亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 02-01.html

?? 密碼理論c語言
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Protocol Building Blocks</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=02//-->
<!--PAGES=021-023//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch01/01-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2 ALIGN="CENTER"><FONT COLOR="#000077"><I>Part I<BR>Cryptographic protocols
</I></FONT></H2>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Chapter 2<BR>Protocol Building Blocks
</FONT></H2>
<H3><A NAME="Heading2"></A><FONT COLOR="#000077">2.1 Introduction to Protocols</FONT></H3>
<P>The whole point of cryptography is to solve problems. (Actually, that&#146;s the whole point of computers&#151;something many people tend to forget.) Cryptography solves problems that involve secrecy, authentication, integrity, and dishonest people. You can learn all about cryptographic algorithms and techniques, but these are academic unless they can solve a problem. This is why we are going to look at protocols first.
</P>
<P>A <B>protocol</B> is a series of steps, involving two or more parties, designed to accomplish a task. This is an important definition. A &#147;series of steps&#148; means that the protocol has a sequence, from start to finish. Every step must be executed in turn, and no step can be taken before the previous step is finished. &#147;Involving two or more parties&#148; means that at least two people are required to complete the protocol; one person alone does not make a protocol. A person alone can perform a series of steps to accomplish a task (like baking a cake), but this is not a protocol. (Someone else must eat the cake to make it a protocol.) Finally, &#147;designed to accomplish a task&#148; means that the protocol must achieve something. Something that looks like a protocol but does not accomplish a task is not a protocol&#151;it&#146;s a waste of time.</P>
<P>Protocols have other characteristics as well:</P>
<DL>
<DD>&#151; Everyone involved in the protocol must know the protocol and all of the steps to follow in advance.
<DD>&#151; Everyone involved in the protocol must agree to follow it.
<DD>&#151; The protocol must be unambiguous; each step must be well defined and there must be no chance of a misunderstanding.
<DD>&#151; The protocol must be complete; there must be a specified action for every possible situation.
</DL>
<P>The protocols in this book are organized as a series of steps. Execution of the protocol proceeds linearly through the steps, unless there are instructions to branch to another step. Each step involves at least one of two things: computations by one or more of the parties, or messages sent among the parties.
</P>
<P>A <B>cryptographic protocol</B> is a protocol that uses cryptography. The parties can be friends and trust each other implicitly or they can be adversaries and not trust one another to give the correct time of day. A cryptographic protocol involves some cryptographic algorithm, but generally the goal of the protocol is something beyond simple secrecy. The parties participating in the protocol might want to share parts of their secrets to compute a value, jointly generate a random sequence, convince one another of their identity, or simultaneously sign a contract. The whole point of using cryptography in a protocol is to prevent or detect eavesdropping and cheating. If you have never seen these protocols before, they will radically change your ideas of what mutually distrustful parties can accomplish over a computer network. In general, this can be stated as:</P>
<DL>
<DD>&#151; It should not be possible to do more or learn more than what is specified in the protocol.
</DL>
<P>This is a lot harder than it looks. In the next few chapters I discuss a lot of protocols. In some of them it is possible for one of the participants to cheat the other. In others, it is possible for an eavesdropper to subvert the protocol or learn secret information. Some protocols fail because the designers weren&#146;t thorough enough in their requirements definitions. Others fail because their designers weren&#146;t thorough enough in their analysis. Like algorithms, it is much easier to prove insecurity than it is to prove security.
</P>
<P><FONT SIZE="+1"><B><I>The Purpose of Protocols</I></B></FONT></P>
<P>In daily life, there are informal protocols for almost everything: ordering goods over the telephone, playing poker, voting in an election. No one thinks much about these protocols; they have evolved over time, everyone knows how to use them, and they work reasonably well.
