亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 18-02.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號(hào):
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:One-Way Hash Functions</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=18//-->
<!--PAGES=432-437//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="18-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="18-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>On 128-bit Snefru, their attacks work better than brute force for four passes or less. A birthday attack against Snefru takes 2<SUP>64</SUP> operations; differential cryptanalysis can find a pair of messages that hash to the same value in 2<SUP>28.5</SUP> operations for three-pass Snefru and 2<SUP>44.5</SUP> operations for four-pass Snefru. Finding a message that hashes to a given value by brute force requires 2<SUP>128</SUP> operations; differential cryptanalysis takes 2<SUP>56</SUP> operations for three-pass Snefru and 2<SUP>88</SUP> operations for four-pass Snefru.</P>
<P>Although Biham and Shamir didn&#146;t analyze 256-bit hash values, they extended their analysis to 224-bit hash values. Compared to a birthday attack that requires 2<SUP>112</SUP> operations, they can find messages that hash to the same value in 2<SUP>12.5</SUP> operations for two-pass Snefru, 2<SUP>33</SUP> operations for three-pass Snefru, and 2<SUP>81</SUP> operations for four-pass Snefru.</P>
<P>Currently, Merkle recommends using Snefru with at least eight passes [1073]. However, with this many passes the algorithm is significantly slower than either MD5 or SHA.</P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">18.3 N- Hash</FONT></H3>
<P><I>N</I>-Hash is an algorithm invented by researchers at Nippon Telephone and Telegraph, the same people who invented FEAL, in 1990 [1105, 1106]. <I>N</I>-Hash uses 128-bit message blocks, a complicated randomizing function similar to FEAL&#146;s, and produces a 128-bit hash value.</P>
<P>The hash of each 128-bit block is a function of the block and the hash of the previous block.</P>
<DL>
<DD><I>H</I><SUB>0</SUB> = <I>I</I>, where <I>I</I> is a random initial value
<DD><I>H</I><SUB>i</SUB> = g(<I>M</I><SUB>i</SUB>,<I>H</I><SUB>i- 1</SUB>) &#8853; <I>M</I><SUB>i</SUB> &#8853; <I>H</I><SUB>i- 1</SUB>
</DL>
<P>The hash of the entire message is the hash of the last message block. The random initial value, <I>I</I>, can be any value determined by the user (even all zeros).</P>
<P>The function g is a complicated one. Figure 18.2 is an overview of the algorithm. Initially, the 128-bit hash of the previous message block, <I>H</I><SUB>i-1</SUB>, has its 64-bit left half and 64-bit right half swapped; it is then XORed with a repeating one/zero pattern (128 bits worth), and then XORed with the current message block, <I>M</I><SUB>i</SUB>. This value then cascades into <I>N</I>(<I>N</I> = 8 in the figures) processing stages. The other input to the processing stage is the previous hash value XORed with one of eight binary constant values.</P>
<I><P><A NAME="Fig2"></A><A HREF="javascript:displayWindow('images/18-02.jpg',297,297 )"><IMG SRC="images/18-02t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/18-02.jpg',297,297)"><FONT COLOR="#000077"><B>Figure 18.2</B></FONT></A>&nbsp;&nbsp;Outline of N-Hash.</I>
</P>
<P>One processing stage is given in Figure 18.3. The message block is broken into four 32-bit values. The previous hash value is also broken into four 32-bit values. The function f is given in Figure 18.4. Functions <I>S</I><SUB>0</SUB> and <I>S</I><SUB>1</SUB> are the same as they were in FEAL.</P>
<DL>
<DD><I>S</I><SUB>0</SUB>(<I>a,b</I>) = rotate left two bits ((<I>a &#43; b</I>) mod 256)
<DD><I>S</I><SUB>1</SUB>(<I>a,b</I>) = rotate left two bits ((<I>a</I> &#43; <I>b</I> &#43; 1) mod 256)
</DL>
<P>The output of one processing stage becomes the input to the next processing stage. After the last processing stage, the output is XORed with the <I>M</I><SUB>i</SUB> and <I>H</I><SUB>i-1</SUB>, and then the next block is ready to be hashed.</P>
<P><FONT SIZE="+1"><B><I>Cryptanalysis of N- Hash</I></B></FONT></P>
<P>Bert den Boer discovered a way to produce collisions in the round function of <I>N</I>-Hash [1262]. Biham and Shamir used differential cryptanalysis to break 6-round <I>N</I>-Hash [169, 172]. Their particular attack (there certainly could be others) works for any <I>N</I> that is divisible by 3, and is more efficient than the birthday attack for any <I>N</I> less than 15.</P>
<I><P><A NAME="Fig3"></A><A HREF="javascript:displayWindow('images/18-03.jpg',253,273 )"><IMG SRC="images/18-03t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/18-03.jpg',253,273)"><FONT COLOR="#000077"><B>Figure 18.3</B></FONT></A>&nbsp;&nbsp;One processing stage of</I> N-<I>Hash</I>.
