亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 04-07.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Intermediate Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=04//-->
<!--PAGES=089-091//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="04-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="04-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading11"></A><FONT COLOR="#000077">4.10 Fair Coin Flips</FONT></H3>
<P>It&#146;s story time with Joe Kilian [831]:
</P>
<BLOCKQUOTE><P>Alice and Bob wanted to flip a fair coin, but had no physical coin to flip. Alice offered a simple way of flipping a fair coin mentally.
</P>
<P>&#147;First, you think up a random bit, then I&#146;ll think up a random bit. We&#146;ll then exclusive-or the two bits together, &#148; she suggested.</P>
<P>&#147;But what if one of us doesn&#146;t flip a coin at random?&#148; Bob asked.</P>
<P>&#147;It doesn&#146;t matter. As long as one of the bits is truly random, the exclusive-or of the bits should be truly random, &#148; Alice replied, and after a moment&#146;s reflection, Bob agreed.</P>
<P>A short while later, Alice and Bob happened upon a book on artificial intelligence, lying abandoned by the roadside. A good citizen, Alice said, &#147;One of us must pick this book up and find a suitable waste receptacle.&#148; Bob agreed, and suggested they use their coin-flipping protocol to determine who would have to throw the book away.</P>
<P>&#147;If the final bit is a 0, then you will pick the book up, and if it is a 1, then I will, &#148; said Alice. &#147;What is your bit?&#148;</P>
<P>Bob replied, &#147;1.&#148;</P>
<P>&#147;Why, so is mine, &#148; said Alice, slyly, &#147;I guess this isn&#146;t your lucky day.&#148;</P>
<P>Needless to say, this coin-flipping protocol had a serious bug. While it is true that a truly random bit, <I>x</I>, exclusive<I>-OR</I>ed with any independently distributed bit, <I>y</I>, will yield a truly random bit, Alice&#146;s protocol did not ensure that the two bits were distributed independently. In fact, it is not hard to verify that no mental protocol can allow two infinitely powerful parties to flip a fair coin. Alice and Bob were in trouble until they received a letter from an obscure graduate student in cryptography. The information in the letter was too theoretical to be of any earthly use to anyone, but the envelope the letter came in was extremely handy.</P>
<P>The next time Alice and Bob wished to flip a coin, they played a modified version of the original protocol. First, Bob decided on a bit, but instead of announcing it immediately, he wrote it down on a piece of paper and placed the paper in the envelope. Next, Alice announced her bit. Finally, Alice and Bob took Bob&#146;s bit out of the envelope and computed the random bit. This bit was indeed truly random whenever at least one of them played honestly. Alice and Bob had a working protocol, the cryptographer&#146;s dream of social relevance was fulfilled, and they all lived happily ever after.</P>
</BLOCKQUOTE><P>Those envelopes sound a lot like bit-commitment blobs. When Manuel Blum introduced the problem of flipping a fair coin over a modem [194], he solved it using a bit-commitment protocol:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice commits to a random bit, using any of the bit-commitment schemes listed in Section 4.9.
<DD><B>(2)</B>&nbsp;&nbsp;Bob tries to guess the bit.
<DD><B>(3)</B>&nbsp;&nbsp;Alice reveals the bit to Bob. Bob wins the flip if he correctly guessed the bit.
</DL>
<P>In general, we need a protocol with these properties:
</P>
<DL>
<DD><B>&#151;</B>&nbsp;&nbsp;Alice must flip the coin before Bob guesses.
<DD><B>&#151;</B>&nbsp;&nbsp;Alice must not be able to re-flip the coin after hearing Bob&#146;s guess.
<DD><B>&#151;</B>&nbsp;&nbsp;Bob must not be able to know how the coin landed before making his guess.
</DL>
<P>There are several ways in which we can do this.
