亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 03-03.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Basic Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=03//-->
<!--PAGES=052-054//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="03-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="03-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Authentication Using One-Way Functions</I></B></FONT></P>
<P>What Roger Needham and Mike Guy realized is that the host does not need to know the passwords; the host just has to be able to differentiate valid passwords from invalid passwords. This is easy with one-way functions [1599,526,1274,1121]. Instead of storing passwords, the host stores one-way functions of the passwords.
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice sends the host her password.
<DD><B>(2)</B>&nbsp;&nbsp;The host performs a one-way function on the password.
<DD><B>(3)</B>&nbsp;&nbsp;The host compares the result of the one-way function to the value it previously stored.
</DL>
<P>Since the host no longer stores a table of everybody&#146;s valid password, the threat of someone breaking into the host and stealing the password list is mitigated. The list of passwords operated on by the one-way function is useless, because the one-way function cannot be reversed to recover the passwords.
</P>
<P><FONT SIZE="+1"><B><I>Dictionary Attacks and Salt</I></B></FONT></P>
<P>A file of passwords encrypted with a one-way function is still vulnerable. In his spare time, Mallory compiles a list of the 1,000,000 most common passwords. He operates on all 1,000,000 of them with the one-way function and stores the results. If each password is about 8 bytes, the resulting file will be no more than 8 megabytes; it will fit on a few floppy disks. Now, Mallory steals an encrypted password file. He compares that file with his file of encrypted possible passwords and sees what matches.
</P>
<P>This is a <B>dictionary attack</B>, and it&#146;s surprisingly successful (see Section 8.1). <B>Salt</B> is a way to make it more difficult. Salt is a random string that is concatenated with passwords before being operated on by the one-way function. Then, both the salt value and the result of the one-way function are stored in a database on the host. If the number of possible salt values is large enough, this practically eliminates a dictionary attack against commonly used passwords because Mallory has to generate the one-way hash for each possible salt value. This is a simple attempt at an initialization vector (see Section 9.3).</P>
<P>The point here is to make sure that Mallory has to do a trial encryption of each password in his dictionary every time he tries to break another person&#146;s password, rather than just doing one massive precomputation for all possible passwords.</P>
<P>A lot of salt is needed. Most UNIX systems use only 12 bits of salt. Even with that, Daniel Klein developed a password-guessing program that often cracks 40 percent of the passwords on a given host system within a week [847,848] (see Section 8.1). David Feldmeier and Philip Karn compiled a list of about 732,000 common passwords concatenated with each of 4096 possible salt values. They estimate that 30 percent of passwords on any given host can be broken with this list [561].</P>
<P>Salt isn&#146;t a panacea; increasing the number of salt bits won&#146;t solve everything. Salt only protects against general dictionary attacks on a password file, not against a concerted attack on a single password. It protects people who have the same password on multiple machines, but doesn&#146;t make poorly chosen passwords any better.</P>
<P><FONT SIZE="+1"><B><I>SKEY</I></B></FONT></P>
<P>SKEY is an authentication program that relies on a one-way function for its security. It&#146;s easy to explain.
</P>
<P>To set up the system, Alice enters a random number, <I>R</I>. The computer computes <I>f</I>(<I>R</I>), <I>f</I>(<I>f</I>(<I>R</I>)), <I>f</I>(<I>f</I>(<I>f</I>(<I>R</I>))), and so on, about a hundred times. Call these numbers <I>x</I><SUB>1</SUB>, <I>x</I><SUB>2</SUB>, <I>x</I><SUB>3</SUB>,..., <I>x</I><SUB>100</SUB>. The computer prints out this list of numbers, and Alice puts it in her pocket for safekeeping. The computer also stores <I>x</I><SUB>101</SUB>, in the clear, in a login database next to Alice&#146;s name.</P>
<P>The first time Alice wants to log in, she types her name and <I>x</I><SUB>100</SUB>. The computer calculates <I>f</I>(<I>x</I><SUB>100</SUB>) and compares it with <I>x</I><SUB>101</SUB>; if they match, Alice is authenticated. Then, the computer replaces <I>x</I><SUB>101</SUB> with <I>x</I><SUB>100</SUB> in the database. Alice crosses <I>x</I><SUB>100</SUB> off her list.</P>
<P>Every time Alice logs in, she enters the last uncrossed number on her list: <I>x</I><SUB>i</SUB>. The computer calculates <I>f</I>(<I>x</I><SUB>i</SUB>) and compares it with <I>x</I><SUB>i&#43;1</SUB> stored in its database. Eve can&#146;t get any useful information because each number is only used once, and the function is one-way. Similarly, the database is not useful to an attacker. Of course, when Alice runs out of numbers on her list, she has to reinitialize the system.</P>
<P><FONT SIZE="+1"><B><I>Authentication Using Public-Key Cryptography</I></B></FONT></P>
<P>Even with salt, the first protocol has serious security problems. When Alice sends her password to her host, anyone who has access to her data path can read it. She might be accessing her host through a convoluted transmission path that passes through four industrial competitors, three foreign countries, and two forward-thinking universities. Eve can be at any one of those points, listening to Alice&#146;s login sequence. If Eve has access to the processor memory of the host, she can see the password before the host hashes it.
