亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 03-01.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Basic Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=03//-->
<!--PAGES=047-049//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch02/02-11.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="03-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Chapter 3<BR>Basic Protocols
</FONT></H2>
<H3><A NAME="Heading2"></A><FONT COLOR="#000077">3.1 Key Exchange</FONT></H3>
<P>A common cryptographic technique is to encrypt each individual conversation with a separate key. This is called a session key, because it is used for only one particular communications session. As discussed in Section 8.5, session keys are useful because they only exist for the duration of the communication. How this common session key gets into the hands of the conversants can be a complicated matter.
</P>
<P><FONT SIZE="+1"><B><I>Key Exchange with Symmetric Cryptography</I></B></FONT></P>
<P>This protocol assumes that Alice and Bob, users on a network, each share a secret key with the Key Distribution Center (KDC) [1260]&#151;Trent in our protocols. These keys must be in place before the start of the protocol. (The protocol ignores the very real problem of how to distribute these secret keys; just assume they are in place and Mallory has no idea what they are.)
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice calls Trent and requests a session key to communicate with Bob.
<DD><B>(2)</B>&nbsp;&nbsp;Trent generates a random session key. He encrypts two copies of it: one in Alice&#146;s key and the other in Bob&#146;s key. Trent sends both copies to Alice.
<DD><B>(3)</B>&nbsp;&nbsp;Alice decrypts her copy of the session key.
<DD><B>(4)</B>&nbsp;&nbsp;Alice sends Bob his copy of the session key.
<DD><B>(5)</B>&nbsp;&nbsp;Bob decrypts his copy of the session key.
<DD><B>(6)</B>&nbsp;&nbsp;Both Alice and Bob use this session key to communicate securely.
</DL>
<P>This protocol relies on the absolute security of Trent, who is more likely to be a trusted computer program than a trusted individual. If Mallory corrupts Trent, the whole network is compromised. He has all of the secret keys that Trent shares with each of the users; he can read all past communications traffic that he has saved, and all future communications traffic. All he has to do is to tap the communications lines and listen to the encrypted message traffic.
</P>
<P>The other problem with this system is that Trent is a potential bottleneck. He has to be involved in every key exchange. If Trent fails, that disrupts the entire system.</P>
<P><FONT SIZE="+1"><B><I>Key Exchange with Public-Key Cryptography</I></B></FONT></P>
<P>The basic hybrid cryptosystem was discussed in Section 2.5. Alice and Bob use public-key cryptography to agree on a session key, and use that session key to encrypt data. In some practical implementations, both Alice&#146;s and Bob&#146;s signed public keys will be available on a database. This makes the key-exchange protocol even easier, and Alice can send a secure message to Bob even if he has never heard of her:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice gets Bob&#146;s public key from the KDC.
<DD><B>(2)</B>&nbsp;&nbsp;Alice generates a random session key, encrypts it using Bob&#146;s public key, and sends it to Bob.
<DD><B>(3)</B>&nbsp;&nbsp;Bob then decrypts Alice&#146;s message using his private key.
<DD><B>(4)</B>&nbsp;&nbsp;Both of them encrypt their communications using the same session key.
</DL>
<P><FONT SIZE="+1"><B><I>Man-in-the-Middle Attack</I></B></FONT></P>
<P>While Eve cannot do better than try to break the public-key algorithm or attempt a ciphertext-only attack on the ciphertext, Mallory is a lot more powerful than Eve. Not only can he listen to messages between Alice and Bob, he can also modify messages, delete messages, and generate totally new ones. Mallory can imitate Bob when talking to Alice and imitate Alice when talking to Bob. Here&#146;s how the attack works:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice sends Bob her public key. Mallory intercepts this key and sends Bob his own public key.
<DD><B>(2)</B>&nbsp;&nbsp;Bob sends Alice his public key. Mallory intercepts this key and sends Alice his own public key.
<DD><B>(3)</B>&nbsp;&nbsp;When Alice sends a message to Bob, encrypted in &#147;Bob&#146;s&#148; public key, Mallory intercepts it. Since the message is really encrypted with his own public key, he decrypts it with his private key, re-encrypts it with Bob&#146;s public key, and sends it on to Bob.
<DD><B>(4)</B>&nbsp;&nbsp;When Bob sends a message to Alice, encrypted in &#147;Alice&#146;s&#148; public key, Mallory intercepts it. Since the message is really encrypted with his own public key, he decrypts it with his private key, re-encrypts it with Alice&#146;s public key, and sends it on to Alice.
