亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 04-01.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Intermediate Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=04//-->
<!--PAGES=075-077//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch03/03-13.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="04-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Chapter 4<BR>Intermediate Protocols
</FONT></H2>
<H3><A NAME="Heading2"></A><FONT COLOR="#000077">4.1 Timestamping Services</FONT></H3>
<P>In many situations, people need to certify that a document existed on a certain date. Think about a copyright or patent dispute: The party that produces the earliest copy of the disputed work wins the case. With paper documents, notaries can sign and lawyers can safeguard copies. If a dispute arises, the notary or the lawyer testifies that the letter existed on a certain date.
</P>
<P>In the digital world, it&#146;s far more complicated. There is no way to examine a digital document for signs of tampering. It can be copied and modified endlessly without anyone being the wiser. It&#146;s trivial to change the date stamp on a computer file. No one can look at a digital document and say: &#147;Yes, this document was created before November 4, 1952.&#148;</P>
<P>Stuart Haber and W. Scott Stornetta at Bellcore thought about the problem [682, 683, 92]. They wanted a digital timestamping protocol with the following properties:</P>
<DL>
<DD>&#151; The data itself must be timestamped, without any regard to the physical medium on which it resides.
<DD>&#151; It must be impossible to change a single bit of the document without that change being apparent.
<DD>&#151; It must be impossible to timestamp a document with a date and time different from the present one.
</DL>
<P><FONT SIZE="+1"><B><I>Arbitrated Solution</I></B></FONT></P>
<P>This protocol uses Trent, who has a trusted timestamping service, and Alice, who wishes to timestamp a document.
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice transmits a copy of the document to Trent.
<DD><B>(2)</B>&nbsp;&nbsp;Trent records the date and time he received the document and retains a copy of the document for safekeeping.
</DL>
<P>Now, if anyone calls into question Alice&#146;s claim of when the document was created, she just has to call up Trent. He will produce his copy of the document and verify that he received the document on the date and time stamped.
</P>
<P>This protocol works, but has some obvious problems. First, there is no privacy. Alice has to give a copy of the document to Trent. Anyone listening in on the communications channel could read it. She could encrypt it, but still the document has to sit in Trent&#146;s database. Who knows how secure that database is?</P>
<P>Second, the database itself would have to be huge. And the bandwidth requirements to send large documents to Trent would be unwieldy.</P>
<P>The third problem has to do with the potential errors. An error in transmission, or an electromagnetic bomb detonating somewhere in Trent&#146;s central computers, could completely invalidate Alice&#146;s claim of a timestamp.</P>
<P>And fourth, there might not be someone as honest as Trent to run the timestamping service. Maybe Alice is using Bob&#146;s Timestamp and Taco Stand. There is nothing to stop Alice and Bob from colluding and timestamping a document with any time that they want.</P>
<P><FONT SIZE="+1"><B><I>Improved Arbitrated Solution</I></B></FONT></P>
<P>One-way hash functions and digital signatures can clear up most of these problems easily:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice produces a one-way hash of the document.
<DD><B>(2)</B>&nbsp;&nbsp;Alice transmits the hash to Trent.
<DD><B>(3)</B>&nbsp;&nbsp;Trent appends the date and time he received the hash onto the hash and then digitally signs the result.
<DD><B>(4)</B>&nbsp;&nbsp;Trent sends the signed hash with timestamp back to Alice.
</DL>
<P>This solves every problem but the last. Alice no longer has to worry about revealing the contents of her document; the hash is sufficient. Trent no longer has to store copies of the document (or even of the hash), so the massive storage requirements and security problems are solved (remember, one-way hash functions don&#146;t have a key). Alice can immediately examine the signed timestamped hash she receives in step (4), so she will immediately catch any transmission errors. The only problem remaining is that Alice and Trent can still collude to produce any timestamp they want.
</P>
<P><FONT SIZE="+1"><B><I>Linking Protocol</I></B></FONT></P>
<P>One way to solve this problem is to link Alice&#146;s timestamp with timestamps previously generated by Trent. These timestamps will most probably be generated for people other than Alice. Since the order that Trent receives the different timestamp requests can&#146;t be known in advance, Alice&#146;s timestamp must have occurred after the previous one. And since the request that came after is linked with Alice&#146;s timestamp, then hers must have occurred before. This sandwiches Alice&#146;s request in time.
