亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 04-06.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Intermediate Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=04//-->
<!--PAGES=086-088//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="04-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="04-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>To make this work, Alice had to switch envelopes at the end of the trick. However, cryptographic protocols can provide a method immune from any sleight of hand. Why is this useful? Here&#146;s a more mundane story:
</P>
<P>Stockbroker Alice wants to convince investor Bob that her method of picking winning stocks is sound.</P>
<BLOCKQUOTE><P>Bob: &#147;Pick five stocks for me. If they are all winners, I&#146;ll give you my business.&#148;
</P>
<P>Alice: &#147;If I pick five stocks for you, you could invest in them without paying me. Why don&#146;t I show you the stocks I picked last month?&#148;</P>
<P>Bob: &#147;How do I know you didn&#146;t change last month&#146;s picks after you knew their outcome? If you tell me your picks now, I&#146;ll know that you can&#146;t change them. I won&#146;t invest in those stocks until after I&#146;ve purchased your method. Trust me.&#148;</P>
<P>Alice: &#147;I&#146;d rather show you my picks from last month. I didn&#146;t change them. Trust me.&#148;</P>
</BLOCKQUOTE><P>Alice wants to commit to a prediction (i.e., a bit or series of bits) but does not want to reveal her prediction until sometime later. Bob, on the other hand, wants to make sure that Alice cannot change her mind after she has committed to her prediction.
</P>
<P><FONT SIZE="+1"><B><I>Bit Commitment Using Symmetric Cryptography</I></B></FONT></P>
<P>This bit-commitment protocol uses symmetric cryptography:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Bob generates a random-bit string, <I>R</I>, and sends it to Alice.
<DL>
<DD><I>R</I>
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Alice creates a message consisting of the bit she wishes to commit to, <I>b</I> (it can actually be several bits), and Bob&#146;s random string. She encrypts it with some random key, <I>K</I>, and sends the result back to Bob.
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>R,b</I>)
</DL>
</DL>
<P>That is the commitment portion of the protocol. Bob cannot decrypt the message, so he does not know what the bit is.
</P>
<P>When it comes time for Alice to reveal her bit, the protocol continues:</P>
<DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice sends Bob the key.
<DD><B>(4)</B>&nbsp;&nbsp;Bob decrypts the message to reveal the bit. He checks his random string to verify the bit&#146;s validity.
</DL>
<P>If the message did not contain Bob&#146;s random string, Alice could secretly decrypt the message she handed Bob with a variety of keys until she found one that gave her a bit other than the one she committed to. Since the bit has only two possible values, she is certain to find one after only a few tries. Bob&#146;s random string prevents her from using this attack; she has to find a new message that not only has her bit inverted, but also has Bob&#146;s random string exactly reproduced. If the encryption algorithm is good, the chance of her finding this is minuscule. Alice cannot change her bit after she commits to it.
</P>
<P><FONT SIZE="+1"><B><I>Bit Commitment Using One-Way Functions</I></B></FONT></P>
<P>This protocol uses one-way functions:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice generates two random-bit strings, <I>R</I><SUB>1</SUB> and <I>R</I><SUB>2</SUB>.
<DL>
<DD><I>R</I><SUB>1</SUB>,<I>R</I><SUB>2</SUB>
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Alice creates a message consisting of her random strings and the bit she wishes to commit to (it can actually be several bits).
<DL>
<DD>(<I>R</I><SUB>1</SUB>,<I>R</I><SUB>2</SUB>,<I>b</I>)
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice computes the one-way function on the message and sends the result, as well as one of the random strings, to Bob.
<DL>
<DD><I>H</I>(<I>R</I><SUB>1</SUB>,<I>R</I><SUB>2</SUB>,<I>b</I>),<I>R</I><SUB>1</SUB>
</DL>
</DL>
<P>This transmission from Alice is evidence of commitment. Alice&#146;s one-way function in step (3) prevents Bob from inverting the function and determining the bit.
</P>
<P>When it comes time for Alice to reveal her bit, the protocol continues:</P>
<DL>
<DD><B>(4)</B>&nbsp;&nbsp;Alice sends Bob the original message.
<DL>
<DD>(<I>R</I><SUB>1</SUB>,<I>R</I><SUB>2</SUB>,<I>b</I>)
</DL>
<DD><B>(5)</B>&nbsp;&nbsp;Bob computes the one-way function on the message and compares it and <I>R</I><SUB>1</SUB>, with the value and random string he received in step (3). If they match, the bit is valid.
</DL>
<P>The benefit of this protocol over the previous one is that Bob does not have to send any messages. Alice sends Bob one message to commit to a bit and another message to reveal the bit.