</DL>
<P>Even if Alice&#146;s and Bob&#146;s public keys are stored on a database, this attack will work. Mallory can intercept Alice&#146;s database inquiry and substitute his own public key for Bob&#146;s. He can do the same to Bob and substitute his own public key for Alice&#146;s. Or better yet, he can break into the database surreptitiously and substitute his key for both Alice&#146;s and Bob&#146;s. Then he simply waits for Alice and Bob to talk with each other, intercepts and modifies the messages, and he has succeeded.
</P>
<P>This <B>man-in-the-middle attack</B> works because Alice and Bob have no way to verify that they are talking to each other. Assuming Mallory doesn&#146;t cause any noticeable network delays, the two of them have no idea that someone sitting between them is reading all of their supposedly secret communications.</P>
<P><FONT SIZE="+1"><B><I>Interlock Protocol</I></B></FONT></P>
<P>The <B>interlock protocol</B>, invented by Ron Rivest and Adi Shamir [1327], has a good chance of foiling the man-in-the-middle attack. Here&#146;s how it works:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice sends Bob her public key.
<DD><B>(2)</B>&nbsp;&nbsp;Bob sends Alice his public key.
<DD><B>(3)</B>&nbsp;&nbsp;Alice encrypts her message using Bob&#146;s public key. She sends half of the encrypted message to Bob.
<DD><B>(4)</B>&nbsp;&nbsp;Bob encrypts his message using Alice&#146;s public key. He sends half of the encrypted message to Alice.
<DD><B>(5)</B>&nbsp;&nbsp;Alice sends the other half of her encrypted message to Bob.
<DD><B>(6)</B>&nbsp;&nbsp;Bob puts the two halves of Alice&#146;s message together and decrypts it with his private key. Bob sends the other half of his encrypted message to Alice.
<DD><B>(7)</B>&nbsp;&nbsp;Alice puts the two halves of Bob&#146;s message together and decrypts it with her private key.
</DL>
<P>The important point is that half of the message is useless without the other half; it can&#146;t be decrypted. Bob cannot read any part of Alice&#146;s message until step (6); Alice cannot read any part of Bob&#146;s message until step (7). There are a number of ways to do this:
</P>
<DL>
<DD>&#151; If the encryption algorithm is a block algorithm, half of each block (e.g., every other bit) could be sent in each half message.
<DD>&#151; Decryption of the message could be dependent on an initialization vector (see Section 9.3), which could be sent with the second half of the message.
<DD>&#151; The first half of the message could be a one-way hash function of the encrypted message (see Section 2.4) and the encrypted message itself could be the second half.