<I></P>
<P><A NAME="Fig4"></A><A HREF="javascript:displayWindow('images/18-04.jpg',182,216 )"><IMG SRC="images/18-04t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/18-04.jpg',182,216)"><FONT COLOR="#000077"><B>Figure 18.4</B></FONT></A>&nbsp;&nbsp;Function f.</I>
</P>
<P>The same attack can find pairs of messages that hash to the same value for 12-round <I>N</I>-Hash in 2<SUP>56</SUP> operations, compared to 2<SUP>64</SUP> operations for a brute-force attack. <I>N</I>-hash with 15 rounds is safe from differential cryptanalysis: The attack requires 2<SUP>72</SUP> operations.</P>
<P>The algorithm&#146;s designers recommend using <I>N</I>-Hash with at least 8 rounds [1106]. Given the proven insecurity of <I>N</I>-Hash and FEAL (and its speed with 8 rounds), I recommend using another algorithm entirely.</P>
<H3><A NAME="Heading5"></A><FONT COLOR="#000077">18.4 MD4</FONT></H3>
<P>MD4 is a one-way hash function designed by Ron Rivest [1318, 1319, 1321]. MD stands for <B>Message Digest</B>; the algorithm produces a 128-bit hash, or message digest, of the input message.</P>
<P>In [1319], Rivest outlined his design goals for the algorithm:</P>
<DL>
<DD><I>Security</I>. It is computationally infeasible to find two messages that hashed to the same value. No attack is more efficient than brute force.
<DD><I>Direct Security</I>. MD4&#146;s security is not based on any assumption, like the difficulty of factoring.
<DD><I>Speed</I>. MD4 is suitable for high-speed software implementations. It is based on a simple set of bit manipulations on 32-bit operands.
<DD><I>Simplicity and Compactness</I>. MD4 is as simple as possible, without large data structures or a complicated program.
<DD><I>Favor Little-Endian Architectures</I>. MD4 is optimized for microprocessor architectures (specifically Intel microprocessors); larger and faster computers make any necessary translations.
</DL>
<P>After the algorithm was first introduced, Bert den Boer and Antoon Bosselaers successfully cryptanalyzed the last two of the algorithm&#146;s three rounds [202]. In an unrelated cryptanalytic result, Ralph Merkle successfully attacked the first two rounds [202]. Eli Biham discussed a differential cryptanalysis attack against the first two rounds of MD4 [159]. Even though these attacks could not be extended to the full algorithm, Rivest strengthened the algorithm. The result is MD5.
</P>
<H3><A NAME="Heading6"></A><FONT COLOR="#000077">18.5 MD5</FONT></H3>
<P>MD5 is an improved version of MD4 [1386, 1322]. Although more complex than MD4, it is similar in design and also produces a 128-bit hash.
</P>
<P><FONT SIZE="+1"><B><I>Description of MD5</I></B></FONT></P>
<P>After some initial processing, MD5 processes the input text in 512-bit blocks, divided into 16 32-bit sub-blocks. The output of the algorithm is a set of four 32-bit blocks, which concatenate to form a single 128-bit hash value.
