亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 02-03.html

?? 密碼理論c語言
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Protocol Building Blocks</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=02//-->
<!--PAGES=026-028//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="02-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>The difference between an adjudicator and an arbitrator (as used in this book) is that the adjudicator is not always necessary. In a dispute, a judge is called in to adjudicate. If there is no dispute, using a judge is unnecessary.
</P>
<P>There are adjudicated computer protocols. These protocols rely on the parties to be honest; but if someone suspects cheating, a body of data exists so that a trusted third party could determine if someone cheated. In a good adjudicated protocol, the adjudicator could also determine the cheater&#146;s identity. Instead of preventing cheating, adjudicated protocols detect cheating. The inevitability of detection acts as a preventive and discourages cheating.</P>
<P><FONT SIZE="+1"><B><I>Self-Enforcing Protocols</I></B></FONT></P>
<P>A <B>self-enforcing protocol</B> is the best type of protocol. The protocol itself guarantees fairness (see Figure 2.1c). No arbitrator is required to complete the protocol. No adjudicator is required to resolve disputes. The protocol is constructed so that there cannot be any disputes. If one of the parties tries to cheat, the other party immediately detects the cheating and the protocol stops. Whatever the cheating party hoped would happen by cheating, doesn&#146;t happen.</P>
<P>In the best of all possible worlds, every protocol would be self-enforcing. Unfortunately, there is not a self-enforcing protocol for every situation.</P>
<P><FONT SIZE="+1"><B><I>Attacks against Protocols</I></B></FONT></P>
<P>Cryptographic attacks can be directed against the cryptographic algorithms used in protocols, against the cryptographic techniques used to implement the algorithms and protocols, or against the protocols themselves. Since this section of the book discusses protocols, I will assume that the cryptographic algorithms and techniques are secure. I will only examine attacks against the protocols.
</P>
<P>People can try various ways to attack a protocol. Someone not involved in the protocol can eavesdrop on some or all of the protocol. This is called a <B>passive attack</B>, because the attacker does not affect the protocol. All he can do is observe the protocol and attempt to gain information. This kind of attack corresponds to a ciphertext-only attack, as discussed in Section 1.1. Since passive attacks are difficult to detect, protocols try to prevent passive attacks rather than detect them. In these protocols, the part of the eavesdropper will be played by Eve.</P>
<P>Alternatively, an attacker could try to alter the protocol to his own advantage. He could pretend to be someone else, introduce new messages in the protocol, delete existing messages, substitute one message for another, replay old messages, interrupt a communications channel, or alter stored information in a computer. These are called <B>active attacks</B>, because they require active intervention. The form of these attacks depends on the network.</P>
<P>Passive attackers try to gain information about the parties involved in the protocol. They collect messages passing among various parties and attempt to cryptanalyze them. Active attacks, on the other hand, can have much more diverse objectives. The attacker could be interested in obtaining information, degrading system performance, corrupting existing information, or gaining unauthorized access to resources.</P>
<P>Active attacks are much more serious, especially in protocols in which the different parties don&#146;t necessarily trust one another. The attacker does not have to be a complete outsider. He could be a legitimate system user. He could be the system administrator. There could even be many active attackers working together. Here, the part of the malicious active attacker will be played by Mallory.</P>
<P>It is also possible that the attacker could be one of the parties involved in the protocol. He may lie during the protocol or not follow the protocol at all. This type of attacker is called a <B>cheater</B>. <B>Passive cheaters</B> follow the protocol, but try to obtain more information than the protocol intends them to. <B>Active cheaters</B> disrupt the protocol in progress in an attempt to cheat.</P>
<P>It is very difficult to maintain a protocol&#146;s security if most of the parties involved are active cheaters, but sometimes it is possible for legitimate parties to detect that active cheating is going on. Certainly, protocols should be secure against passive cheating.</P>
<H3><A NAME="Heading3"></A><FONT COLOR="#000077">2.2 Communications Using Symmetric Cryptography</FONT></H3>
<P>How do two parties communicate securely? They encrypt their communications, of course. The complete protocol is more complicated than that. Let&#146;s look at what must happen for Alice to send an encrypted message to Bob.
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice and Bob agree on a cryptosystem.
<DD><B>(2)</B>&nbsp;&nbsp;Alice and Bob agree on a key.
