亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc1319.txt

?? A console-based hah calculators
?? TXT
?? 第 1 頁 / 共 2 頁
字號:





Network Working Group                                         B. Kaliski
Request for Comments: 1319                              RSA Laboratories
Updates: RFC 1115                                             April 1992


                     The MD2 Message-Digest Algorithm

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard.  Distribution of this memo is
   unlimited.

Acknowlegements

   The description of MD2 is based on material prepared by John Linn and
   Ron Rivest.  Their permission to incorporate that material is greatly
   appreciated.

Table of Contents

   1. Executive Summary                                                1
   2. Terminology and Notation                                         2
   3. MD2 Algorithm Description                                        2
   4. Summary                                                          4
   References                                                          5
   APPENDIX A - Reference Implementation                               5
   Security Considerations                                            17
   Author's Address                                                   17

1. Executive Summary

   This document describes the MD2 message-digest algorithm. The
   algorithm takes as input a message of arbitrary length and produces
   as output a 128-bit "fingerprint" or "message digest" of the input.
   It is conjectured that it is computationally infeasible to produce
   two messages having the same message digest, or to produce any
   message having a given prespecified target message digest. The MD2
   algorithm is intended for digital signature applications, where a
   large file must be "compressed" in a secure manner before being
   signed with a private (secret) key under a public-key cryptosystem
   such as RSA.

   License to use MD2 is granted for non-commerical Internet Privacy-
   Enhanced Mail [1-3].

   This document is an update to the August 1989 RFC 1115 [3], which
   also gives a reference implementation of MD2. The main differences



Kaliski                                                         [Page 1]

RFC 1319              MD2 Message-Digest Algorithm            April 1992


   are that a textual description of MD2 is included, and that the
   reference implementation of MD2 is more portable.

   For OSI-based applications, MD2's object identifier is

   md2 OBJECT IDENTIFIER ::=
   iso(1) member-body(2) US(840) rsadsi(113549) digestAlgorithm(2) 2}

   In the X.509 type AlgorithmIdentifier [4], the parameters for MD2
   should have type NULL.

2. Terminology and Notation

   In this document, a "byte" is an eight-bit quantity.

   Let x_i denote "x sub i". If the subscript is an expression, we
   surround it in braces, as in x_{i+1}. Similarly, we use ^ for
   superscripts (exponentiation), so that x^i denotes x to the i-th
   power.

   Let X xor Y denote the bit-wise XOR of X and Y.

3. MD2 Algorithm Description

   We begin by supposing that we have a b-byte message as input, and
   that we wish to find its message digest. Here b is an arbitrary
   nonnegative integer; b may be zero, and it may be arbitrarily large.
   We imagine the bytes of the message written down as follows:

                   m_0 m_1 ... m_{b-1}

   The following five steps are performed to compute the message digest
   of the message.

3.1 Step 1. Append Padding Bytes

   The message is "padded" (extended) so that its length (in bytes) is
   congruent to 0, modulo 16. That is, the message is extended so that
   it is a multiple of 16 bytes long. Padding is always performed, even
   if the length of the message is already congruent to 0, modulo 16.

   Padding is performed as follows: "i" bytes of value "i" are appended
   to the message so that the length in bytes of the padded message
   becomes congruent to 0, modulo 16. At least one byte and at most 16
   16 bytes are appended.

   At this point the resulting message (after padding with bytes) has a
   length that is an exact multiple of 16 bytes. Let M[0 ... N-1] denote



Kaliski                                                         [Page 2]

RFC 1319              MD2 Message-Digest Algorithm            April 1992


   the bytes of the resulting message, where N is a multiple of 16.

3.2 Step 2. Append Checksum

   A 16-byte checksum of the message is appended to the result of the
   previous step.

   This step uses a 256-byte "random" permutation constructed from the
   digits of pi. Let S[i] denote the i-th element of this table. The
   table is given in the appendix.

   Do the following:

      /* Clear checksum. */
      For i = 0 to 15 do:
         Set C[i] to 0.
      end /* of loop on i */

      Set L to 0.

      /* Process each 16-word block. */
      For i = 0 to N/16-1 do

         /* Checksum block i. */
         For j = 0 to 15 do
            Set c to M[i*16+j].
            Set C[j] to S[c xor L].
            Set L to C[j].
          end /* of loop on j */
       end /* of loop on i */

   The 16-byte checksum C[0 ... 15] is appended to the message. Let M[0
   with checksum), where N' = N + 16.