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch02/02-11.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="03-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本丶国产丶欧美色综合| 欧美年轻男男videosbes| 亚洲午夜影视影院在线观看| 亚洲精品日韩专区silk | 粉嫩嫩av羞羞动漫久久久| 日韩主播视频在线| 色综合天天综合色综合av| 日本不卡一区二区三区高清视频| 国产欧美精品一区| 欧美日韩精品一区视频| 国产a视频精品免费观看| 亚洲sss视频在线视频| 中文成人综合网| 精品1区2区在线观看| 欧美日韩一区二区三区四区| 99亚偷拍自图区亚洲| 精品无码三级在线观看视频| 亚洲成人一区在线| 玉足女爽爽91| 亚洲天堂久久久久久久| 国产人成亚洲第一网站在线播放 | 日本欧美在线观看| 中文字幕在线观看一区| 国产丝袜欧美中文另类| 久久综合色鬼综合色| 91精品国产综合久久香蕉麻豆| 一本色道久久综合亚洲精品按摩 | 欧美日韩dvd在线观看| 91丨porny丨户外露出| 成人一二三区视频| 国产98色在线|日韩| 国产成人欧美日韩在线电影| 国模少妇一区二区三区| 精品一区二区三区香蕉蜜桃| 日本欧美在线看| 蜜臀av性久久久久蜜臀aⅴ流畅 | 国产xxx精品视频大全| 国产麻豆精品theporn| 国内精品视频一区二区三区八戒| 美女在线一区二区| 青青青爽久久午夜综合久久午夜 | 亚洲国产成人porn| 亚洲国产人成综合网站| 性欧美大战久久久久久久久| 日精品一区二区三区| 青娱乐精品在线视频| 美女一区二区久久| 国产精品综合二区| 国产suv精品一区二区883| 波多野结衣在线aⅴ中文字幕不卡| 不卡一区二区三区四区| 91在线播放网址| 欧美自拍偷拍一区| 91精品久久久久久蜜臀| 欧美成人性战久久| 中文字幕免费不卡在线| 亚洲欧美精品午睡沙发| 亚洲不卡在线观看| 免费黄网站欧美| 精品视频1区2区| 91精品国产综合久久福利| 精品国产sm最大网站免费看| 欧美极品美女视频| 亚洲美女区一区| 蜜桃av一区二区在线观看| 国产精品18久久久久久久网站| 成人理论电影网| 欧美体内she精高潮| 欧美白人最猛性xxxxx69交| 国产精品每日更新| 日韩高清不卡在线| 国产精品99久久久| 欧美日韩一区中文字幕| 久久综合九色欧美综合狠狠| 亚洲情趣在线观看| 男人的天堂久久精品| 成人丝袜18视频在线观看| 91国偷自产一区二区三区观看 | 97久久精品人人爽人人爽蜜臀| 欧洲中文字幕精品| 精品国产凹凸成av人导航| 亚洲激情六月丁香| 国产又粗又猛又爽又黄91精品| 91同城在线观看| 日韩欧美国产高清| 一区二区三区波多野结衣在线观看 | 91精品蜜臀在线一区尤物| 国产精品入口麻豆九色| 天天综合天天综合色| 成人激情综合网站| 欧美一区二区三区公司| 亚洲欧美区自拍先锋| 国产一区二区福利| 欧美日韩国产a| 国产精品久久99| 日本v片在线高清不卡在线观看| www.66久久| 欧美精品一区二区三区蜜桃| 亚洲精品国久久99热| 国产精品自拍毛片| 91精品国产乱码| 亚洲综合丝袜美腿| 99久久精品情趣| 国产亚洲一区字幕| 三级精品在线观看| 在线观看视频一区| 1区2区3区欧美| 国产99一区视频免费| 欧美一二三四区在线| 亚洲免费伊人电影| 成人精品免费网站| 精品国产sm最大网站| 琪琪久久久久日韩精品| 欧美日韩一区二区三区免费看| 国产精品亲子伦对白| 国产一区二区三区免费| 精品精品欲导航| 日本视频中文字幕一区二区三区| 欧美中文字幕亚洲一区二区va在线 | 7777精品伊人久久久大香线蕉 | 中文字幕不卡三区| 国产精品一区二区无线| 精品久久久三级丝袜| 色88888久久久久久影院按摩| 国产午夜精品美女毛片视频| 精品一区二区av| 精品少妇一区二区三区在线播放 | 久久99精品网久久| 欧美一区二区日韩| 日韩电影一区二区三区四区| 欧美日韩精品欧美日韩精品一| 一区二区三区四区激情| 色婷婷激情综合| 一区二区免费看| 欧美日韩精品系列| 亚洲1区2区3区4区| 在线成人午夜影院| 蜜桃精品视频在线观看| 日韩欧美二区三区| 国模少妇一区二区三区| 国产日韩欧美亚洲| 播五月开心婷婷综合| 亚洲欧美成人一区二区三区| 在线观看国产精品网站| 亚洲h精品动漫在线观看| 日韩一级黄色大片| 狠狠色狠狠色综合系列| 国产性天天综合网| 白白色亚洲国产精品| 樱桃国产成人精品视频| 欧美日本一道本| 另类成人小视频在线| 久久久国产午夜精品| 不卡一区在线观看| 亚洲国产精品天堂| 欧美变态口味重另类| 国产mv日韩mv欧美| 亚洲综合区在线| 欧美一区二区三区小说| 韩国一区二区三区| 亚洲欧美另类久久久精品2019| 欧美日韩免费一区二区三区| 蜜桃av一区二区三区电影| 久久久99精品免费观看| 91色视频在线| 裸体健美xxxx欧美裸体表演| 国产午夜精品一区二区三区嫩草| www.欧美日韩| 天天综合日日夜夜精品| 2024国产精品| 色哟哟国产精品| 男男gaygay亚洲| 亚洲视频一区二区在线| 91麻豆精品国产| 国产精品自产自拍| 亚洲无人区一区| 国产日产欧美一区二区视频| 欧美唯美清纯偷拍| 国产成人综合网| 午夜精品123| 国产精品久久久久天堂| 在线成人av影院| 91视频精品在这里| 精品一区二区久久久| 亚洲精品中文字幕在线观看| 欧美大片一区二区| 色久优优欧美色久优优| 狠狠色丁香久久婷婷综合_中| 一区二区三区小说| 久久先锋影音av鲁色资源网| 日本韩国欧美一区| 懂色av一区二区三区免费观看| 婷婷开心久久网| 亚洲激情一二三区| 国产精品网站导航| 久久夜色精品一区| 欧美巨大另类极品videosbest| caoporn国产精品| 国产精品一区二区三区四区| 视频一区视频二区中文|