<DD><B>(3)</B>&nbsp;&nbsp;Alice takes her plaintext message and encrypts it using the encryption algorithm and the key. This creates a ciphertext message.
<DD><B>(4)</B>&nbsp;&nbsp;Alice sends the ciphertext message to Bob.
<DD><B>(5)</B>&nbsp;&nbsp;Bob decrypts the ciphertext message with the same algorithm and key and reads it.
</DL>
<P>What can Eve, sitting between Alice and Bob, learn from listening in on this protocol? If all she hears is the transmission in step (4), she must try to cryptanalyze the ciphertext. This passive attack is a ciphertext-only attack; we have algorithms that are resistant (as far as we know) to whatever computing power Eve could realistically bring to bear on the problem.
</P>
<P>Eve isn&#146;t stupid, though. She also wants to listen in on steps (1) and (2). Then, she would know the algorithm and the key&#151;just as well as Bob. When the message comes across the communications channel in step (4), all she has to do is decrypt it herself.</P>
<P>A good cryptosystem is one in which all the security is inherent in knowledge of the key and none is inherent in knowledge of the algorithm. This is why key management is so important in cryptography. With a symmetric algorithm, Alice and Bob can perform step (1) in public, but they must perform step (2) in secret. The key must remain secret before, during, and after the protocol&#151;as long as the message must remain secret&#151;otherwise the message will no longer be secure. (Public-key cryptography solves this problem another way, and will be discussed in Section 2.5.)</P>
<P>Mallory, an active attacker, could do a few other things. He could attempt to break the communications path in step (4), ensuring that Alice could not talk to Bob at all. Mallory could also intercept Alice&#146;s messages and substitute his own. If he knew the key (by intercepting the communication in step (2), or by breaking the cryptosystem), he could encrypt his own message and send it to Bob in place of the intercepted message. Bob would have no way of knowing that the message had not come from Alice. If Mallory didn&#146;t know the key, he could only create a replacement message that would decrypt to gibberish. Bob, thinking the message came from Alice, might conclude that either the network or Alice had some serious problems.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="02-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
