亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 03-09.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Basic Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=03//-->
<!--PAGES=065-067//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="03-08.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="03-10.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>There are four basic approaches to the analysis of cryptographic protocols [1045]:
</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;Model and verify the protocol using specification languages and verification tools not specifically designed for the analysis of cryptographic protocols.
<DD><B>2.</B>&nbsp;&nbsp;Develop expert systems that a protocol designer can use to develop and investigate different scenarios.
<DD><B>3.</B>&nbsp;&nbsp;Model the requirements of a protocol family using logics for the analysis of knowledge and belief.
<DD><B>4.</B>&nbsp;&nbsp;Develop a formal method based on the algebraic term-rewriting properties of cryptographic systems.
</DL>
<P>A full discussion on these four approaches and the research surrounding them is well beyond the scope of this book. See [1047,1355] for a good introduction to the topic; I am only going to touch on the major contributions to the field.
</P>
<P>The first approach treats a cryptographic protocol as any other computer program and attempts to prove correctness. Some researchers represent a protocol as a finite-state machine [1449,1565], others use extensions of first-order predicate calculus [822], and still others use specification languages to analyze protocols [1566]. However, proving correctness is not the same as proving security and this approach fails to detect many flawed protocols. Although it was widely studied at first, most of the work in this area has been redirected as the third approach gained popularity.</P>
<P>The second approach uses expert systems to determine if a protocol can reach an undesirable state (the leaking of a key, for example). While this approach better identifies flaws, it neither guarantees security nor provides techniques for developing attacks. It is good at determining whether a protocol contains a given flaw, but is unlikely to discover unknown flaws in a protocol. Examples of this approach can be found in [987,1521]; [1092] discusses a rule-based system developed by the U.S. military, called the Interrogator.</P>
<P>The third approach is by far the most popular, and was pioneered by Michael Burrows, Martin Abadi, and Roger Needham. They developed a formal logic model for the analysis of knowledge and belief, called <B>BAN logic</B> [283,284]. BAN logic is the most widely used logic for analyzing authentication protocols. It assumes that authentication is a function of integrity and freshness, and uses logical rules to trace both of those attributes through the protocol. Although many variants and extensions have been proposed, most protocol designers still refer back to the original work.</P>
<P>BAN logic doesn&#146;t provide a proof of security; it can only reason about authentication. It has a simple, straightforward logic that is easy to apply and still useful for detecting flaws. Some of the statements in BAN logic include:</P>
<BLOCKQUOTE><P>Alice believes X. (Alice acts as though X is true.)
</P>
<P>Alice sees X. (Someone has sent a message containing X to Alice, who can read and repeat X&#151;possibly after decrypting it.)</P>
<P>Alice said X. (At some time, Alice sent a message that includes the statement X. It is not known how long ago the message was sent or even that it was sent during the current run of the protocol. It is known that Alice believed X when she said it.)</P>
<P>X is fresh. (X has not been sent in a message at any time before the current run of the protocol.)</P>
</BLOCKQUOTE><P>And so on. BAN logic also provides rules for reasoning about belief in a protocol. These rules can then be applied to the logical statements about the protocol to prove things or answer questions about the protocol. For example, one rule is the message-meaning rule:
</P>
<BLOCKQUOTE><P>IF Alice believes that Alice and Bob share a secret key, <I>K</I>, and Alice sees <I>X</I>, encrypted under <I>K</I>, and Alice did not encrypt <I>X</I> under <I>K</I>, THEN Alice believes that Bob once said <I>X</I>.</P>
</BLOCKQUOTE><P>Another rule is the nonce-verification rule:
</P>
<BLOCKQUOTE><P>IF Alice believes that <I>X</I> could have been uttered only recently and that Bob once said <I>X</I>, THEN Alice believes that Bob believes <I>X</I>.</P>
</BLOCKQUOTE><P>There are four steps in BAN analysis:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Convert the protocol into idealized form, using the statements previously described.
<DD><B>(2)</B>&nbsp;&nbsp;Add all assumptions about the initial state of the protocol.
<DD><B>(3)</B>&nbsp;&nbsp;Attach logical formulas to the statements: assertions about the state of the system after each statement.
<DD><B>(4)</B>&nbsp;&nbsp;Apply the logical postulates to the assertions and assumptions to discover the beliefs held by the parties in the protocol.
