亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 03-02.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Basic Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=03//-->
<!--PAGES=049-052//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="03-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="03-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>To see how this causes a problem for Mallory, let&#146;s review his attempt to subvert the protocol. He can still substitute his own public keys for Alice&#146;s and Bob&#146;s in steps (1) and (2). But now, when he intercepts half of Alice&#146;s message in step (3), he cannot decrypt it with his private key and re-encrypt it with Bob&#146;s public key. He must invent a totally new message and send half of it to Bob. When he intercepts half of Bob&#146;s message to Alice in step (4), he has the same problem. He cannot decrypt it with his private key and re-encrypt it with Alice&#146;s public key. He has to invent a totally new message and send half of it to Alice. By the time he intercepts the second halves of the real messages in steps (5) and (6), it is too late for him to change the new messages he invented. The conversation between Alice and Bob will necessarily be completely different.
</P>
<P>Mallory could possibly get away with this scheme. If he knows Alice and Bob well enough to mimic both sides of a conversation between them, they might never realize that they are being duped. But surely this is much harder than sitting between the two of them, intercepting and reading their messages.</P>
<P><FONT SIZE="+1"><B><I>Key Exchange with Digital Signatures</I></B></FONT></P>
<P>Implementing digital signatures during a session-key exchange protocol circumvents this man-in-the-middle attack as well. Trent signs both Alice&#146;s and Bob&#146;s public keys. The signed keys include a signed certification of ownership. When Alice and Bob receive the keys, they each verify Trent&#146;s signature. Now they know that the public key belongs to that other person. The key exchange protocol can then proceed.
</P>
<P>Mallory has serious problems. He cannot impersonate either Alice or Bob because he doesn&#146;t know either of their private keys. He cannot substitute his public key for either of theirs because, while he has one signed by Trent, it is signed as being Mallory&#146;s. All he can do is listen to the encrypted traffic go back and forth or disrupt the lines of communication and prevent Alice and Bob from talking.</P>
<P>This protocol uses Trent, but the risk of compromising the KDC is less than the first protocol. If Mallory compromises Trent (breaks into the KDC), all he gets is Trent&#146;s private key. This key enables him only to sign new keys; it does not let him decrypt any session keys or read any message traffic. To read the traffic, Mallory has to impersonate a user on the network and trick legitimate users into encrypting messages with his phony public key.</P>
<P>Mallory can launch that kind of attack. With Trent&#146;s private key, he can create phony signed keys to fool both Alice and Bob. Then, he can either exchange them in the database for real signed keys, or he can intercept users&#146; database requests and reply with his phony keys. This enables him to launch a man-in-the-middle attack and read people&#146;s communications.</P>
<P>This attack will work, but remember that Mallory has to be able to intercept and modify messages. In some networks this is a lot more difficult than passively sitting on a network reading messages as they go by. On a broadcast channel, such as a radio network, it is almost impossible to replace one message with another&#151;although the entire network can be jammed. On computer networks this is easier and seems to be getting easier every day. Consider IP spoofing, router attacks, and so forth; active attacks don&#146;t necessarily mean someone down a manhole with a datascope, and they are not limited to three-letter agencies.</P>
<P><FONT SIZE="+1"><B><I>Key and Message Transmission</I></B></FONT></P>
<P>Alice and Bob need not complete the key-exchange protocol before exchanging messages. In this protocol, Alice sends Bob the message, <I>M</I>, without any previous key exchange protocol:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice generates a random session key, <I>K</I>, and encrypts <I>M</I> using <I>K</I>.
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>M</I>)
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Alice gets Bob&#146;s public key from the database.
<DD><B>(3)</B>&nbsp;&nbsp;Alice encrypts <I>K</I> with Bob&#146;s public key.
<DL>
<DD><I>E</I><SUB>B</SUB>(<I>K</I>)
</DL>
<DD><B>(4)</B>&nbsp;&nbsp;Alice sends both the encrypted message and encrypted session key to Bob.
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>M</I>), <I>E</I><SUB>B</SUB>(<I>K</I>)
</DL>
<BR>For added security against man-in-the-middle attacks, Alice can sign the transmission.
<DD><B>(5)</B>&nbsp;&nbsp;Bob decrypts Alice&#146;s session key, <I>K</I>, using his private key.
<DD><B>(6)</B>&nbsp;&nbsp;Bob decrypts Alice&#146;s message using the session key.
</DL>
<P>This hybrid system is how public-key cryptography is most often used in a communications system. It can be combined with digital signatures, timestamps, and any other security protocols.