</P>
<P>If <I>A</I> is Alice&#146;s name, the hash value that Alice wants timestamped is <I>H</I><SUB>n</SUB>, and the previous time stamp is <I>T</I><SUB>n - 1</SUB>, then the protocol is:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice sends Trent <I>H</I><SUB>n</SUB> and <I>A</I>.
<DD><B>(2)</B>&nbsp;&nbsp;Trent sends back to Alice:
<DL>
<DD><I>T</I><SUB>n</SUB> = <I>S</I><SUB>K</SUB>(<I>n,A,H</I><SUB>n</SUB>,<I>t</I><SUB>n</SUB>,<I>I</I><SUB>n - 1</SUB>,<I>H</I><SUB>n - 1</SUB>,<I>T</I><SUB>n - 1</SUB>,<I>L</I><SUB>n</SUB>)
</DL>
<BR>where <I>L</I><SUB>n</SUB> consists of the following hashed linking information:
<DL>
<DD><I>L</I><SUB>n</SUB> = <I>H</I>(<I>I</I><SUB>n - 1</SUB>,<I>H</I><SUB>n - 1</SUB>,<I>T</I><SUB>n - 1</SUB>,<I>L</I><SUB>n - 1</SUB>)
</DL>
<BR><I>S</I><SUB>K</SUB> indicates that the message is signed with Trent&#146;s private key. Alice&#146;s name identifies her as the originator of the request. The parameter <I>n</I> indicates the sequence of the request: This is the <I>n</I>th timestamp Trent has issued. The parameter <I>t</I><SUB>n</SUB> is the time. The additional information is the identification, original hash, time, and hashed timestamp of the previous document Trent stamped.
<DD><B>(3)</B>&nbsp;&nbsp;After Trent stamps the next document, he sends Alice the identification of the originator of that document: <I>I</I><SUB>n &#43; 1</SUB>.
</DL>
<P>If someone challenges Alice&#146;s timestamp, she just contacts the originators of the previous and following documents: <I>I</I><SUB>n - 1</SUB> and <I>I</I><SUB>n &#43; 1</SUB>. If their documents are called into question, they can get in touch with <I>I</I><SUB>n - 2</SUB> and <I>I</I><SUB>n &#43; 2</SUB>, and so on. Every person can show that their document was timestamped after the one that came before and before the one that came after.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch03/03-13.