</P>
<P>Bob&#146;s random string isn&#146;t required because the result of Alice&#146;s commitment is a message operated on by a one-way function. Alice cannot cheat and find another message (<I>R</I><SUB>1</SUB>,<I>R</I><SUB>2</SUB>&#180;,<I>b&#180;</I>), such that <I>H</I>(<I>R</I><SUB>1</SUB>,<I>R</I><SUB>2</SUB>&#180;,<I>b&#180;</I>) = <I>H</I>(<I>R</I><SUB>1</SUB>,<I>R</I><SUB>2</SUB>,<I>b</I>). By sending Bob <I>R</I><SUB>1</SUB> she is committing to the value of <I>b</I>. If Alice didn&#146;t keep <I>R</I><SUB>2</SUB> secret, then Bob could compute both <I>H</I>(<I>R</I><SUB>1</SUB>,<I>R</I><SUB>2,</SUB><I>b</I>) and <I>H</I>(<I>R</I><SUB>1</SUB>,<I>R</I><SUB>2</SUB>,<I>b&#180;</I>) and see which was equal to what he received from Alice.</P>
<P><FONT SIZE="+1"><B><I>Bit Commitment Using Pseudo-Random-Sequence Generators</I></B></FONT></P>
<P>This protocol is even easier [1137]:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Bob generates a random-bit string and sends it to Alice.
<DL>
<DD><I>R</I><SUB>B</SUB>
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Alice generates a random seed for a pseudo-random-bit generator. Then, for every bit in Bob&#146;s random-bit string, she sends Bob either:
<DL>
<DD>(a) the output of the generator if Bob&#146;s bit is 0, or
<DD>(b) the XOR of output of the generator and her bit, if Bob&#146;s bit is 1.
</DL>
</DL>
<P>When it comes time for Alice to reveal her bit, the protocol continues:
</P>
<DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice sends Bob her random seed.
<DD><B>(4)</B>&nbsp;&nbsp;Bob completes step (2) to confirm that Alice was acting fairly.
</DL>
<P>If Bob&#146;s random-bit string is long enough, and the pseudo-random-bit generator is unpredictable, then there is no practical way Alice can cheat.
</P>
<P><FONT SIZE="+1"><B><I>Blobs</I></B></FONT></P>
<P>These strings that Alice sends to Bob to commit to a bit are sometimes called <B>blobs</B>. A blob is a sequence of bits, although there is no reason in the protocols why it has to be. As Gilles Brassard said, &#147;They could be made out of fairy dust if this were useful&#148; [236]. Blobs have these four properties:</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;Alice can commit to blobs. By committing to a blob, she is committing to a bit.
<DD><B>2.</B>&nbsp;&nbsp;Alice can open any blob she has committed to. When she opens a blob, she can convince Bob of the value of the bit she committed to when she committed to the blob. Thus, she cannot choose to open any blob as either a zero or a one.
<DD><B>3.</B>&nbsp;&nbsp;Bob cannot learn how Alice is able to open any unopened blob she has committed to. This is true even after Alice has opened other blobs.