3.3 Step 3. Initialize MD Buffer

   A 48-byte buffer X is used to compute the message digest. The buffer
   is initialized to zero.













Kaliski                                                         [Page 3]

RFC 1319              MD2 Message-Digest Algorithm            April 1992


3.4 Step 4. Process Message in 16-Byte Blocks

   This step uses the same 256-byte permutation S as step 2 does.

   Do the following:

      /* Process each 16-word block. */
      For i = 0 to N'/16-1 do

         /* Copy block i into X. */
         For j = 0 to 15 do
            Set X[16+j] to M[i*16+j].
            Set X[32+j] to (X[16+j] xor X[j]).
          end /* of loop on j */

         Set t to 0.

         /* Do 18 rounds. */
         For j = 0 to 17 do

            /* Round j. */
            For k = 0 to 47 do
               Set t and X[k] to (X[k] xor S[t]).
            end /* of loop on k */

            Set t to (t+j) modulo 256.
         end /* of loop on j */

      end /* of loop on i */

3.5 Step 5. Output

   The message digest produced as output is X[0 ... 15]. That is, we
   begin with X[0], and end with X[15].

   This completes the description of MD2. A reference implementation in
   C is given in the appendix.

4. Summary

   The MD2 message-digest algorithm is simple to implement, and provides
   a "fingerprint" or message digest of a message of arbitrary length.
   It is conjectured that the difficulty of coming up with two messages
   having the same message digest is on the order of 2^64 operations,
   and that the difficulty of coming up with any message having a given
   message digest is on the order of 2^128 operations. The MD2 algorithm
   has been carefully scrutinized for weaknesses. It is, however, a
   relatively new algorithm and further security analysis is of course



Kaliski                                                         [Page 4]

RFC 1319              MD2 Message-Digest Algorithm            April 1992


   justified, as is the case with any new proposal of this sort.

References

   [1] Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part
       I -- Message Encipherment and Authentication Procedures", RFC
       1113, DEC,  IAB Privacy Task Force, August 1989.

   [2] Kent, S., and J. Linn, "Privacy Enhancement for Internet
       Electronic Mail: Part II -- Certificate-Based Key Management",
       RFC 1114, BBNCC, DEC, IAB Privacy Task Force, August 1989.

   [3] Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part
       III -- Algorithms, Modes, and Identifiers", RFC 1115 DEC, IAB
       Privacy Task Force, August 1989.

   [4] CCITT Recommendation X.509 (1988), "The Directory -
       Authentication Framework".

APPENDIX A - Reference Implementation

   This appendix contains the following files taken from RSAREF: A
   Cryptographic Toolkit for Privacy-Enhanced Mail:

     global.h -- global header file

     md2.h -- header file for MD2

     md2c.c -- source code for MD2

For more information on RSAREF, send email to <rsaref@rsa.com>.

The appendix also includes the following file:

     mddriver.c -- test driver for MD2, MD4 and MD5

The driver compiles for MD5 by default but can compile for MD2 or MD4 if
the symbol MD is defined on the C compiler command line as 2 or 4.

A.1 global.h

/* GLOBAL.H - RSAREF types and constants
 */

/* PROTOTYPES should be set to one if and only if the compiler supports
     function argument prototyping.
   The following makes PROTOTYPES default to 0 if it has not already
     been defined with C compiler flags.



Kaliski                                                         [Page 5]

RFC 1319              MD2 Message-Digest Algorithm            April 1992


 */
#ifndef PROTOTYPES
#define PROTOTYPES 0
#endif

/* POINTER defines a generic pointer type */
typedef unsigned char *POINTER;

/* UINT2 defines a two byte word */
typedef unsigned short int UINT2;

/* UINT4 defines a four byte word */
typedef unsigned long int UINT4;

/* PROTO_LIST is defined depending on how PROTOTYPES is defined above.
   If using PROTOTYPES, then PROTO_LIST returns the list, otherwise it
     returns an empty list.
 */
#if PROTOTYPES
#define PROTO_LIST(list) list
#else
#define PROTO_LIST(list) ()
#endif

A.2 md2.h

/* MD2.H - header file for MD2C.C
 */

/* Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All
   rights reserved.

   License to copy and use this software is granted for
   non-commercial Internet Privacy-Enhanced Mail provided that it is
   identified as the "RSA Data Security, Inc. MD2 Message Digest
   Algorithm" in all material mentioning or referencing this software
   or this function.