</P>
<P>These days, more and more human interaction takes place over computer networks instead of face-to-face. Computers need formal protocols to do the same things that people do without thinking. If you moved from one state to another and found a voting booth that looked completely different from the ones you were used to, you could easily adapt. Computers are not nearly so flexible.</P>
<P>Many face-to-face protocols rely on people&#146;s presence to ensure fairness and security. Would you send a stranger a pile of cash to buy groceries for you? Would you play poker with someone if you couldn&#146;t see him shuffle and deal? Would you mail the government your secret ballot without some assurance of anonymity?</P>
<P>It is na&#239;ve to assume that people on computer networks are honest. It is na&#239;ve to assume that the managers of computer networks are honest. It is even na&#239;ve to assume that the designers of computer networks are honest. Most are, but the dishonest few can do a lot of damage. By formalizing protocols, we can examine ways in which dishonest parties can subvert them. Then we can develop protocols that are immune to that subversion.</P>
<P>In addition to formalizing behavior, protocols abstract the process of accomplishing a task from the mechanism by which the task is accomplished. A communications protocol is the same whether implemented on PCs or VAXs. We can examine the protocol without getting bogged down in the implementation details. When we are convinced we have a good protocol, we can implement it in everything from computers to telephones to intelligent muffin toasters.</P>
<P><FONT SIZE="+1"><B><I>The Players</I></B></FONT></P>
<P>To help demonstrate protocols, I have enlisted the aid of several people (see Table 2.1). Alice and Bob are the first two. They will perform all general two-person protocols. As a rule, Alice will initiate all protocols and Bob will respond. If the protocol requires a third or fourth person, Carol and Dave will perform those roles. Other actors will play specialized supporting roles; they will be introduced later.
</P>
<P><FONT SIZE="+1"><B><I>Arbitrated Protocols</I></B></FONT></P>
<P>An <B>arbitrator</B> is a disinterested third party trusted to complete a protocol (see Figure 2.1a). Disinterested means that the arbitrator has no vested interest in the protocol and no particular allegiance to any of the parties involved. Trusted means that all people involved in the protocol accept what he says as true, what he does as correct, and that he will complete his part of the protocol. Arbitrators can help complete protocols between two mutually distrustful parties.