</DL>
<P>The authors of BAN logic &#147;view the idealized protocols as clearer and more complete specifications than traditional descriptions found in the literature....&#148; [283,284]. Others are not so impressed and criticize this step because it may not accurately reflect the real protocol [1161,1612]. Further debate is in [221,1557]. Other critics try to show that BAN logic can deduce characteristics about protocols that are obviously false [1161]&#151;see [285,1509] for a rebuttal&#151;and that BAN logic deals only with trust and not security [1509]. More debate is in [1488,706,1002].
</P>
<P>Despite these criticisms, BAN logic has been a success. It has found flaws in several protocols, including Needham-Schroeder and an early draft of a CCITT X.509 protocol [303]. It has uncovered redundancies in many protocols, including Yahalom, Needham-Schroeder, and Kerberos. Many published papers use BAN logic to make claims about their protocol&#146;s security [40,1162,73].</P>
<P>Other logic systems have been published, some designed as extensions to BAN logic [645,586,1556,828] and others based on BAN to correct perceived weaknesses [1488,1002]. The most successful of these is GNY [645], although it has some shortcomings [40]. Probabalistic beliefs were added to BAN logic, with mixed success, by [292,474]. Other formal logics are [156,798,288]; [1514] attempts to combine the features of several logics. And [1124,1511] present logics where beliefs can change over time.</P>
<P>The fourth approach to the analysis of cryptographic protocols models the protocol as an algebraic system, expresses the state of the participants&#146; knowledge about the protocol, and then analyzes the attainability of certain states. This approach has not received as much attention as formal logics, but that is changing. It was first used by Michael Merritt [1076], who showed that an algebraic model can be used to analyze cryptographic protocols. Other approaches are in [473,1508,1530,1531,1532,1510,1612].</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="03-08.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="03-10.