亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 03-11.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Basic Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=03//-->
<!--PAGES=069-071//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="03-10.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="03-12.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>There are other techniques for message broadcasting, some of which avoid the previous problem. These are discussed in Section 22.7.
</P>
<TABLE WIDTH="70%"><TH CAPTION ALIGN="CENTER" COLSPAN="2">TABLE 3.3<BR>Three-Key Message Encryption
<TR>
<TD COLSPAN="2"><HR>
<TR>
<TH ALIGN="LEFT">Encrypted with Keys:
<TH ALIGN="LEFT">Must be Decrypted with Keys:
<TR>
<TD COLSPAN="2"><HR>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>A</SUB>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>B</SUB> and <I>K</I><SUB>C</SUB>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>B</SUB>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>A</SUB> and <I>K</I><SUB>C</SUB>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>C</SUB>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>A</SUB> and <I>K</I><SUB>B</SUB>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>A</SUB> and <SUB>K</SUB><I>B</I>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>C</SUB>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>A</SUB> and <I>K</I><SUB>C</SUB>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>B</SUB>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>B</SUB> and <I>K</I><SUB>C</SUB>
<TD VALIGN="TOP" ALIGN="LEFT"><I>K</I><SUB>A</SUB>
<TR>
<TD COLSPAN="2"><HR>
</TABLE>
<H3><A NAME="Heading7"></A><FONT COLOR="#000077">3.6 Secret Splitting</FONT></H3>
<P>Imagine that you&#146;ve invented a new, extra gooey, extra sweet, cream filling or a burger sauce that is even more tasteless than your competitors&#146;. This is important; you have to keep it secret. You could tell only your most trusted employees the exact mixture of ingredients, but what if one of them defects to the competition? There goes the secret, and before long every grease palace on the block will be making burgers with sauce as tasteless as yours.
</P>
<P>This calls for <B>secret splitting</B>. There are ways to take a message and divide it up into pieces [551]. Each piece by itself means nothing, but put them together and the message appears. If the message is the recipe and each employee has a piece, then only together can they make the sauce. If any employee resigns with his single piece of the recipe, his information is useless by itself.</P>
<P>The simplest sharing scheme splits a message between two people. Here&#146;s a protocol in which Trent can split a message between Alice and Bob:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Trent generates a random-bit string, <I>R</I>, the same length as the message, <I>M</I>.
<DD><B>(2)</B>&nbsp;&nbsp;Trent XORs <I>M</I> with <I>R</I> to generate <I>S</I>.
<DL>
<DD><I>M</I> &#8853; <I>R</I> = <I>S</I>
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Trent gives <I>R</I> to Alice and <I>S</I> to Bob.
</DL>
<P>To reconstruct the message, Alice and Bob have only one step to do:
</P>
<DL>
<DD><B>(4)</B>&nbsp;&nbsp;Alice and Bob XOR their pieces together to reconstruct the message:
<DL>
<DD><I>R</I> &#8853; <I>S</I> = <I>M</I>
</DL>
</DL>
<P>This technique, if done properly, is absolutely secure. Each piece, by itself, is absolutely worthless. Essentially, Trent is encrypting the message with a one-time pad and giving the ciphertext to one person and the pad to the other person. Section 1.5 discusses one-time pads; they have perfect security. No amount of computing power can determine the message from one of the pieces.
</P>
<P>It is easy to extend this scheme to more people. To split a message among more than two people, XOR more random-bit strings into the mixture. In this example, Trent divides up a message into four pieces:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Trent generates three random-bit strings, <I>R</I>, <I>S</I>, and <I>T</I>, the same length as the message, <I>M</I>.
<DD><B>(2)</B>&nbsp;&nbsp;Trent XORs <I>M</I> with the three strings to generate <I>U</I>:
<DL>
<DD><I>M</I> &#8853; <I>R</I> &#8853; <I>S</I> &#8853; <I>T</I> = <I>U</I>
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Trent gives <I>R</I> to Alice, <I>S</I> to Bob, <I>T</I> to Carol, and <I>U</I> to Dave.
</DL>
<P>Alice, Bob, Carol, and Dave, working together, can reconstruct the message:
</P>
<DL>
<DD><B>(4)</B>&nbsp;&nbsp;Alice, Bob, Carol, and Dave get together and compute:
<DL>
<DD><I>R</I> &#8853; <I>S</I> &#8853; <I>T</I> &#8853; <I>U</I> = <I>M</I>
</DL>
</DL>
<P>This is an adjudicated protocol. Trent has absolute power and can do whatever he wants. He can hand out gibberish and claim that it is a valid piece of the secret; no one will know it until they try to reconstruct the secret. He can hand out a piece to Alice, Bob, Carol, and Dave, and later tell everyone that only Alice, Carol, and Dave are needed to reconstruct the secret, and then fire Bob. But since this is Trent&#146;s secret to divide up, this isn&#146;t a problem.
</P>
<P>However, this protocol has a problem: If any of the pieces gets lost and Trent isn&#146;t around, so does the message. If Carol, who has a piece of the sauce recipe, goes to work for the competition and takes her piece with her, the rest of them are out of luck. She can&#146;t reproduce the recipe, but neither can Alice, Bob, and Dave working together. Her piece is as critical to the message as every other piece combined. All Alice, Bob, or Dave know is the length of the message&#151;nothing more. This is true because <I>R</I>, <I>S</I>, <I>T</I>, <I>U</I>, and <I>M</I> all have the same length; seeing anyone of them gives the length of <I>M</I>. Remember, <I>M</I> isn&#146;t being split in the normal sense of the word; it is being XORed with random values.</P>
<H3><A NAME="Heading8"></A><FONT COLOR="#000077">3.7 Secret Sharing</FONT></H3>
<P>You&#146;re setting up a launch program for a nuclear missile. You want to make sure that no single raving lunatic can initiate a launch. You want to make sure that no two raving lunatics can initiate a launch. You want at least three out of five officers to be raving lunatics before you allow a launch.