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch01/01-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美精品久久久久久久多人混战| 国产乱人伦精品一区二区在线观看| 国产日韩影视精品| 精品少妇一区二区三区视频免付费| 欧美三区在线观看| 欧美精品日日鲁夜夜添| 这里只有精品免费| 欧美一级免费大片| 2020国产精品久久精品美国| 精品国产免费一区二区三区香蕉| 久久久久久日产精品| 欧美—级在线免费片| 亚洲日本免费电影| 亚洲福利一二三区| 国产一区二区中文字幕| 国产91丝袜在线播放九色| 成人动漫av在线| 欧美日韩一区在线观看| 日韩你懂的在线播放| 国产日产欧美精品一区二区三区| 日韩一区在线播放| 五月婷婷综合在线| 国产一区二区三区不卡在线观看| 国产成人精品影视| 色八戒一区二区三区| 在线电影国产精品| 国产精品午夜免费| 亚洲va国产va欧美va观看| 激情国产一区二区| 色综合中文字幕| 日韩天堂在线观看| 亚洲欧美偷拍另类a∨色屁股| 天天免费综合色| 成人黄色a**站在线观看| 欧美性受xxxx黑人xyx性爽| 欧美电影免费观看高清完整版在线 | 91免费在线视频观看| 欧美麻豆精品久久久久久| 久久蜜桃av一区精品变态类天堂| 亚洲免费观看高清完整版在线 | 久久久一区二区三区| 一区二区欧美精品| 国产一区二区三区在线看麻豆| 91一区二区在线| 精品久久久久久久一区二区蜜臀| 一区二区三区在线免费视频| 狠狠狠色丁香婷婷综合激情| 欧美午夜不卡视频| 国产精品视频看| 美女www一区二区| 色老头久久综合| 国产欧美一区二区三区网站| 免费成人av资源网| 欧洲国内综合视频| 亚洲麻豆国产自偷在线| 懂色中文一区二区在线播放| 精品国产自在久精品国产| 日韩激情在线观看| 欧美日韩在线直播| 亚洲在线成人精品| 91成人免费在线视频| 亚洲色图视频网| 99视频精品全部免费在线| 久久久久久久久97黄色工厂| 国产一区二区中文字幕| 精品免费一区二区三区| 日本美女一区二区三区视频| 欧美日韩国产经典色站一区二区三区 | 亚洲高清三级视频| 在线日韩一区二区| 亚洲综合男人的天堂| 不卡一区二区三区四区| 国产精品卡一卡二| 成人av在线资源| 亚洲视频1区2区| 色综合色狠狠综合色| 亚洲免费伊人电影| 欧美性猛片aaaaaaa做受| 一区二区三区在线视频免费| 欧美伊人久久久久久久久影院 | 亚洲国产视频在线| 欧美美女喷水视频| 经典三级一区二区| 久久久久88色偷偷免费| 成人午夜激情影院| 亚洲人成在线播放网站岛国 | 成人黄色在线视频| 亚洲欧洲精品天堂一级 | 国产 日韩 欧美大片| 国产精品美女久久久久久| 91免费观看视频在线| 亚洲图片欧美综合| 精品国内二区三区| 99久久精品情趣| 亚洲国产日产av| 日韩一区二区三区视频| 国产老妇另类xxxxx| 亚洲欧洲www| 欧美日韩视频在线第一区| 久草精品在线观看| 中文字幕五月欧美| 日韩欧美亚洲另类制服综合在线| 国产乱码精品一品二品| 亚洲三级电影网站| 日韩欧美区一区二| 色婷婷av一区二区三区大白胸 | 日av在线不卡| 亚洲国产精品精华液ab| 欧美日韩一区二区三区四区五区 | 国内精品国产成人| 1区2区3区欧美| 欧美一区二区三区人| 岛国一区二区三区| 日韩专区中文字幕一区二区| 国产欧美日韩麻豆91| 精品视频1区2区| aaa欧美色吧激情视频| 日本欧美久久久久免费播放网| 国产精品进线69影院| 日韩欧美国产不卡| 色噜噜狠狠一区二区三区果冻| 国产一区二区三区| 亚洲成av人片观看| 《视频一区视频二区| 久久伊人蜜桃av一区二区| 91麻豆精品国产无毒不卡在线观看| 懂色av中文字幕一区二区三区 | 91精品国产91久久久久久一区二区| 国产二区国产一区在线观看| 五月婷婷另类国产| 亚洲美女屁股眼交3| 国产精品乱码一区二区三区软件| 欧美电视剧免费全集观看| 欧美系列一区二区| 色哟哟一区二区三区| 成人免费毛片aaaaa**| 久久精品国产久精国产爱| 亚洲va在线va天堂| 亚洲综合在线电影| 成人欧美一区二区三区黑人麻豆| 国产亚洲综合av| 久久青草欧美一区二区三区| 欧美一区二区三区免费在线看| 欧美日韩aaaaaa| 欧美色爱综合网| 欧美日韩成人综合在线一区二区| 在线免费观看一区| 在线中文字幕一区| 欧洲一区二区av| 欧美午夜理伦三级在线观看| 91九色最新地址| 欧美日韩国产首页| 日韩一级二级三级精品视频| 欧美日本一区二区| 日韩欧美第一区| 久久人人超碰精品| 国产精品久久久久永久免费观看 | 99麻豆久久久国产精品免费优播| 成人黄色大片在线观看| 99在线精品观看| 欧美在线一区二区| 欧美一级高清片| 久久综合色天天久久综合图片| 国产午夜精品福利| 亚洲裸体在线观看| 亚洲va欧美va天堂v国产综合| 三级精品在线观看| 国产乱子伦一区二区三区国色天香| 国产一区激情在线| 一本一本大道香蕉久在线精品 | 99久久99久久久精品齐齐| 91浏览器在线视频| 欧美二区三区的天堂| 久久色在线观看| 中文字幕在线视频一区| 伊人开心综合网| 久久99热99| 一本大道综合伊人精品热热| 欧美日韩精品福利| 国产午夜精品久久| 亚洲国产cao| 国产美女视频91| 欧美在线免费视屏| 欧美精品一区二区三| 亚洲欧美视频在线观看| 日韩精品一二三四| av爱爱亚洲一区| 精品久久五月天| 亚洲午夜激情av| 国产91丝袜在线播放九色| 欧美高清性hdvideosex| 国产色一区二区| 日本大胆欧美人术艺术动态| 成人教育av在线| 精品久久久久久亚洲综合网| 依依成人精品视频| 成人小视频在线| 日韩亚洲欧美综合| 亚洲综合色区另类av| 成人的网站免费观看|