</P>
<P><FONT SIZE="+1"><B><I>Coin Flipping Using One-Way Functions</I></B></FONT></P>
<P>If Alice and Bob can agree on a one-way function, this protocol is simple:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice chooses a random number, <I>x</I>. She computes <I>y</I> = <I>f</I>(<I>x</I>), where <I>f</I>(<I>x</I>) is the one-way function.
<DD><B>(2)</B>&nbsp;&nbsp;Alice sends <I>y</I> to Bob.
<DD><B>(3)</B>&nbsp;&nbsp;Bob guesses whether <I>x</I> is even or odd and sends his guess to Alice.
<DD><B>(4)</B>&nbsp;&nbsp;If Bob&#146;s guess is correct, the result of the coin flip is heads. If Bob&#146;s guess is incorrect, the result of the coin flip is tails. Alice announces the result of the coin flip and sends <I>x</I> to Bob.
<DD><B>(5)</B>&nbsp;&nbsp;Bob confirms that <I>y</I> = <I>f</I>(<I>x</I>).
</DL>
<P>The security of this protocol rests in the one-way function. If Alice can find <I>x</I> and <I>x&#180;</I>, such that <I>x</I> is even and <I>x&#180;</I> is odd, and <I>y</I> = <I>f</I>(<I>x</I>) = <I>f</I>(<I>x&#180;</I>), then she can cheat Bob every time. The least significant bit of <I>f</I>(<I>x</I>) must also be uncorrelated with <I>x</I>. If not, Bob can cheat Alice at least some of the time. For example, if <I>f</I>(<I>x</I>) produces even numbers 75 percent of the time if <I>x</I> is even, Bob has an advantage. (Sometimes the least significant bit is not the best one to use in this application, because it can be easier to compute.)</P>
<P><FONT SIZE="+1"><B><I>Coin Flipping Using Public-Key Cryptography</I></B></FONT></P>
<P>This protocol works with either public-key cryptography or symmetric cryptography. The only requirement is that the algorithm commute. That is:
</P>
<DL>
<DD><I>D</I><SUB>K1</SUB>(<I>E</I><SUB>K2</SUB>(<I>E</I><SUB>K1</SUB>(<I>M</I>))) = <I>E</I><SUB>K2</SUB>(<I>M</I>)
</DL>
<P>In general, this property is not true for symmetric algorithms, but it is true for some public-key algorithms (RSA with identical moduli, for example). This is the protocol:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice and Bob each generate a public-key/private-key key pair.
<DD><B>(2)</B>&nbsp;&nbsp;Alice generates two messages, one indicating heads and the other indicating tails. These messages should contain some unique random string, so that she can verify their authenticity later in the protocol. Alice encrypts both messages with her public key and sends them to Bob in a random order.
<DL>
<DD><I>E</I><SUB>A</SUB>(<I>M</I><SUB>1</SUB>), <I>E</I><SUB>A</SUB>(<I>M</I><SUB>2</SUB>)
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Bob, who cannot read either message, chooses one at random. (He can sing &#147;eeny meeny miney moe, &#148; engage a malicious computer intent on subverting the protocol, or consult the <I>I Ching</I>&#151;it doesn&#146;t matter.) He encrypts it with his public key and sends it back to Alice.
<DL>
<DD><I>E</I><SUB>B</SUB>(<I>E</I><SUB>A</SUB>(<I>M</I>))
</DL>
<BR><I>M</I> is either <I>M</I><SUB>1</SUB> or <I>M</I><SUB>2</SUB>.
<DD><B>(4)</B>&nbsp;&nbsp;Alice, who cannot read the message sent back to her, decrypts it with her private key and then sends it back to Bob.
<DL>
<DD><I>D</I><SUB>A</SUB>(<I>E</I><SUB>B</SUB>(<I>E</I><SUB>A</SUB>(<I>M</I>))) = <I>E</I><SUB>B</SUB>(<I>M</I><SUB>1</SUB>) if <I>M</I> = <I>M</I><SUB>1</SUB>, or
<DD><I>E</I><SUB>B</SUB>(<I>M</I><SUB>2</SUB>) if <I>M</I> = <I>M</I><SUB>2</SUB>
</DL>
<DD><B>(5)</B>&nbsp;&nbsp;Bob decrypts the message with his private key to reveal the result of the coin flip. He sends the decrypted message to Alice.