</P>
<P>Public-key cryptography can solve this problem. The host keeps a file of every user&#146;s public key; all users keep their own private keys. Here is a na晇e attempt at a protocol. When logging in, the protocol proceeds as follows:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;The host sends Alice a random string.
<DD><B>(2)</B>&nbsp;&nbsp;Alice encrypts the string with her private key and sends it back to the host, along with her name.
<DD><B>(3)</B>&nbsp;&nbsp;The host looks up Alice&#146;s public key in its database and decrypts the message using that public key.
<DD><B>(4)</B>&nbsp;&nbsp;If the decrypted string matches what the host sent Alice in the first place, the host allows Alice access to the system.
</DL>
<P>No one else has access to Alice&#146;s private key, so no one else can impersonate Alice. More important, Alice never sends her private key over the transmission line to the host. Eve, listening in on the interaction, cannot get any information that would enable her to deduce the private key and impersonate Alice.
</P>
<P>The private key is both long and non-mnemonic, and will probably be processed automatically by the user&#146;s hardware or communications software. This requires an intelligent terminal that Alice trusts, but neither the host nor the communications path needs to be secure.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="03-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="03-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲国产精品精华液2区45| 精品人在线二区三区| 日韩av不卡在线观看| 国产午夜精品一区二区| 色婷婷国产精品久久包臀| 欧洲国内综合视频| 国产成人综合视频| 视频一区欧美日韩| 中文字幕第一页久久| 日韩一区二区三区精品视频| 99久久国产免费看| 国产乱人伦精品一区二区在线观看| 一区二区三区毛片| 中文在线一区二区| 日韩欧美国产一区二区三区| 精品视频全国免费看| 成人免费视频网站在线观看| 国内精品伊人久久久久影院对白| 亚洲丶国产丶欧美一区二区三区| 国产欧美一区二区在线| 日韩欧美一区二区视频| 欧美色中文字幕| 99re8在线精品视频免费播放| 精品亚洲免费视频| 日韩av一区二| 亚洲成人av免费| 亚洲激情网站免费观看| 中文字幕视频一区二区三区久| 久久综合视频网| 日韩免费观看高清完整版| 欧美精品欧美精品系列| 91久久精品一区二区三| 91麻豆免费观看| 一本久久a久久免费精品不卡| 成人深夜福利app| 岛国av在线一区| 风间由美性色一区二区三区| 国产一区中文字幕| 