<DD><B>4.</B>&nbsp;&nbsp;Blobs do not carry any information other than the bit Alice committed to. The blobs themselves, as well as the process by which Alice commits to and opens them, are uncorrelated to anything else that Alice might wish to keep secret from Bob.
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="04-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="04-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久午夜老司机| 91.com视频| 国产精品久久久久毛片软件| 国产成人一区二区精品非洲| 国产亲近乱来精品视频| 国产69精品久久久久毛片 | 国产又粗又猛又爽又黄91精品| 日韩欧美一二三| 国产精品香蕉一区二区三区| 中文子幕无线码一区tr| 色综合网站在线| 日韩国产高清在线| 国产日韩欧美一区二区三区乱码 | 久久精品久久精品| 久久嫩草精品久久久久| 91影视在线播放| 视频一区二区国产| 久久久久亚洲综合| 在线观看欧美日本| 激情久久久久久久久久久久久久久久| 久久免费视频色| 91精品91久久久中77777| 肉色丝袜一区二区| 国产人成亚洲第一网站在线播放| 94-欧美-setu| 日韩成人av影视| 国产免费成人在线视频| 欧美日韩国产在线观看| 国产一区二区三区综合| 一区二区三区在线观看动漫| 日韩欧美你懂的| 色综合久久久久网| 久久国产精品99久久人人澡| 综合激情网...| 日韩一区二区三区四区| 99国内精品久久| 九九在线精品视频| 亚洲精品欧美综合四区| 精品国产网站在线观看| 欧日韩精品视频| 国产经典欧美精品| 免费成人小视频| 一区二区三区丝袜| 久久精品夜色噜噜亚洲a∨| 欧美图片一区二区三区| 波多野结衣亚洲一区| 激情综合网天天干| 亚洲成年人影院| 中文字幕一区二区不卡| 欧美www视频| 欧美日本国产一区| 色香色香欲天天天影视综合网| 国产一区二区精品久久| 日日摸夜夜添夜夜添国产精品| 亚洲欧洲一区二区在线播放| 欧美mv和日韩mv的网站| 欧美美女视频在线观看| 91久久奴性调教| 不卡欧美aaaaa| 国产98色在线|日韩| 国产一区二区看久久| 麻豆91小视频| 青青草一区二区三区| 亚洲va欧美va天堂v国产综合| 136国产福利精品导航| 久久精品一级爱片| 久久久久久久久久久久久久久99 | 欧美精品黑人性xxxx| 91官网在线观看| 色欧美片视频在线观看| www.视频一区| caoporn国产一区二区| 成人永久免费视频| 国产91丝袜在线观看| 岛国一区二区在线观看| 国产精品自拍毛片| 国产精品一区在线| 国产精品亚洲人在线观看| 韩国成人福利片在线播放| 精品中文字幕一区二区小辣椒| 青草av.久久免费一区| 日韩精品电影一区亚洲| 奇米精品一区二区三区在线观看一| 亚洲成在人线在线播放| 亚州成人在线电影| 秋霞电影一区二区| 狠狠色狠狠色综合| 成人性视频网站| 91女神在线视频| 欧美视频日韩视频| 欧美精品123区| 精品免费一区二区三区| 国产性天天综合网| 国产精品久久久久影院老司| 亚洲欧美日韩在线| 亚洲成人免费av| 免费观看成人av| 国产精品91一区二区| 波多野结衣中文一区| 日本道在线观看一区二区| 制服丝袜av成人在线看| 26uuu色噜噜精品一区二区| 国产日韩欧美一区二区三区乱码| 中文字幕中文字幕一区| 亚洲成人三级小说| 精品一区二区三区免费观看| 99久久亚洲一区二区三区青草| 色嗨嗨av一区二区三区| 欧美一区二区福利视频| 日本一区免费视频| 亚洲成人你懂的| 国产精品18久久久久久久久| 一本到不卡免费一区二区| 日韩一级二级三级精品视频| 国产精品看片你懂得| 午夜婷婷国产麻豆精品| 国产毛片精品一区| 91官网在线观看| 久久精品视频网| 天涯成人国产亚洲精品一区av| 国产精品一区二区三区网站| 欧美性xxxxx极品少妇| 久久人人超碰精品| 亚洲国产精品嫩草影院| 国产高清无密码一区二区三区| 欧亚一区二区三区| 国产欧美一区二区三区在线老狼| 亚洲大片一区二区三区| 国产成人午夜视频| 欧美日韩国产电影| 亚洲色图一区二区| 国内外精品视频| 精品视频色一区| 国产精品久久综合| 青青草原综合久久大伊人精品| av男人天堂一区| 精品欧美乱码久久久久久1区2区| 亚洲女爱视频在线| 盗摄精品av一区二区三区| 欧美大胆人体bbbb| 亚洲成av人片在www色猫咪| 成人avav影音| 337p粉嫩大胆色噜噜噜噜亚洲| 亚洲国产一区二区三区青草影视| 国产成人精品亚洲午夜麻豆| 日韩区在线观看| 亚洲成人精品影院| 91成人在线免费观看| 中文字幕在线不卡| 国产成人在线视频网站| 精品国产一区二区三区忘忧草| 午夜精品视频在线观看| 在线视频欧美精品| 亚洲欧美色一区| 99国产精品视频免费观看| 久久亚洲精品国产精品紫薇| 奇米精品一区二区三区在线观看| 欧美三区在线观看| 亚洲福利一二三区| 在线观看日韩电影| 亚洲线精品一区二区三区八戒| 日本大香伊一区二区三区| 亚洲视频中文字幕| thepron国产精品| 欧美国产在线观看| 床上的激情91.| 国产精品网曝门| 成人av在线资源| 国产精品五月天| 91麻豆国产在线观看| 国产精品你懂的在线欣赏| 福利电影一区二区| 国产精品国产三级国产aⅴ原创| 国产98色在线|日韩| 国产精品麻豆欧美日韩ww| 成人免费视频免费观看| 国产精品高潮久久久久无| 99国产精品久久久久久久久久| 亚洲另类在线视频| 欧美优质美女网站| 丝袜亚洲另类欧美| 日韩精品自拍偷拍| 国产一区福利在线| 国产精品福利电影一区二区三区四区| 99久久免费精品高清特色大片| 亚洲精品中文在线观看| 欧美体内she精高潮| 日韩电影在线免费观看| 精品久久久久久久久久久久久久久 | 久久久国产精品午夜一区ai换脸| 成人午夜激情在线| 亚洲区小说区图片区qvod| 欧美色电影在线| 国产在线看一区| 国产精品福利在线播放| 在线视频观看一区| 麻豆精品在线播放| 欧美国产精品劲爆| 精品视频1区2区| 国产剧情一区二区|