<DL>
<DD><I>D</I><SUB>B</SUB>(<I>E</I><SUB>B</SUB>(<I>M</I><SUB>1</SUB>)) = <I>M</I><SUB>1</SUB> or <I>D</I><SUB>B</SUB>(<I>E</I><SUB>B</SUB>(<I>M</I><SUB>2</SUB>)) = <I>M</I><SUB>2</SUB>
</DL>
<DD><B>(6)</B>&nbsp;&nbsp;Alice reads the result of the coin flip and verifies that the random string is correct.
<DD><B>(7)</B>&nbsp;&nbsp;Both Alice and Bob reveal their key pairs so that both can verify that the other did not cheat.
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="04-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="04-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久久久久久久一| 中文字幕亚洲一区二区va在线| 国产91精品一区二区麻豆网站 | 久久一留热品黄| 99国产一区二区三精品乱码| 韩国中文字幕2020精品| 亚洲综合另类小说| 国产精品灌醉下药二区| 26uuu国产在线精品一区二区| 在线观看日韩一区| 成人一级片在线观看| 卡一卡二国产精品 | 国产精品一二三四| 另类欧美日韩国产在线| 亚洲最新在线观看| 亚洲另类春色国产| 中文字幕成人在线观看| 2021久久国产精品不只是精品| 欧美老肥妇做.爰bbww| 91麻豆国产福利在线观看| 国产成人av电影在线| 理论片日本一区| 免费日本视频一区| 免费成人在线影院| 日韩国产高清在线| 亚洲成人自拍网| 亚洲国产精品久久人人爱 | 亚洲va欧美va天堂v国产综合| 亚洲三级在线观看| 亚洲日本免费电影| 国产精品福利一区| 国产精品蜜臀av| 国产精品进线69影院| 中国色在线观看另类| 国产精品免费av| 中文在线一区二区 | 狠狠色综合日日| 久久91精品国产91久久小草| 另类的小说在线视频另类成人小视频在线| 亚洲成人在线免费| 亚洲成人激情综合网| 天天av天天翘天天综合网色鬼国产| 亚洲无线码一区二区三区| 亚洲国产精品久久艾草纯爱| 亚洲福利电影网| 偷拍一区二区三区| 久久精品国产99国产精品| 精品一区二区三区不卡| 国产成人午夜电影网| www.欧美色图| 色94色欧美sute亚洲线路二| 欧美日韩一区二区在线观看视频| 欧美丰满嫩嫩电影| 精品少妇一区二区三区日产乱码| 337p日本欧洲亚洲大胆色噜噜| 国产亚洲欧洲一区高清在线观看| 欧美激情综合在线| 亚洲欧美另类在线| 日本在线播放一区二区三区| 国产露脸91国语对白| av一区二区三区| 欧美精品日韩综合在线| 日韩欧美激情在线| 国产精品久久久久7777按摩| 亚洲国产精品久久久久秋霞影院| 日本欧美一区二区三区| 国产凹凸在线观看一区二区| 色哟哟一区二区在线观看| 3d动漫精品啪啪一区二区竹菊| 日韩免费视频一区二区| 国产精品美女久久久久久久网站| 亚洲高清免费在线| 国产美女在线精品| 色呦呦一区二区三区| 