   RSA Data Security, Inc. makes no representations concerning either
   the merchantability of this software or the suitability of this
   software for any particular purpose. It is provided "as is"
   without express or implied warranty of any kind.

   These notices must be retained in any copies of any part of this
   documentation and/or software.
 */





Kaliski                                                         [Page 6]

RFC 1319              MD2 Message-Digest Algorithm            April 1992


typedef struct {
  unsigned char state[16];                                 /* state */
  unsigned char checksum[16];                           /* checksum */
  unsigned int count;                 /* number of bytes, modulo 16 */
  unsigned char buffer[16];                         /* input buffer */
} MD2_CTX;

void MD2Init PROTO_LIST ((MD2_CTX *));
void MD2Update PROTO_LIST
  ((MD2_CTX *, unsigned char *, unsigned int));
void MD2Final PROTO_LIST ((unsigned char [16], MD2_CTX *));

A.3 md2c.c

/* MD2C.C - RSA Data Security, Inc., MD2 message-digest algorithm
 */

/* Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All
   rights reserved.

   License to copy and use this software is granted for
   non-commercial Internet Privacy-Enhanced Mail provided that it is
   identified as the "RSA Data Security, Inc. MD2 Message Digest
   Algorithm" in all material mentioning or referencing this software
   or this function.

   RSA Data Security, Inc. makes no representations concerning either
   the merchantability of this software or the suitability of this
   software for any particular purpose. It is provided "as is"
   without express or implied warranty of any kind.

   These notices must be retained in any copies of any part of this
   documentation and/or software.
 */

#include "global.h"
#include "md2.h"

static void MD2Transform PROTO_LIST
  ((unsigned char [16], unsigned char [16], unsigned char [16]));
static void MD2_memcpy PROTO_LIST ((POINTER, POINTER, unsigned int));
static void MD2_memset PROTO_LIST ((POINTER, int, unsigned int));

/* Permutation of 0..255 constructed from the digits of pi. It gives a
   "random" nonlinear byte substitution operation.
 */
static unsigned char PI_SUBST[256] = {
  41, 46, 67, 201, 162, 216, 124, 1, 61, 54, 84, 161, 236, 240, 6,



Kaliski                                                         [Page 7]

RFC 1319              MD2 Message-Digest Algorithm            April 1992


  19, 98, 167, 5, 243, 192, 199, 115, 140, 152, 147, 43, 217, 188,
  76, 130, 202, 30, 155, 87, 60, 253, 212, 224, 22, 103, 66, 111, 24,
  138, 23, 229, 18, 190, 78, 196, 214, 218, 158, 222, 73, 160, 251,
  245, 142, 187, 47, 238, 122, 169, 104, 121, 145, 21, 178, 7, 63,
  148, 194, 16, 137, 11, 34, 95, 33, 128, 127, 93, 154, 90, 144, 50,
  39, 53, 62, 204, 231, 191, 247, 151, 3, 255, 25, 48, 179, 72, 165,
  181, 209, 215, 94, 146, 42, 172, 86, 170, 198, 79, 184, 56, 210,
  150, 164, 125, 182, 118, 252, 107, 226, 156, 116, 4, 241, 69, 157,
  112, 89, 100, 113, 135, 32, 134, 91, 207, 101, 230, 45, 168, 2, 27,
  96, 37, 173, 174, 176, 185, 246, 28, 70, 97, 105, 52, 64, 126, 15,
  85, 71, 163, 35, 221, 81, 175, 58, 195, 92, 249, 206, 186, 197,
  234, 38, 44, 83, 13, 110, 133, 40, 132, 9, 211, 223, 205, 244, 65,
  129, 77, 82, 106, 220, 55, 200, 108, 193, 171, 250, 36, 225, 123,
  8, 12, 189, 177, 74, 120, 136, 149, 139, 227, 99, 232, 109, 233,
  203, 213, 254, 59, 0, 29, 57, 242, 239, 183, 14, 102, 88, 208, 228,
  166, 119, 114, 248, 235, 117, 75, 10, 49, 68, 80, 180, 143, 237,
  31, 26, 219, 153, 141, 51, 159, 17, 131, 20
};