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="04-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲成人av中文| 免费成人av在线播放| 国产精品乱码人人做人人爱 | 免费人成精品欧美精品| 精品一区二区三区免费| 粗大黑人巨茎大战欧美成人| 色欧美片视频在线观看在线视频| 91精品国产综合久久久久久久久久| 精品国产成人系列| 亚洲柠檬福利资源导航| 全部av―极品视觉盛宴亚洲| 国产成人在线看| 欧美日韩成人综合| 国产三级三级三级精品8ⅰ区| 亚洲久草在线视频| 国产一区二区91| 欧美精品视频www在线观看 | 欧美日韩精品二区第二页| 久久亚洲二区三区| 亚洲一区在线视频观看| 国产福利电影一区二区三区| 欧美日韩一区高清| 国产精品色在线观看| 免费黄网站欧美| 在线观看日产精品| 国产欧美一区在线| 蜜臀av一区二区在线观看| 91蜜桃免费观看视频| 国产三级一区二区| 韩国三级中文字幕hd久久精品| 在线观看三级视频欧美| 国产精品乱人伦一区二区| 精品夜夜嗨av一区二区三区| 欧美美女bb生活片| 亚洲乱码中文字幕| 成人动漫精品一区二区| 国产亚洲自拍一区| 久久不见久久见中文字幕免费| 在线日韩av片| 亚洲欧美国产毛片在线| 成人午夜激情在线| 久久久久亚洲综合| 国产综合色视频| 久久影院电视剧免费观看| 日本成人在线看| 欧美日韩国产综合久久| 一区二区三区在线视频观看58| 99视频热这里只有精品免费| 国产精品女同互慰在线看| 国产精品一区二区在线看| 日韩欧美第一区| 麻豆91精品视频| 欧美va日韩va| 久久国产综合精品| 久久亚洲精华国产精华液| 极品美女销魂一区二区三区 | 日本一区二区三区国色天香 | 国产精品一线二线三线精华| www激情久久| 国产99久久久国产精品潘金| 国产清纯白嫩初高生在线观看91| 国产精品1区2区3区| 国产欧美日韩综合精品一区二区| 国产成人三级在线观看| 中文字幕国产一区| av爱爱亚洲一区| 亚洲五月六月丁香激情| 欧美精品三级日韩久久| 蜜臀av性久久久久蜜臀av麻豆| 日韩欧美你懂的| 国产高清精品在线| 1000精品久久久久久久久| 色婷婷激情一区二区三区| 亚洲韩国一区二区三区| 欧美一级日韩一级| 国产精品一区二区三区乱码| 国产女主播视频一区二区| 色呦呦国产精品| 日韩黄色免费电影| 久久综合九色综合欧美就去吻| 成人av电影在线| 亚洲第一av色| 国产欧美日产一区| 欧美日韩在线播| 国产麻豆91精品| 亚洲国产综合在线| 久久精品人人做人人爽97| 色综合久久天天| 美女爽到高潮91| 中文字幕一区二区三区av| 欧美三级资源在线| 国产伦理精品不卡| 亚洲mv在线观看| 久久久美女毛片| 欧美午夜寂寞影院| 国产精品一区久久久久| 亚洲自拍欧美精品| 久久一区二区三区国产精品| 91热门视频在线观看| 男人操女人的视频在线观看欧美 | 成人av网站大全| 丝袜a∨在线一区二区三区不卡| 久久久www免费人成精品| 欧美专区日韩专区| 丁香另类激情小说| 日本色综合中文字幕| 国产精品久久久一本精品| 欧美一二三区在线| 在线亚洲高清视频| 成人av网站免费观看| 久久精品国产77777蜜臀| 夜夜亚洲天天久久| 国产精品乱码人人做人人爱| 日韩精品一区二区三区老鸭窝| 91久久精品一区二区三| 成人美女在线观看| 精品一二线国产| 奇米精品一区二区三区四区| 尤物视频一区二区| 国产精品美女一区二区| 久久综合狠狠综合| 日韩欧美三级在线| 91精品久久久久久久99蜜桃| 欧美伊人久久久久久午夜久久久久| 成人av一区二区三区| 成人性生交大片免费看中文 | 久久久不卡网国产精品二区| 欧美剧情电影在线观看完整版免费励志电影| 成人综合婷婷国产精品久久蜜臀 | 青青草原综合久久大伊人精品优势| 中文字幕人成不卡一区| 久久精子c满五个校花| 精品欧美一区二区三区精品久久| 7777精品伊人久久久大香线蕉最新版 | 国内精品伊人久久久久av影院| 日韩电影在线免费观看| 亚洲一二三四在线| 亚洲一区二区三区四区在线观看| 亚洲乱码国产乱码精品精98午夜| 国产精品不卡在线观看| 亚洲国产激情av| 国产精品拍天天在线| 国产精品丝袜91| 国产精品福利av| 亚洲三级理论片| 一二三区精品视频| 日韩和欧美一区二区三区| 午夜日韩在线观看| 日韩精彩视频在线观看| 蓝色福利精品导航| 国产一区二区三区在线看麻豆| 国产精品自产自拍| 成人国产精品免费观看视频| 91网站最新网址| 欧美中文字幕亚洲一区二区va在线| 91福利视频网站| 欧美巨大另类极品videosbest | 午夜不卡在线视频| 日韩高清在线不卡| 精品影视av免费| 国产99久久久精品| 色综合久久中文字幕| 欧美夫妻性生活| 欧美精品一区二| 国产精品夫妻自拍| 午夜精品免费在线| 国产真实乱子伦精品视频| 日本高清免费不卡视频| 欧美日本视频在线| 精品88久久久久88久久久| 国产拍揄自揄精品视频麻豆| 亚洲精品视频在线观看网站| 亚洲国产精品影院| 精品伊人久久久久7777人| 成年人午夜久久久| 欧美日韩国产另类不卡| 精品国产免费人成电影在线观看四季| 国产亚洲短视频| 亚洲一区二区三区三| 精品一区二区三区免费观看| 97精品视频在线观看自产线路二| 欧美系列亚洲系列| 久久伊人蜜桃av一区二区| 一区二区在线观看免费视频播放| 日韩精品久久久久久| 国产不卡在线一区| 精品视频一区二区不卡| 久久久久久久久99精品| 一区二区三区高清在线| 久久黄色级2电影| 91黄色免费版| 国产欧美日韩卡一| 青青草国产成人99久久| 91麻豆蜜桃一区二区三区| 日韩视频在线你懂得| 亚洲日本电影在线| 韩国一区二区视频| 欧美另类变人与禽xxxxx| 中文字幕在线观看一区| 精品一区在线看|