亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 04-03.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Intermediate Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=04//-->
<!--PAGES=079-081//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="04-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="04-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>In general the protocol looks like this:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice generates an innocuous message, pretty much at random.
<DD><B>(2)</B>&nbsp;&nbsp;Using a secret key shared with Bob, Alice signs the innocuous message in such a way that she hides her subliminal message in the signature. (This is the meat of the subliminal channel protocol; see Section 23.3.)
<DD><B>(3)</B>&nbsp;&nbsp;Alice sends this signed message to Bob via Walter.
<DD><B>(4)</B>&nbsp;&nbsp;Walter reads the innocuous message and checks the signature. Finding nothing amiss, he passes the signed message to Bob.
<DD><B>(5)</B>&nbsp;&nbsp;Bob checks the signature on the innocuous message, confirming that the message came from Alice.
<DD><B>(6)</B>&nbsp;&nbsp;Bob ignores the innocuous message and, using the secret key he shares with Alice, extracts the subliminal message.
</DL>
<P>What about cheating? Walter doesn&#146;t trust anyone and no one trusts him. He can always prevent communication, but he has no way of introducing phony messages. Since he can&#146;t generate any valid signatures, Bob will detect his attempt in step (5). And since he does not know the shared key, he can&#146;t read the subliminal messages. Even more important, he has no idea that the subliminal messages are there. Signed messages using a digital signature algorithm look no different from signed messages with subliminal messages embedded in the signature.
</P>
<P>Cheating between Alice and Bob is more problematic. In some implementations of a subliminal channel, the secret information Bob needs to read the subliminal message is the same information Alice needs to sign the innocuous message. If this is the case, Bob can impersonate Alice. He can sign messages purporting to come from her, and there is nothing Alice can do about it. If she is to send him subliminal messages, she has to trust him not to abuse her private key.</P>
<P>Other subliminal channel implementations don&#146;t have this problem. A secret key shared by Alice and Bob allows Alice to send Bob subliminal messages, but it is not the same as Alice&#146;s private key and does not allow Bob to sign messages. Alice need not trust Bob not to abuse her private key.</P>
<P><FONT SIZE="+1"><B><I>Applications of Subliminal Channel</I></B></FONT></P>
<P>The most obvious application of the subliminal channel is in a spy network. If everyone sends and receives signed messages, spies will not be noticed sending subliminal messages in signed documents. Of course, the enemy&#146;s spies can do the same thing.
</P>
<P>Using a subliminal channel, Alice could safely sign a document under threat. She would, when signing the document, imbed the subliminal message, saying, &#147;I am being coerced.&#148; Other applications are more subtle. A company can sign documents and embed subliminal messages, allowing them to be tracked throughout the documents&#146; lifespans. The government can &#147;mark&#148; digital cash. A malicious signature program can leak secret information in its signatures. The possibilities are endless.</P>
<P><FONT SIZE="+1"><B><I>Subliminal-Free Signatures</I></B></FONT></P>
<P>Alice and Bob are sending signed messages to each other, negotiating the terms of a contract. They use a digital signature protocol. However, this contract negotiation has been set up as a cover for Alice&#146;s and Bob&#146;s spying activities. When they use the digital signature algorithm, they don&#146;t care about the messages they are signing. They are using a subliminal channel in the signatures to send secret information to each other. The counterespionage service, however, doesn&#146;t know that the contract negotiations and the use of signed messages are just cover-ups. This concern has led people to create <B>subliminal-free signature schemes</B>. These digital signature schemes cannot be modified to contain a subliminal channel. See [480, 481] for details.</P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">4.3 Undeniable Digital Signatures</FONT></H3>
<P>Normal digital signatures can be copied exactly. Sometimes this property is useful, as in the dissemination of public announcements. Other times it could be a problem. Imagine a digitally signed personal or business letter. If many copies of that document were floating around, each of which could be verified by anyone, this could lead to embarrassment or blackmail. The best solution is a digital signature that can be proven valid, but that the recipient cannot show to a third party without the signer&#146;s consent.