精品剧情v国产在线观看在线| 亚洲国产精品99久久久久久久久| 亚洲国产美女搞黄色| 国产乱色国产精品免费视频| 色综合久久88色综合天天免费| 欧美一区二区免费| 国产精品久久777777| 日韩国产精品久久久| 99久久免费国产| 欧美成人一区二区三区片免费| 亚洲三级在线免费观看| 久久精品国产精品青草| 91麻豆swag| 久久先锋资源网| 香蕉加勒比综合久久| 国产成人av电影在线观看| 欧美日韩一卡二卡三卡 | 欧美韩日一区二区三区四区| 亚洲综合色丁香婷婷六月图片| 韩国女主播成人在线观看| 欧美色涩在线第一页| 欧美激情中文字幕| 蜜桃在线一区二区三区| 在线视频一区二区三区| 中文字幕va一区二区三区| 免费在线观看精品| 91黄色激情网站| 中文字幕一区二区三区精华液| 久久99日本精品| 欧美日韩亚洲另类| 亚洲色图丝袜美腿| 成人黄色一级视频| 精品国产免费视频| 免费在线观看精品| 欧美高清你懂得| 一级精品视频在线观看宜春院| 成人免费看片app下载| 精品久久久久久综合日本欧美| 三级一区在线视频先锋 | 99久久精品免费观看| 久久久天堂av| 久久99精品久久久久久动态图| 欧美午夜寂寞影院| 亚洲一区二区视频在线观看| www.欧美日韩| 中文字幕在线视频一区| 国产精品456| 国产亚洲精品精华液| 九色|91porny| 欧美不卡一二三| 免费不卡在线视频| 91精品国产丝袜白色高跟鞋| 亚洲成人av在线电影| 欧美人体做爰大胆视频| 亚洲一区二区三区国产| 欧美日韩国产123区| 五月综合激情网| 欧美日韩国产精品成人| 日本亚洲一区二区| 欧美一区二区三区播放老司机| 99久久亚洲一区二区三区青草| 国产亚洲成年网址在线观看| 国产精品一区二区你懂的| 国产亚洲一区二区三区| 粉嫩嫩av羞羞动漫久久久| 国产精品国产三级国产aⅴ中文| 暴力调教一区二区三区| 亚洲免费观看视频| 91久久精品国产91性色tv| 亚洲图片欧美一区| 欧美日韩中字一区| 免费人成网站在线观看欧美高清| 精品日本一线二线三线不卡| 韩国在线一区二区| 国产精品你懂的在线| 色综合天天做天天爱| 一区二区三区在线影院| 91麻豆精品国产| 久久国产麻豆精品| 国产欧美日韩另类一区| 91在线视频免费观看| 亚洲美女视频在线观看| 91超碰这里只有精品国产| 麻豆视频一区二区| 国产日韩欧美精品电影三级在线 | 日韩欧美国产一二三区| 久久国产精品第一页| 久久日韩精品一区二区五区| 99热精品一区二区| 午夜精品久久久久久久99樱桃| 精品成人在线观看| 不卡视频在线观看| 图片区日韩欧美亚洲| 国产日韩欧美亚洲| 欧美三级韩国三级日本一级| 韩国理伦片一区二区三区在线播放| 国产精品国产三级国产a| 欧美蜜桃一区二区三区| 国产在线视视频有精品| 亚洲免费在线视频| 日韩你懂的在线播放| 91亚洲大成网污www| 麻豆成人免费电影| 中文字幕精品一区二区三区精品 | 欧美国产日韩精品免费观看| 91在线视频播放地址| 捆绑变态av一区二区三区| 国产精品狼人久久影院观看方式| 欧美日韩专区在线| 成人福利视频在线| 日本欧美在线看| 亚洲欧美另类久久久精品| 欧美α欧美αv大片| 色一情一伦一子一伦一区| 狠狠色丁香久久婷婷综合_中 | 国产91精品在线观看| 亚洲电影第三页| 亚洲欧洲三级电影| 欧美精品一区二区三区四区 | 国产精品久久精品日日| 欧美一区2区视频在线观看| av资源网一区| 久久66热re国产| 日韩黄色在线观看| 一卡二卡三卡日韩欧美| 国产精品欧美一区喷水|