 久久电影网电视剧免费观看| 亚洲永久免费av| 国产欧美日韩在线看| 91麻豆精品国产91久久久久久久久| 高清国产一区二区三区| 视频一区二区三区中文字幕| 综合久久给合久久狠狠狠97色| 日韩精品一区在线观看| 欧美午夜精品免费| av在线播放成人| 国产一区二区三区久久悠悠色av | 国产精品毛片大码女人| 91精品国产综合久久久久久| 色综合久久综合网97色综合| 国产不卡视频在线观看| 美女尤物国产一区| 天天色综合成人网| 一区二区三区日韩在线观看| 国产精品久久99| 国产色产综合色产在线视频| 欧美一级精品大片| 欧美精选午夜久久久乱码6080| 92国产精品观看| 99久久免费国产| youjizz国产精品| 高清在线观看日韩| 国产v日产∨综合v精品视频| 激情综合色综合久久| 免费成人深夜小野草| 五月婷婷欧美视频| 日韩av一区二| 蜜臀久久久久久久| 日韩精品久久久久久| 五月激情综合网| 婷婷成人激情在线网| 五月婷婷激情综合| 日韩精品成人一区二区三区| 天堂一区二区在线免费观看| 亚洲一二三四区不卡| 亚洲国产另类av| 日韩中文字幕一区二区三区| 午夜精品一区二区三区三上悠亚 | 青青国产91久久久久久 | 亚洲精品欧美激情| 亚洲专区一二三| 亚洲不卡一区二区三区| 五月激情丁香一区二区三区| 日本中文字幕不卡| 久草这里只有精品视频| 国产精品一二一区| 不卡的av网站| 九色综合狠狠综合久久| 国产精品69毛片高清亚洲| 成人一区二区在线观看| 色婷婷亚洲综合| 欧美精选一区二区| 久久久精品中文字幕麻豆发布| 国产色综合久久| 一区二区三区成人| 日本美女一区二区三区| 国内精品视频666| 成人91在线观看| 欧美日韩午夜影院| 久久久久久久精| 亚洲人成人一区二区在线观看| 亚洲国产视频直播| 久久国产生活片100| 成人做爰69片免费看网站| 色先锋资源久久综合| 4438x成人网最大色成网站| 久久久久久99精品| 亚洲综合视频网| 精品亚洲成a人| 91在线无精精品入口| 欧美乱妇20p| 国产精品萝li| 亚洲va天堂va国产va久| 国产高清不卡二三区| 色婷婷久久久亚洲一区二区三区 | 成人久久18免费网站麻豆| 欧洲视频一区二区| 久久人人爽爽爽人久久久| 一区二区三区在线观看动漫| 久久精品免费观看| 91国偷自产一区二区使用方法| 日韩色视频在线观看| 亚洲日本在线看| 激情综合色丁香一区二区| 欧洲av一区二区嗯嗯嗯啊| 国产亚洲欧美日韩在线一区| 午夜久久福利影院| 91浏览器在线视频| 久久中文娱乐网| 天天影视涩香欲综合网| 一本大道久久精品懂色aⅴ| 久久综合精品国产一区二区三区| 亚洲国产一区二区a毛片| youjizz久久| 国产午夜精品在线观看| 秋霞av亚洲一区二区三| 欧美综合一区二区| 中文字幕在线观看一区二区| 激情欧美日韩一区二区| 欧美日韩成人综合在线一区二区| 中文字幕一区二区在线观看| 国产精品91xxx| 26uuu精品一区二区| 日本美女视频一区二区| 777午夜精品免费视频| 亚洲精品成人天堂一二三| 处破女av一区二区| 国产欧美精品区一区二区三区| 免费成人在线视频观看| 在线电影一区二区三区| 亚洲成人你懂的| 欧美无乱码久久久免费午夜一区| 国产精品国产自产拍高清av王其| 国产激情精品久久久第一区二区 | 国产福利91精品| 精品久久久久久久人人人人传媒 | 一区二区三区在线观看视频| 97se亚洲国产综合在线| 自拍视频在线观看一区二区| 成人h版在线观看| 国产精品久线观看视频| 不卡大黄网站免费看| 国产精品你懂的在线| 粉嫩av一区二区三区粉嫩| 欧美国产精品一区| 成人动漫av在线| 日韩码欧中文字| 色综合久久久久综合体桃花网| 亚洲色大成网站www久久九九| 99精品视频在线观看免费| 中文字幕一区av| 色激情天天射综合网| 亚洲一区二区欧美日韩| 欧美性受xxxx黑人xyx| 天堂一区二区在线| 日韩精品一区二区三区视频在线观看| 麻豆成人在线观看| 欧美sm美女调教| 成人性生交大片免费看在线播放| 国产精品欧美久久久久一区二区| av一区二区三区| 亚洲一区二区在线播放相泽| 欧美精品在线一区二区三区| 另类小说综合欧美亚洲| 国产欧美精品一区二区色综合朱莉| 成人一区二区视频| 亚洲国产美女搞黄色| 在线成人免费观看| 日韩一区二区三区视频在线观看| 精品夜夜嗨av一区二区三区| 国产精品国产三级国产a| 欧美在线啊v一区| 精品一区二区三区欧美| 国产精品色一区二区三区|