</P>
<P>First, the message is padded so that its length is just 64 bits short of being a multiple of 512. This padding is a single 1-bit added to the end of the message, followed by as many zeros as are required. Then, a 64-bit representation of the message&#146;s length (before padding bits were added) is appended to the result. These two steps serve to make the message length an exact multiple of 512 bits in length (required for the rest of the algorithm), while ensuring that different messages will not look the same after padding.</P>
<P>Four 32-bit variables are initialized:</P>
<DL>
<DD><I>A</I> = 0x01234567
<DD><I>B</I> = 0x89abcdef
<DD><I>C</I> = 0xfedcba98
<DD><I>D</I> = 0x76543210
</DL>
<P>These are called <B>chaining variables</B>.</P>
<P>Now, the main loop of the algorithm begins. This loop continues for as many 512-bit blocks as are in the message.</P>
<P>The four variables are copied into different variables: <I>a</I> gets <I>A, b</I> gets <I>B, c</I> gets <I>C,</I> and <I>d</I> gets <I>D</I>.</P>
<P>The main loop has four rounds (MD4 had only three rounds), all very similar. Each round uses a different operation 16 times. Each operation performs a nonlinear function on three of <I>a, b, c,</I> and <I>d</I>. Then it adds that result to the fourth variable, a sub-block of the text and a constant. Then it rotates that result to the right a variable number of bits and adds the result to one of <I>a, b, c,</I> or <I>d</I>. Finally the result replaces one of <I>a, b, c,</I> or <I>d</I>. See Figures 18.5 and 18.6.</P>
<I><P><A NAME="Fig5"></A><A HREF="javascript:displayWindow('images/18-05.jpg',356,173 )"><IMG SRC="images/18-05t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/18-05.jpg',356,173)"><FONT COLOR="#000077"><B>Figure 18.5</B></FONT></A>&nbsp;&nbsp;MD5 main loop.</I>
</P>
<P>There are four nonlinear functions, one used in each operation (a different one for each round).
</P>
<DL>
<DD>F(<I>X,Y,Z</I>) = (<I>X</I> &#8869; <I>Y</I>) &#8870; ((&#172; <I>X</I>) &#8869; <I>Z</I>)
<DD>G(<I>X,Y,Z</I>) = (<I>X</I> &#8869; <I>Z</I>) &#172; (<I>Y</I> (&#172; <I>Z</I>))
<DD>H(<I>X,Y,Z</I>) = <I>X</I> &#8853; <I>Y</I> &#8853; <I>Z</I>
<DD>I(<I>X,Y,Z</I>) = <I>Y</I> &#8853; (<I>X</I> &#8870; (&#172; <I>Z</I>))
</DL>
<P>(&#8853; is XOR,&#8869; is AND, &#8870; is OR, and &#172; is NOT.)
</P>