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩一区国产二区欧美三区| 久久国产精品99久久久久久老狼| 国产精品69毛片高清亚洲| 精品国产乱码久久久久久1区2区| 久久99精品国产91久久来源| 日韩精品一区二| 国产精品一区专区| 国产欧美va欧美不卡在线| 成人中文字幕电影| 亚洲激情五月婷婷| 777a∨成人精品桃花网| 精品一二三四在线| 亚洲国产电影在线观看| 色菇凉天天综合网| 蜜臀av在线播放一区二区三区| 欧美成人vps| 99在线精品视频| 天天影视色香欲综合网老头| ww亚洲ww在线观看国产| 成人av网站免费| 日韩不卡免费视频| 久久久久国产免费免费| 91在线观看污| 天天操天天干天天综合网| 久久久另类综合| 成人三级伦理片| 三级亚洲高清视频| 国产精品国产三级国产a| 欧美日产在线观看| 国产精品主播直播| 亚洲国产成人tv| 欧美激情资源网| 欧美一区二区免费视频| eeuss鲁片一区二区三区在线看| 日日摸夜夜添夜夜添精品视频 | 一区二区视频免费在线观看| 欧美夫妻性生活| www.在线欧美| 国产尤物一区二区在线 | 五月天激情综合| 国产午夜精品一区二区三区视频| 一本大道av一区二区在线播放| 久久电影网站中文字幕| 亚洲精品欧美二区三区中文字幕| 精品久久久久久久久久久久久久久| 91麻豆国产自产在线观看| 精品一区二区三区在线播放 | 亚洲一区二区三区四区中文字幕| 久久丝袜美腿综合| 欧美丰满嫩嫩电影| 色婷婷综合久色| 国产a精品视频| 国产一区二区三区黄视频 | 亚洲人成网站精品片在线观看| 精品久久久影院| 欧美日韩精品福利| 色猫猫国产区一区二在线视频| 精品一区二区三区在线播放| 国产精品嫩草影院av蜜臀| www成人在线观看| 日韩午夜激情视频| 欧美精品18+| 欧美军同video69gay| 色哟哟欧美精品| 92国产精品观看| av影院午夜一区| 成人av网站在线| 白白色亚洲国产精品| 粉嫩绯色av一区二区在线观看| 国产在线观看一区二区| 老司机午夜精品| 久久av老司机精品网站导航| 午夜精品在线看| 五月激情丁香一区二区三区| 亚洲国产欧美日韩另类综合| 亚洲一区二区三区美女| 国产精品盗摄一区二区三区| 久久久久成人黄色影片| 国产欧美一区二区精品仙草咪 | 久久久国产午夜精品| 国产亚洲欧美一级| 欧美经典三级视频一区二区三区| 久久久五月婷婷| 国产精品福利一区| 亚洲精品国产第一综合99久久| 最新国产の精品合集bt伙计| 亚洲三级在线看| 一区二区欧美视频| 婷婷丁香激情综合| 美女视频网站久久| 久久av资源站| 国产69精品一区二区亚洲孕妇 | 七七婷婷婷婷精品国产| 天堂蜜桃一区二区三区| 精品亚洲成av人在线观看| 国产一区二区福利| 99久久免费国产| 色哟哟国产精品免费观看| 欧美日韩精品三区| 2020国产精品| 最新欧美精品一区二区三区| 亚洲乱码中文字幕综合| 日产国产欧美视频一区精品| 国产精品一区二区久激情瑜伽| 成人福利视频在线| 欧美三级中文字幕| 精品美女被调教视频大全网站| 国产欧美综合在线观看第十页| 自拍偷拍亚洲综合| 人人爽香蕉精品| 懂色av一区二区三区免费看| 91福利社在线观看| 欧美大片日本大片免费观看| 国产欧美一区二区精品秋霞影院 | 国产精品视频第一区| 亚洲黄色性网站| 久久99精品国产| 99精品1区2区| 欧美精品一区二区在线观看| 亚洲欧美日韩小说| 极品销魂美女一区二区三区| 色综合一区二区三区| 日韩一级免费一区| 亚洲欧美偷拍另类a∨色屁股| 日韩激情在线观看| 成人av影院在线| 精品国产电影一区二区| 亚洲黄色片在线观看| 国产成人夜色高潮福利影视| 欧美精品第一页| 亚洲日本青草视频在线怡红院| 久久精品国产99国产| 欧美综合亚洲图片综合区| 久久麻豆一区二区| 亚洲va天堂va国产va久| 国产1区2区3区精品美女| 日韩一区二区视频| 一区二区三区国产精品| 国产精品一区二区三区网站| 欧美日韩国产三级| 亚洲猫色日本管| 国产成人av在线影院| 日韩午夜在线观看视频| 亚洲v中文字幕| 91福利在线观看| 国产精品初高中害羞小美女文| 蜜臀av性久久久久蜜臀aⅴ| 欧美午夜精品免费| 亚洲视频一区二区在线观看| 国产美女在线精品| 日韩女优电影在线观看| 亚洲超碰97人人做人人爱| 日本国产一区二区| 亚洲欧洲一区二区在线播放| 国产一区二区三区视频在线播放| 91精品免费在线| 日韩在线一二三区| 欧美午夜一区二区三区| 亚洲九九爱视频| 色诱视频网站一区| 一区二区三区中文字幕| 色综合久久久久网| 一区二区三区欧美视频| 成人爱爱电影网址| 国产精品热久久久久夜色精品三区| 九色综合狠狠综合久久| 日韩欧美亚洲国产另类| 久久精品国产亚洲一区二区三区| 欧美一区二区啪啪| 韩日av一区二区| 久久网站热最新地址| 国产一区二区美女| 国产日韩欧美制服另类| 高清在线观看日韩| 亚洲欧洲av色图| 色婷婷综合久久久中文字幕| 一个色综合av| 欧美日韩精品电影| 久久国产精品99久久人人澡| 久久久久久一级片| 成人动漫中文字幕| 亚洲狠狠丁香婷婷综合久久久| 91成人免费在线视频| 日韩国产欧美视频| 日韩亚洲欧美成人一区| 国产呦萝稀缺另类资源| 国产视频一区在线播放| av在线这里只有精品| 亚洲国产aⅴ天堂久久| 欧美一级日韩不卡播放免费| 久久99精品久久久久久动态图 | 91精品国产综合久久久蜜臀图片| 麻豆免费看一区二区三区| 国产亚洲污的网站| 日本韩国欧美一区| 久久超级碰视频| 国产精品电影一区二区| 777午夜精品视频在线播放| 国产剧情一区二区三区| 一区二区欧美国产|