</P>
<P><FONT SIZE="+1"><B><I>Key and Message Broadcast</I></B></FONT></P>
<P>There is no reason Alice can&#146;t send the encrypted message to several people. In this example, Alice will send the encrypted message to Bob, Carol, and Dave:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice generates a random session key, <I>K</I>, and encrypts <I>M</I> using <I>K</I>.
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>M</I>)
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Alice gets Bob&#146;s, Carol&#146;s, and Dave&#146;s public keys from the database.
<DD><B>(3)</B>&nbsp;&nbsp;Alice encrypts <I>K</I> with Bob&#146;s public key, encrypts <I>K</I> with Carol&#146;s public key, and then encrypts <I>K</I> with Dave&#146;s public key.
<DL>
<DD><I>E</I><SUB>B</SUB>(<I>K</I>), <I>E</I><SUB>C</SUB>(<I>K</I>), <I>E</I><SUB>D</SUB>(<I>K</I>)
</DL>
<DD><B>(4)</B>&nbsp;&nbsp;Alice broadcasts the encrypted message and all the encrypted keys to anybody who cares to receive it.
<DL>
<DD><I>E</I><SUB>B</SUB>(<I>K</I>), <I>E</I><SUB>C</SUB>(<I>K</I>), <I>E</I><SUB>D</SUB>(<I>K</I>), <I>E</I><SUB>K</SUB>(<I>M</I>)
</DL>
<DD><B>(5)</B>&nbsp;&nbsp;Only Bob, Carol, and Dave can decrypt the key, <I>K</I>, each using his or her private key.
<DD><B>(6)</B>&nbsp;&nbsp;Only Bob, Carol, and Dave can decrypt Alice&#146;s message using <I>K</I>.
</DL>
<P>This protocol can be implemented on a store-and-forward network. A central server can forward Alice&#146;s message to Bob, Carol, and Dave along with their particular encrypted key. The server doesn&#146;t have to be secure or trusted, since it will not be able to decrypt any of the messages.
</P>
<H3><A NAME="Heading3"></A><FONT COLOR="#000077">3.2 Authentication</FONT></H3>
<P>When Alice logs into a host computer (or an automatic teller, or a telephone banking system, or any other type of terminal), how does the host know who she is? How does the host know she is not Eve trying to falsify Alice&#146;s identity? Traditionally, passwords solve this problem. Alice enters her password, and the host confirms that it is correct. Both Alice and the host know this secret piece of knowledge and the host requests it from Alice every time she tries to log in.