<P>These functions are designed so that if the corresponding bits of <I>X, Y,</I> and <I>Z</I> are independent and unbiased, then each bit of the result will also be independent and unbiased. The function F is the bit-wise conditional: If <I>X</I> then <I>Y</I> else <I>Z</I>. The function H is the bit-wise parity operator.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="18-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="18-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91在线视频免费观看| 丰满放荡岳乱妇91ww| 裸体一区二区三区| 国内外成人在线视频| 成人一区二区三区视频在线观看| 国产成人精品在线看| 日本乱人伦aⅴ精品| 日韩你懂的在线观看| 一区二区中文视频| 日韩中文欧美在线| 99综合影院在线| 欧美电视剧免费全集观看| 一区免费观看视频| 亚洲国产综合在线| 国产视频视频一区| 国产精品家庭影院| 一区二区在线观看免费视频播放 | 亚洲第一成人在线| 岛国精品在线播放| 欧美日韩视频专区在线播放| 一区二区三区中文字幕电影| 全国精品久久少妇| 色婷婷一区二区三区四区| 日韩欧美中文字幕一区| 国产精品成人一区二区艾草| 久久精品99久久久| 欧洲精品在线观看| 中文字幕一区二区在线播放| 青青草原综合久久大伊人精品| 成人av资源站| 国产日韩欧美a| 免费高清在线视频一区·| 欧美影视一区在线| 亚洲免费av高清| 99国产精品久久久久久久久久| 欧美大白屁股肥臀xxxxxx| 无吗不卡中文字幕| 欧美精品高清视频| 蜜桃久久久久久久| 日韩限制级电影在线观看| 午夜精品影院在线观看| 欧美日韩三级一区| 日本伊人午夜精品| 日韩精品一区二区三区蜜臀| 久久精品国产色蜜蜜麻豆| 欧美剧在线免费观看网站| 亚洲第一激情av| 在线综合视频播放| 国产一区二区三区精品视频| 久久久99精品免费观看不卡| 不卡视频一二三四| 三级成人在线视频| 欧美精品一区二区不卡| 成人黄色av网站在线| 亚洲一区二区三区中文字幕| 欧美日韩精品欧美日韩精品一综合| 午夜精品久久久久久久久久| 精品精品欲导航| 色综合天天做天天爱| 日韩精品三区四区| 日韩一区中文字幕| 91精品国产综合久久小美女| 成人黄页在线观看| 麻豆久久久久久| 亚洲国产欧美一区二区三区丁香婷| 精品国精品国产尤物美女| 欧美性videosxxxxx| 成人动漫av在线| 国产精品一区专区| 国产麻豆精品一区二区| 久久精品国产精品亚洲精品| 亚洲色图欧洲色图婷婷| 国产欧美日韩精品一区| 久久老女人爱爱| 久久久不卡网国产精品二区 | 亚洲一区在线观看免费观看电影高清| 久久五月婷婷丁香社区| 精品日韩在线观看| 欧美成人艳星乳罩| 久久久高清一区二区三区| 国产亚洲欧美色| 国产精品免费人成网站| 亚洲女性喷水在线观看一区| 亚洲精品菠萝久久久久久久| 亚洲国产综合色| 日本欧美在线观看| 粉嫩av一区二区三区在线播放| 高清beeg欧美| 欧美日韩在线亚洲一区蜜芽| 欧美一区日韩一区| 久久综合久久久久88| 综合久久给合久久狠狠狠97色| 亚洲免费电影在线| 久久电影网站中文字幕| 成熟亚洲日本毛茸茸凸凹| 欧美性一级生活| 国产日韩精品一区二区浪潮av| 国产精品久久久久久亚洲毛片| 亚洲影院理伦片| 国产精品资源在线| 日韩欧美精品在线| 国产一区二区三区视频在线播放| 日本aⅴ精品一区二区三区| 福利一区二区在线| 成人欧美一区二区三区1314| 91免费观看在线| 丝袜国产日韩另类美女| 日韩一本二本av| 不卡的看片网站| 亚洲小说欧美激情另类| 欧美白人最猛性xxxxx69交| 国产精品一区三区| 中文字幕五月欧美| 欧美高清视频在线高清观看mv色露露十八 | 三级影片在线观看欧美日韩一区二区 | 国产一区二区三区av电影| 亚洲国产电影在线观看| 在线不卡中文字幕| 成人国产精品视频| 视频一区中文字幕| 国产精品福利一区| 日韩精品一区二区三区四区视频| 国产白丝精品91爽爽久久| 亚洲v中文字幕| 欧美国产日产图区| 欧美一区二区大片| 在线免费观看成人短视频| 国产美女精品人人做人人爽| 日韩美女精品在线| 精品剧情在线观看| 欧美日韩精品一区二区三区四区| 国产精品影视在线| 美国毛片一区二区三区| 亚洲一区二区欧美日韩| 亚洲免费观看高清完整版在线观看| 精品福利一区二区三区| 日韩亚洲欧美在线| 91精品一区二区三区在线观看| 91女神在线视频| 97精品国产97久久久久久久久久久久| 看国产成人h片视频| 蜜桃视频在线观看一区| 免费人成精品欧美精品| 天天操天天干天天综合网| 亚洲一线二线三线久久久| 亚洲色图清纯唯美| 亚洲一区二区高清| 日韩国产在线观看| 欧美aaaaaa午夜精品| 韩日精品视频一区| 韩国av一区二区三区在线观看| 国产在线精品一区二区夜色| 另类综合日韩欧美亚洲| 国产精品一区二区三区网站| 国产成+人+日韩+欧美+亚洲| 91在线码无精品| 欧美色网站导航| 26uuu色噜噜精品一区| 欧美国产综合色视频| 亚洲一区在线观看免费| 美女网站一区二区| 国产二区国产一区在线观看| 日韩欧美一区在线| 久久香蕉国产线看观看99| 一区免费观看视频| 久久精品国产第一区二区三区| 五月激情综合婷婷| 激情五月播播久久久精品| 91在线视频网址| 日韩免费高清av| 中文字幕日韩欧美一区二区三区| 偷拍一区二区三区四区| 成人av网站在线观看| 欧美成人福利视频| 一区二区在线观看免费视频播放 | 久久一区二区视频| 亚洲1区2区3区4区| 成人av电影观看| 国产欧美视频一区二区| 日本va欧美va瓶| 欧美日韩视频一区二区| 亚洲精选一二三| 波多野结衣欧美| 欧美极品少妇xxxxⅹ高跟鞋| 青草av.久久免费一区| 欧美色老头old∨ideo| 国产精品久久久久9999吃药| 国产美女av一区二区三区| 精品av综合导航| 国产一区二区三区黄视频| 精品国产1区二区| 韩国欧美一区二区| 久久久久久久久久久久久久久99 | 91精品国产高清一区二区三区| 一区二区三区四区蜜桃| 欧美亚洲国产一区在线观看网站| 国产精品久久久久久久久久免费看| 国产伦精品一区二区三区免费 | 久久品道一品道久久精品| 国产自产视频一区二区三区|