黑人精品欧美一区二区蜜桃| 精品一区二区三区免费视频| 麻豆91在线看| 久久国产精品99久久久久久老狼| 日韩一区欧美二区| 欧美a级理论片| 性做久久久久久免费观看| 亚洲高清在线视频| 日日摸夜夜添夜夜添国产精品| 午夜精品福利视频网站| 日韩影视精彩在线| 久久99精品网久久| 国产综合久久久久久鬼色| 国产一区二区三区在线观看精品 | 99久久精品费精品国产一区二区| 成人免费视频视频在线观看免费| 成a人片亚洲日本久久| 99在线视频精品| 91福利区一区二区三区| 欧美三级乱人伦电影| 欧美久久一二区| 欧美www视频| 久久久99久久精品欧美| 国产精品久久精品日日| 亚洲精品伦理在线| 91麻豆精东视频| 欧美日韩国产一二三| 欧美电视剧在线观看完整版| 国产日本欧美一区二区| 亚洲日本电影在线| 午夜精品福利一区二区蜜股av| 久久国产精品99久久人人澡| 成人免费看片app下载| 91蜜桃婷婷狠狠久久综合9色| 欧美精品日韩精品| 久久精品一区二区三区四区| 一级做a爱片久久| 蜜桃精品视频在线观看| 成人免费观看男女羞羞视频| 日本二三区不卡| 日韩精品中午字幕| 最新欧美精品一区二区三区| 日本午夜一本久久久综合| 亚洲成人av中文| 亚洲电影你懂得| 精品一区二区三区免费播放| 国产精品性做久久久久久| caoporen国产精品视频| 欧美综合天天夜夜久久| 91精品国产综合久久久蜜臀粉嫩| 精品国产123| 亚洲欧美中日韩| 免费看精品久久片| 风流少妇一区二区| 欧美一区二区在线看| 国产亚洲综合在线| 亚洲综合免费观看高清完整版| 男女男精品网站| 色综合天天综合给合国产| 中文字幕精品在线不卡| 亚洲综合免费观看高清在线观看| 欧美亚洲综合另类| 日本不卡不码高清免费观看| 99久久精品国产观看| 欧美国产日本韩| 热久久一区二区| 韩国成人精品a∨在线观看| 国产高清在线精品| 欧美二区三区的天堂| 欧美国产综合色视频| 色综合久久久久综合99| kk眼镜猥琐国模调教系列一区二区 | 国产精品护士白丝一区av| 日韩福利视频网| 99久久久久免费精品国产| 久久久99精品免费观看不卡| 日韩制服丝袜av| 色偷偷久久人人79超碰人人澡| 久久久91精品国产一区二区三区| 日日夜夜精品免费视频| 在线观看日韩国产| 亚洲少妇中出一区| 国产99一区视频免费| 久久看人人爽人人| 久久国产精品99久久久久久老狼| 欧美高清一级片在线| 亚洲大片在线观看| 91在线视频观看| 国产精品白丝在线| 岛国一区二区在线观看| 中文字幕国产精品一区二区| 国产精品99久久久久| 久久久蜜臀国产一区二区| 激情偷乱视频一区二区三区| 日韩一二三四区| 玖玖九九国产精品| 日韩欧美在线1卡| 蜜臀av性久久久久av蜜臀妖精| 欧美日韩激情在线| 午夜激情一区二区三区| 欧美日韩高清在线播放| 日韩精品午夜视频| 日韩一二三区不卡| 久久se这里有精品| 2021久久国产精品不只是精品| 久久97超碰国产精品超碰| 欧美本精品男人aⅴ天堂| 三级久久三级久久久| 日韩一区二区在线观看视频播放| 日本亚洲免费观看| 日韩精品中文字幕一区二区三区| 精品一区二区三区欧美| 国产亚洲精品aa| av在线综合网| 亚洲亚洲精品在线观看| 欧美电影在哪看比较好| 美腿丝袜亚洲综合| 久久综合视频网| 99亚偷拍自图区亚洲| 亚洲永久免费av| 4hu四虎永久在线影院成人| 精品制服美女久久| 欧美激情在线一区二区| 色94色欧美sute亚洲13| 午夜久久久影院| 精品国产乱码久久久久久浪潮 | 亚洲欧美日韩系列| 欧美亚洲免费在线一区| 日本大胆欧美人术艺术动态| 精品国产乱码久久久久久免费| 成人av电影在线观看| 日本电影欧美片| 日本不卡1234视频| 欧美经典一区二区三区| 91看片淫黄大片一级| 蜜乳av一区二区| 国产精品久久久久国产精品日日| 欧美三级乱人伦电影| 国产一区不卡精品| 依依成人精品视频| www欧美成人18+| 在线观看亚洲a| 韩国av一区二区三区在线观看| 中文字幕一区二区三区色视频| 欧美片在线播放| 高清国产一区二区| 亚洲福利一区二区| 欧美国产日本视频| 在线播放视频一区| 成人黄页毛片网站| 日本美女视频一区二区| 亚洲人成7777| 日韩一级大片在线观看| 91麻豆国产精品久久| 国产揄拍国内精品对白| 亚洲大尺度视频在线观看| 久久精品夜色噜噜亚洲a∨| 欧美精品久久99| 91麻豆国产香蕉久久精品| 国产精品亚洲一区二区三区在线 | 99精品国产91久久久久久| 久久91精品久久久久久秒播|