</P>
<P>The Alice Software Company distributes DEW (Do-Everything-Word). To ensure that their software is virus-free, they include a digital signature with each copy. However, they want only legitimate buyers of the software, not software pirates, to be able to verify the signature. At the same time, if copies of DEW are found to contain a virus, the Alice Software Company should be unable to deny a valid signature.</P>
<P><B>Undeniable signatures</B> [343, 327] are suited to these sorts of tasks. Like a normal digital signature, an undeniable signature depends on the signed document and the signer&#146;s private key. But unlike normal digital signatures, an undeniable signature cannot be verified without the signer&#146;s consent. Although a better name for these signatures might be something like &#147;nontransferable signatures, &#148; the name comes from the fact that if Alice is forced to either acknowledge or deny a signature&#151;perhaps in court&#151;she cannot falsely deny her real signature.</P>
<P>The mathematics are complicated, but the basic idea is simple:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice presents Bob with a signature.
<DD><B>(2)</B>&nbsp;&nbsp;Bob generates a random number and sends it to Alice.
<DD><B>(3)</B>&nbsp;&nbsp;Alice does a calculation using the random number and her private key and sends Bob the result. Alice could only do this calculation if the signature is valid.
<DD><B>(4)</B>&nbsp;&nbsp;Bob confirms this.
</DL>
<P>There is also an additional protocol so that Alice can prove that she did not sign a document, and cannot falsely deny a signature.
</P>
<P>Bob can&#146;t turn around and convince Carol that Alice&#146;s signature is valid, because Carol doesn&#146;t know that Bob&#146;s numbers are random. He could have easily worked the protocol backwards on paper, without any help from Alice, and then shown Carol the result. Carol can be convinced that Alice&#146;s signature is valid only if she completes the protocol with Alice herself. This might not make much sense now, but it will once you see the mathematics in Section 23.4.</P>