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="03-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="03-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美一区二区三区免费| 欧美区一区二区三区| 色一情一乱一乱一91av| 欧美日韩电影在线| 国产精品国产三级国产三级人妇 | 欧美日韩成人一区| 亚洲国产精品二十页| 蜜臀va亚洲va欧美va天堂| 9i在线看片成人免费| 久久久综合网站| 麻豆精品蜜桃视频网站| 欧美放荡的少妇| 一区二区在线观看免费 | 久久久久久久综合| 蜜臀精品久久久久久蜜臀| 91久久精品午夜一区二区| 欧美激情艳妇裸体舞| 精品一区二区影视| 日韩午夜三级在线| 美女视频一区在线观看| 在线91免费看| 亚洲综合成人在线视频| 一本久道中文字幕精品亚洲嫩| 日本一区二区三区视频视频| 国产一区二区三区不卡在线观看 | 亚洲国产电影在线观看| 国产真实精品久久二三区| 日韩免费一区二区三区在线播放| 亚洲bt欧美bt精品| 精品视频1区2区3区| 亚洲高清一区二区三区| 欧美日韩高清一区二区不卡| 五月婷婷综合激情| 欧美日韩成人综合天天影院| 丝袜诱惑制服诱惑色一区在线观看| 欧美性三三影院| 首页国产欧美日韩丝袜| 欧美日本一道本| 麻豆成人综合网| 欧美精品一区二区三区很污很色的| 久久99精品视频| 久久综合九色欧美综合狠狠| 国产老妇另类xxxxx| 国产欧美精品一区| 91小宝寻花一区二区三区| 亚洲国产日韩a在线播放| 欧美色图激情小说| 日本午夜一区二区| 久久色中文字幕| 成人av资源站| 亚洲一级电影视频| 91精品中文字幕一区二区三区| 免费观看在线综合| 久久精品欧美日韩| 97久久精品人人澡人人爽| 亚洲国产日韩一级| 久久影院午夜论| 91浏览器打开| 麻豆精品在线观看| 国产精品短视频| 欧美色综合影院| 国产乱对白刺激视频不卡| 亚洲欧美日本韩国| 欧美大片顶级少妇| a美女胸又www黄视频久久| 亚洲国产成人porn| 欧美激情一区二区三区不卡 | 91视频国产资源| 青青草精品视频| 国产精品第一页第二页第三页| 欧美精品黑人性xxxx| 国产sm精品调教视频网站| 日韩精品成人一区二区三区| 欧美激情一区二区三区四区| 欧美日韩一区二区欧美激情| 加勒比av一区二区| 亚洲动漫第一页| 中文字幕免费不卡| 日韩精品一区二区三区视频播放 | 欧美日韩一区三区| 成人中文字幕电影| 麻豆91在线观看| 亚洲在线中文字幕| 中文字幕一区av| 精品国产一区二区三区久久久蜜月| 色哟哟精品一区| www.亚洲在线| 国产精品一线二线三线精华| 天天色综合成人网| 亚洲九九爱视频| 国产精品久久久久久亚洲毛片| 欧美一区二区三区四区久久| 日本韩国欧美在线| 粉嫩av一区二区三区| 国内精品伊人久久久久影院对白| 亚瑟在线精品视频| 一区二区三区**美女毛片| 国产精品网站在线| 久久综合国产精品| 欧美成人一区二区三区在线观看| 欧美久久久久久蜜桃| 欧洲亚洲精品在线| 色欧美乱欧美15图片| 99久久综合国产精品| 大桥未久av一区二区三区中文| 国产一区二区三区精品欧美日韩一区二区三区| 亚洲五月六月丁香激情| 亚洲制服丝袜av| 亚洲国产日韩综合久久精品| 亚洲午夜电影在线观看| 亚洲精品亚洲人成人网| 椎名由奈av一区二区三区| 中文字幕欧美三区| 国产精品午夜久久| 欧美激情一区二区三区四区| 国产精品麻豆99久久久久久| 国产精品人人做人人爽人人添| 国产亚洲婷婷免费| 国产精品久久久久久久岛一牛影视| 国产日韩精品一区二区三区在线| 国产精品天天看| 综合激情网...| 亚洲在线免费播放| 午夜欧美电影在线观看| 日本成人在线一区| 国产麻豆视频一区| 91在线porny国产在线看| 在线观看欧美黄色| 7777精品伊人久久久大香线蕉完整版| 欧美精品色一区二区三区| 欧美一区二区成人| 久久久电影一区二区三区| 中文字幕av一区二区三区免费看| 中文字幕在线一区二区三区| 亚洲激情图片qvod| 奇米在线7777在线精品| 国产一区二区三区日韩| 成人免费视频一区| 欧美三电影在线| 欧美精品一区在线观看| 国产精品久久久久久久岛一牛影视| 夜夜操天天操亚洲| 久久99精品一区二区三区三区| 国产成人精品免费看| 在线看不卡av| 久久精品在线观看| 一区二区三区中文免费| 秋霞影院一区二区| 国产成人精品免费在线| 精品视频一区二区三区免费| 精品国产99国产精品| ...xxx性欧美| 精品一区二区影视| 在线观看亚洲专区| 久久精品夜色噜噜亚洲a∨| 亚洲影院免费观看| 国产伦精品一区二区三区视频青涩 | 中文子幕无线码一区tr| 日韩制服丝袜先锋影音| 成人久久视频在线观看| 欧美人伦禁忌dvd放荡欲情| 国产女人18水真多18精品一级做| 亚洲一二三区在线观看| 不卡影院免费观看| 日韩一区二区三区免费看 | 欧美亚洲丝袜传媒另类| 久久久精品黄色| 视频一区二区欧美| 色婷婷av一区二区三区gif| 久久久久久久网| 理论电影国产精品| 7777女厕盗摄久久久| 一区二区三区久久久| 不卡免费追剧大全电视剧网站| 欧美一级高清片| 亚洲mv在线观看| 在线观看视频欧美| 亚洲蜜臀av乱码久久精品| 成人一区二区三区| 久久久综合视频| 国产一区激情在线| 日韩亚洲欧美在线| 日韩精品一级二级 | 欧美探花视频资源| 亚洲欧洲成人自拍| 国产成人午夜精品5599| 久久综合色综合88| 精品午夜久久福利影院| 884aa四虎影成人精品一区| 亚洲成av人影院在线观看网| 91国产丝袜在线播放| 亚洲欧美日韩小说| 在线中文字幕一区二区| 亚洲黄色在线视频| 91福利资源站| 亚洲高清在线精品| 在线播放欧美女士性生活| 日韩电影网1区2区| 日韩精品在线看片z| 精品一二三四在线|