static unsigned char *PADDING[] = {
  (unsigned char *)"",
  (unsigned char *)"\001",
  (unsigned char *)"\002\002",
  (unsigned char *)"\003\003\003",
  (unsigned char *)"\004\004\004\004",
  (unsigned char *)"\005\005\005\005\005",
  (unsigned char *)"\006\006\006\006\006\006",
  (unsigned char *)"\007\007\007\007\007\007\007",
  (unsigned char *)"\010\010\010\010\010\010\010\010",
  (unsigned char *)"\011\011\011\011\011\011\011\011\011",
  (unsigned char *)"\012\012\012\012\012\012\012\012\012\012",
  (unsigned char *)"\013\013\013\013\013\013\013\013\013\013\013",
  (unsigned char *)"\014\014\014\014\014\014\014\014\014\014\014\014",
  (unsigned char *)
    "\015\015\015\015\015\015\015\015\015\015\015\015\015",
  (unsigned char *)
    "\016\016\016\016\016\016\016\016\016\016\016\016\016\016",
  (unsigned char *)
    "\017\017\017\017\017\017\017\017\017\017\017\017\017\017\017",
  (unsigned char *)
    "\020\020\020\020\020\020\020\020\020\020\020\020\020\020\020\020"
};

/* MD2 initialization. Begins an MD2 operation, writing a new context.
 */
void MD2Init (context)
MD2_CTX *context;                                        /* context */
{



Kaliski                                                         [Page 8]

RFC 1319              MD2 Message-Digest Algorithm            April 1992


  context->count = 0;
  MD2_memset ((POINTER)context->state, 0, sizeof (context->state));
  MD2_memset
    ((POINTER)context->checksum, 0, sizeof (context->checksum));
}

/* MD2 block update operation. Continues an MD2 message-digest
     operation, processing another message block, and updating the
     context.
 */
void MD2Update (context, input, inputLen)
MD2_CTX *context;                                        /* context */
unsigned char *input;                                /* input block */
unsigned int inputLen;                     /* length of input block */
{
  unsigned int i, index, partLen;

  /* Update number of bytes mod 16 */
  index = context->count;
  context->count = (index + inputLen) & 0xf;

  partLen = 16 - index;