<P>This solution isn&#146;t perfect. Yvo Desmedt and Moti Yung show that it is possible, in some applications, for Bob to convince Carol that Alice&#146;s signature is valid [489].</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="04-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="04-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品一区二区综合| 99re热视频这里只精品| 成人一区二区三区| 色噜噜狠狠色综合中国| 欧美日韩国产成人在线91| 久久午夜电影网| 亚洲一区二区三区不卡国产欧美| 国产电影一区在线| 在线观看91精品国产入口| 久久美女艺术照精彩视频福利播放| 中文字幕在线一区二区三区| 久久精品久久99精品久久| 91免费在线视频观看| 久久这里只有精品视频网| 亚洲成av人片观看| 一本一道久久a久久精品综合蜜臀 一本一道综合狠狠老 | 亚洲天天做日日做天天谢日日欢 | 粉嫩一区二区三区性色av| 欧美区视频在线观看| 亚洲欧美另类综合偷拍| 国产黄色成人av| 欧美成人三级在线| 日韩精品一级中文字幕精品视频免费观看 | 欧美日韩国产a| 中文字幕av免费专区久久| 日韩国产在线观看| 色素色在线综合| 国产日韩欧美精品在线| 国产在线看一区| 欧美一区二区三区喷汁尤物| 午夜精品一区在线观看| 91高清视频免费看| 国产精品乱人伦| 成人h动漫精品| 国产欧美va欧美不卡在线| 国产一区二区调教| 久久久五月婷婷| 国产精品影视天天线| 欧美精品一区二区三区在线| 免费欧美在线视频| 26uuu欧美| 国产在线看一区| 久久精品在这里| 大桥未久av一区二区三区中文| 国产色产综合产在线视频| 韩日精品视频一区| 久久综合色综合88| 国产大片一区二区| 亚洲免费三区一区二区| 一本大道av伊人久久综合| 亚洲精品大片www| 欧美视频一二三区| 91美女片黄在线观看| 国产清纯白嫩初高生在线观看91| 久久成人免费电影| 久久久久99精品一区| 国产福利视频一区二区三区| 国产精品午夜久久| 91丨九色porny丨蝌蚪| 亚洲精品中文在线| 欧美三级在线视频| 国产呦萝稀缺另类资源| 国产精品每日更新在线播放网址| 99久久99久久久精品齐齐| 亚洲一卡二卡三卡四卡| 欧美一区二区三区喷汁尤物| 国产精品白丝av| 一区二区三区四区中文字幕| 欧美日韩午夜影院| 国产裸体歌舞团一区二区| 国产精品国模大尺度视频| 色94色欧美sute亚洲13| 另类小说综合欧美亚洲| 国产精品麻豆久久久| 欧美色图在线观看| 国产精品996| 亚洲婷婷在线视频| 久久影音资源网| 91黄视频在线| 国产精品18久久久久久久久| 一区二区三区四区不卡在线| 日韩欧美电影在线| 91国内精品野花午夜精品| 国内精品久久久久影院薰衣草| 中文字幕一区三区| 精品国产一二三| 欧美性生活一区| a级高清视频欧美日韩| 青青草精品视频| 亚洲综合免费观看高清完整版| 久久这里只有精品首页| 欧美日韩亚洲综合一区| 99精品视频一区| 国产一区二区三区精品欧美日韩一区二区三区| 综合久久国产九一剧情麻豆| 欧美大黄免费观看| 欧美久久久久久久久中文字幕| eeuss国产一区二区三区| 国产一区二区三区四| 日本成人中文字幕在线视频| 悠悠色在线精品| 国产精品久久久久久久久久免费看| 91精品国产欧美一区二区18| 91福利在线播放| 波多野结衣在线aⅴ中文字幕不卡| 九九精品视频在线看| 婷婷丁香激情综合| 亚洲国产精品一区二区www在线| 国产精品传媒入口麻豆| 国产亚洲精品资源在线26u| 欧美电影免费观看高清完整版| 欧美疯狂做受xxxx富婆| 欧美天堂一区二区三区| 91福利小视频| 色94色欧美sute亚洲线路一久| jlzzjlzz亚洲女人18| 99精品国产视频| av激情亚洲男人天堂| 成人白浆超碰人人人人| av一区二区不卡| 99久久er热在这里只有精品15| 国产成人a级片| 国产 欧美在线| 成人午夜看片网址| 岛国av在线一区| 91麻豆国产福利精品| 欧美性欧美巨大黑白大战| 在线观看视频一区二区| 在线看国产一区| 在线精品亚洲一区二区不卡| 欧美日韩成人激情| 欧美成人aa大片| 久久久精品影视| 亚洲人快播电影网| 亚洲一区中文在线| 奇米色一区二区| 国产九色精品成人porny| 福利一区在线观看| 欧美中文字幕一二三区视频| 91精品国产一区二区人妖| 日韩精品一区在线| 国产欧美视频一区二区| 日韩一区在线看| 亚洲1区2区3区视频| 日本一不卡视频| 国产精品资源在线| 色系网站成人免费| 欧美一区二区三区影视| 国产视频一区不卡| 亚洲丰满少妇videoshd| 久久69国产一区二区蜜臀| 成人精品视频一区二区三区| 日本大香伊一区二区三区| 日韩一区二区精品葵司在线| 久久蜜桃av一区精品变态类天堂 | 欧美激情综合网| 一区二区三区蜜桃| 青草国产精品久久久久久| 国产成人在线色| 在线观看日韩毛片| 久久蜜桃一区二区| 亚洲一区二区三区四区中文字幕| 极品少妇xxxx偷拍精品少妇| 色综合欧美在线| 精品久久久久久久久久久久久久久 | 久久久精品免费网站| 一区二区理论电影在线观看| 伦理电影国产精品| 色琪琪一区二区三区亚洲区| 日韩色在线观看| 一区二区三区在线观看国产| 欧美aⅴ一区二区三区视频| 91女厕偷拍女厕偷拍高清| 精品久久久久久久久久久久久久久久久| 国产精品美女久久久久久| 日韩av一区二| 色综合色狠狠天天综合色| 久久色.com| 天堂一区二区在线| 91麻豆视频网站| 国产精品女主播av| 国产精品亚洲第一| 日韩欧美一级二级| 亚洲午夜av在线| 99久久婷婷国产综合精品| 久久久久久久久久久99999| 日韩av在线发布| 欧美精品在线观看一区二区| 日韩美女视频19| 成人精品免费网站| 日本一区二区三区在线不卡| 麻豆一区二区99久久久久| 欧美男同性恋视频网站| 亚洲一区二区三区四区不卡| 成人丝袜高跟foot| 国产精品天干天干在观线| 国产成人在线视频网站| 久久久三级国产网站| 国产精品一二三| 国产欧美一区二区在线|