97se亚洲国产综合自在线观| aaa亚洲精品| 亚洲欧洲国产专区| 欧美美女直播网站| 国产成人8x视频一区二区| 无吗不卡中文字幕| 亚洲欧洲美洲综合色网| 日韩色视频在线观看| 99re成人在线| 国产福利91精品一区二区三区| 亚洲香肠在线观看| 亚洲国产高清在线| 精品sm在线观看| 欧美另类高清zo欧美| 99国产精品99久久久久久| 久久福利资源站| 水野朝阳av一区二区三区| ...av二区三区久久精品| 久久这里只有精品首页| 欧美疯狂做受xxxx富婆| 色综合久久中文综合久久牛| 国产一区二区三区四区五区美女| 亚洲大片在线观看| 亚洲精品高清视频在线观看| 国产色爱av资源综合区| 精品国产自在久精品国产| 欧美美女激情18p| 91国内精品野花午夜精品| 国产91富婆露脸刺激对白| 国产一区二区三区四区五区入口| 免费人成在线不卡| 日韩中文字幕1| 午夜精品一区二区三区免费视频| 亚洲视频1区2区| 国产精品国产成人国产三级| 久久婷婷久久一区二区三区| 精品人在线二区三区| 日韩午夜激情视频| 欧美一级专区免费大片| 在线播放91灌醉迷j高跟美女| 欧美中文字幕一区二区三区| 91久久精品国产91性色tv| 99久久婷婷国产综合精品| youjizz久久| 99久久99久久综合| av电影在线观看不卡| aaa国产一区| 99热99精品| 色久综合一二码| 精品视频在线看| 欧美另类z0zxhd电影| 日韩一本二本av| 欧美成人午夜电影| 久久久一区二区| 欧美国产成人精品| 中文av一区特黄| 亚洲精品少妇30p| 亚洲午夜在线视频| 欧美aa在线视频| 国产最新精品精品你懂的| 国产伦精一区二区三区| 丁香婷婷综合五月| av一区二区不卡| 欧美久久久久免费| 精品剧情在线观看| 国产精品少妇自拍| 亚洲最大成人网4388xx| 日韩高清不卡一区二区三区| 9i看片成人免费高清| 一本色道**综合亚洲精品蜜桃冫| 一区二区三区在线视频播放| 亚洲va天堂va国产va久| 人人狠狠综合久久亚洲| 欧美三级日韩在线| 欧美va日韩va| 久久久不卡影院| 国产精品盗摄一区二区三区| 亚洲成人自拍一区| 狠狠狠色丁香婷婷综合激情| 成人av资源在线| 欧美日韩午夜精品| 日本一区二区综合亚洲| 亚洲精品乱码久久久久久久久| 日产欧产美韩系列久久99| 懂色av中文字幕一区二区三区| 91电影在线观看| 欧美大肚乱孕交hd孕妇| 亚洲欧美综合色| 蜜桃av噜噜一区| 91美女片黄在线观看| 日韩一区二区三区高清免费看看 | 欧美人伦禁忌dvd放荡欲情| 欧美成人a∨高清免费观看| 中文字幕日韩av资源站| 青青草视频一区| 91亚洲国产成人精品一区二三 | 91福利在线观看| 精品少妇一区二区三区在线视频| 亚洲天堂久久久久久久| 麻豆极品一区二区三区| 亚洲婷婷综合色高清在线| 久久不见久久见免费视频1| 91免费视频网址| 久久精品亚洲麻豆av一区二区| 亚洲图片欧美色图| 成人国产在线观看| 日韩欧美在线网站| 亚洲一区二区在线观看视频| 国产激情精品久久久第一区二区| 精品视频在线免费看| 中文字幕字幕中文在线中不卡视频| 日本vs亚洲vs韩国一区三区二区| 97se亚洲国产综合在线| 久久色.com| 免费在线观看成人| 欧美二区在线观看| 18欧美亚洲精品| 91精品国产乱码| 国产色综合久久| 激情欧美日韩一区二区| 欧美一区二区在线播放| 亚洲尤物在线视频观看| 懂色av中文字幕一区二区三区| 日韩你懂的在线播放| 青青青伊人色综合久久| 欧美日韩在线观看一区二区 | 欧美成人a∨高清免费观看| 亚洲一区二区三区在线| av中文字幕不卡| 亚洲欧洲av在线| av在线这里只有精品| 国产精品无码永久免费888| 国产伦精品一区二区三区在线观看| 欧美一区二区在线不卡| 青青青伊人色综合久久| 91精品国产综合久久福利软件| 午夜精品福利久久久| 欧美精品久久久久久久久老牛影院| 一区二区三区精品| 欧美日韩精品高清| 亚洲成人黄色影院| 欧美肥妇bbw| 老司机午夜精品| 久久久久国产精品麻豆ai换脸 | 国产剧情一区二区三区| 精品国产精品网麻豆系列| 极品销魂美女一区二区三区| 精品三级av在线| 懂色av中文一区二区三区| 国产精品久久久久久久久果冻传媒 | 国产三级欧美三级日产三级99| 国产最新精品免费| 国产精品热久久久久夜色精品三区| 成人一级片网址| 亚洲免费在线观看视频| 在线观看三级视频欧美| 午夜欧美一区二区三区在线播放| 欧美一区二区三区四区在线观看| 久久狠狠亚洲综合| 国产日韩精品一区二区浪潮av| 成人深夜福利app| 一区二区三区在线免费| 9191国产精品| 国产成人av在线影院| 亚洲天天做日日做天天谢日日欢| 欧美日韩综合一区| 麻豆成人久久精品二区三区小说| 久久网站最新地址| 91色乱码一区二区三区| 午夜精品一区二区三区电影天堂 | 国产午夜精品久久久久久久| 成人av在线网站| 午夜电影网亚洲视频| 久久色视频免费观看| 色婷婷激情综合| 麻豆精品视频在线观看| 国产精品丝袜久久久久久app| 色视频成人在线观看免| 六月丁香综合在线视频| 国产精品美女久久久久久久久| 欧美色偷偷大香| 国产成人精品三级| 亚洲动漫第一页| 国产香蕉久久精品综合网| 欧美最新大片在线看| 国产一区二区免费视频| 亚洲视频在线一区观看| 日韩欧美一区在线观看| 国产成人免费在线| 亚洲成a人片在线观看中文| 久久久午夜电影| 欧美男生操女生| 成人精品鲁一区一区二区| 首页国产欧美久久| 国产精品久久久久国产精品日日 | 久久久久免费观看| 欧美日韩午夜精品| av一区二区三区在线| 国产在线麻豆精品观看| 亚洲国产精品久久艾草纯爱|