  /* Transform as many times as possible.
    */

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本道精品一区二区三区| 成人免费黄色在线| 狠狠色伊人亚洲综合成人| 国产米奇在线777精品观看| 国产69精品一区二区亚洲孕妇| 成人动漫精品一区二区| 成人动漫一区二区| 欧美老女人第四色| 国产无一区二区| 亚洲一区二区三区四区的 | 日韩精品久久理论片| 国产在线看一区| 不卡视频在线观看| 日韩欧美自拍偷拍| 亚洲免费在线观看| 亚洲三级在线免费| 色欧美88888久久久久久影院| 日韩欧美色电影| 亚洲精品成人少妇| 91麻豆精品91久久久久同性| 国产曰批免费观看久久久| 成人开心网精品视频| 日韩一区二区三区免费看| 国产精品久久夜| 免费成人av在线| 在线精品视频小说1| 国产精品无圣光一区二区| 美国精品在线观看| 日韩一级二级三级精品视频| 亚洲免费三区一区二区| 国产在线精品一区二区夜色| 欧美精品乱码久久久久久| 综合色天天鬼久久鬼色| 久99久精品视频免费观看| 日韩一区二区视频| 午夜精品久久久久| 91看片淫黄大片一级在线观看| 久久久国际精品| 久久9热精品视频| 在线观看免费一区| 亚洲欧美一区二区三区久本道91 | 欧美精品一级二级三级| 自拍偷拍欧美精品| 欧美主播一区二区三区美女| 亚洲最大的成人av| 欧美精品第1页| 狠狠色丁香久久婷婷综合_中| 久久久99精品久久| www.亚洲精品| 亚洲mv在线观看| 日韩欧美一卡二卡| 成人黄色av电影| 亚洲午夜精品久久久久久久久| 欧美老女人第四色| 精品一区免费av| 国产精品成人网| 欧美专区日韩专区| 狠狠久久亚洲欧美| 日韩一区欧美一区| 日韩一级片在线播放| 成人h精品动漫一区二区三区| 亚洲曰韩产成在线| 日韩欧美第一区| 99精品视频免费在线观看| 日韩专区在线视频| 国产欧美一区视频| 91麻豆精品国产91久久久 | 精品日韩一区二区三区| 成人一区二区三区视频| 亚洲第一久久影院| 国产女人18毛片水真多成人如厕| 91影视在线播放| 蜜桃av一区二区在线观看| 国产精品久久毛片av大全日韩| 欧美日韩夫妻久久| 成人午夜免费视频| 日本成人在线网站| 亚洲欧美一区二区在线观看| 日韩一区二区三区精品视频| 成人精品免费看| 美女视频黄免费的久久 | 亚洲国产aⅴ成人精品无吗| 国产午夜一区二区三区| 777欧美精品| 欧洲国内综合视频| 国产69精品久久久久毛片| 日韩成人精品在线观看| 亚洲日本一区二区三区| 精品国产91乱码一区二区三区| 欧美一区二区不卡视频| 国产·精品毛片| 久久精品国产一区二区三区免费看| 亚洲男同性视频| 欧美国产1区2区| 久久久噜噜噜久久中文字幕色伊伊| 欧美日韩一卡二卡三卡| 91麻豆免费看片| 成人网男人的天堂| 国产在线一区观看| 精品系列免费在线观看| 亚洲va韩国va欧美va精品| 玉米视频成人免费看| 国产精品久久久久婷婷| 欧美激情一区二区三区不卡 | 日本免费新一区视频| 亚洲女女做受ⅹxx高潮| 国产精品夫妻自拍| 国产精品麻豆视频| 中文字幕av一区 二区| 国产午夜精品久久| 国产精品久久久久久久蜜臀| 国产亲近乱来精品视频| 欧美激情资源网| 国产精品女主播av| 一区在线观看视频| 国产精品成人一区二区艾草| 18涩涩午夜精品.www| 最近中文字幕一区二区三区| 中文字幕在线不卡视频| 国产精品国产三级国产有无不卡| 国产精品午夜春色av| 成人免费在线播放视频| 亚洲免费在线播放| 亚洲欧洲制服丝袜| 夜夜嗨av一区二区三区中文字幕| 亚洲精品免费播放| 三级不卡在线观看| 韩国欧美国产一区| 不卡在线视频中文字幕| 日本二三区不卡| 3d动漫精品啪啪| 精品国产伦一区二区三区观看方式 | 久久精品国产一区二区三区免费看 | 欧美日韩一区二区欧美激情| 欧美网站大全在线观看| 欧美日产国产精品| 日韩一区二区三区视频在线观看| 久久综合九色综合欧美亚洲| 国产精品热久久久久夜色精品三区| 中文字幕在线一区免费| 亚洲aⅴ怡春院| 国产精品一级片在线观看| av不卡免费在线观看| 欧美日韩电影一区| 久久久精品免费观看| 亚洲制服丝袜在线| 国模套图日韩精品一区二区| 97se亚洲国产综合自在线| 欧美二区乱c少妇| 久久久久国产精品人| 亚洲在线视频网站| 国产成人免费在线观看不卡| 欧美影视一区二区三区| 精品国产乱码久久久久久老虎| 1024成人网| 久久成人免费网站| 91高清在线观看| 欧美精品一区二区三区在线播放 | 精品国产青草久久久久福利| 亚洲视频1区2区| 麻豆精品精品国产自在97香蕉 | 国产一区二区三区四区五区美女| 不卡电影一区二区三区| 日韩一区二区视频在线观看| 亚洲免费资源在线播放| 国产麻豆精品一区二区| 欧美高清性hdvideosex| 欧美国产精品劲爆| 激情五月婷婷综合网| 欧美日韩一区二区在线观看视频| 国产精品青草综合久久久久99| 日本免费新一区视频| 在线精品视频免费观看| 国产精品国产三级国产有无不卡 | 五月婷婷欧美视频| av欧美精品.com| 久久久www免费人成精品| 日韩激情中文字幕| 日本韩国精品一区二区在线观看| 国产午夜精品久久| 国产九九视频一区二区三区| 欧美久久久久免费| 亚洲成精国产精品女| 色综合久久久久久久久久久| 国产拍揄自揄精品视频麻豆| 国产综合久久久久影院| 欧美大白屁股肥臀xxxxxx| 日韩精品国产欧美| 欧美福利视频一区| 日韩和欧美的一区| 欧美影视一区二区三区| 亚洲影视在线观看| 色呦呦国产精品| 一区二区视频在线| 色综合久久精品| 亚洲一区二区在线播放相泽| 欧洲人成人精品| 天天影视涩香欲综合网| 欧美精品乱码久久久久久| 首页国产欧美久久|