</P>
<P>This is easy to solve. Make a mechanical launch controller. Give each of the five officers a key and require that at least three officers stick their keys in the proper slots before you&#146;ll allow them to blow up whomever we&#146;re blowing up this week. (If you&#146;re really worried, make the slots far apart and require the officers to insert the keys simultaneously&#151;you wouldn&#146;t want an officer who steals two keys to be able to vaporize Toledo.)</P>
<P>We can get even more complicated. Maybe the general and two colonels are authorized to launch the missile, but if the general is busy playing golf then five colonels are required to initiate a launch. Make the launch controller so that it requires five keys. Give the general three keys and the colonels one each. The general together with any two colonels can launch the missile; so can the five colonels. However, a general and one colonel cannot; neither can four colonels.</P>
<P>A more complicated sharing scheme, called a <B>threshold scheme</B>, can do all of this and more&#151;mathematically. At its simplest level, you can take any message (a secret recipe, launch codes, your laundry list, etc.) and divide it into <I>n</I> pieces, called <B>shadows or shares</B>, such that any <I>m</I> of them can be used to reconstruct the message. More precisely, this is called an <B>(<I>m,n</I>)-threshold scheme</B>.</P>
<P>With a (3,4)-threshold scheme, Trent can divide his secret sauce recipe among Alice, Bob, Carol, and Dave, such that any three of them can put their shadows together and reconstruct the message. If Carol is on vacation, Alice, Bob, and Dave can do it. If Bob gets run over by a bus, Alice, Carol, and Dave can do it. However, if Bob gets run over by a bus while Carol is on vacation, Alice and Dave can&#146;t reconstruct the message by themselves.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="03-10.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="03-12.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩亚洲欧美一区| 91福利在线观看| 欧美综合久久久| 欧美一级淫片007| 国产精品欧美经典| 五月综合激情日本mⅴ| 国产一区二区导航在线播放| 91在线观看高清| 91精品国产综合久久国产大片 | 精品视频一区二区不卡| 26uuu国产电影一区二区| 亚洲另类春色国产| 激情综合色播五月| 在线免费观看日本欧美| 久久久精品日韩欧美| 亚洲高清免费视频| 国产精品99精品久久免费| av在线一区二区| 日韩欧美在线网站| 成人免费毛片片v| 91精品国产品国语在线不卡| 亚洲精品免费视频| 成人精品免费看| 久久亚洲精品国产精品紫薇| 视频一区欧美日韩| 欧美性大战xxxxx久久久| 国产精品欧美精品| 国产成人精品一区二区三区网站观看| 欧美一级搡bbbb搡bbbb| 亚洲国产精品久久人人爱| 91污片在线观看| 国产精品国产三级国产普通话三级 | 欧美日韩午夜影院| 亚洲一区在线观看视频| 一本大道久久精品懂色aⅴ| 中文字幕亚洲一区二区av在线| 国产一区二区三区在线观看精品 | 欧美午夜精品久久久久久超碰| 最新欧美精品一区二区三区| 成人免费视频一区二区| 中文文精品字幕一区二区| 国产麻豆精品theporn| 久久综合九色欧美综合狠狠 | 亚洲精品国产a久久久久久| av一区二区三区四区| 国产精品欧美极品| 成人免费的视频| 中文字幕一区二区三区色视频| 成人av资源在线观看| 国产精品久久看| 91影院在线观看| 一区二区三区日韩精品视频| 色综合久久九月婷婷色综合| 亚洲色图欧洲色图| 在线观看一区二区视频| 伊人色综合久久天天| 在线看不卡av| 日韩精品成人一区二区在线| 欧美一区二区在线看| 极品少妇一区二区| 国产精品丝袜一区| 91香蕉视频污| 五月天欧美精品| 日韩情涩欧美日韩视频| 国产剧情av麻豆香蕉精品| 久久久99免费| aa级大片欧美| 亚洲国产中文字幕| 日韩一区二区三区高清免费看看| 麻豆精品视频在线| 国产清纯美女被跳蛋高潮一区二区久久w | 亚洲精品在线一区二区| 国产99精品国产| 亚洲欧美日韩国产综合在线 | 韩国三级电影一区二区| 欧美极品少妇xxxxⅹ高跟鞋| 色妞www精品视频| 日本一道高清亚洲日美韩| 久久久亚洲精华液精华液精华液| 成人精品视频网站| 午夜精品爽啪视频| 26uuu色噜噜精品一区| 成人免费视频网站在线观看| 亚洲一区av在线| 欧美精品一区在线观看| 99在线精品观看| 亚洲国产日韩一区二区| 精品国产1区二区| 91浏览器打开| 美女性感视频久久| 亚洲欧洲性图库| 欧美男男青年gay1069videost| 激情图片小说一区| 亚洲欧美偷拍卡通变态| 日韩亚洲欧美成人一区| 成人美女在线视频| 亚洲va欧美va国产va天堂影院| 欧美精品一区二区三区蜜臀| 91色乱码一区二区三区| 久久国产视频网| 亚洲免费三区一区二区| 日韩欧美色综合网站| 97se狠狠狠综合亚洲狠狠| 六月丁香婷婷久久| 一区二区三区四区精品在线视频| 日韩精品一区二区在线观看| 91在线精品一区二区| 美女免费视频一区二区| 亚洲人成网站精品片在线观看| 日韩免费观看高清完整版| 91视频一区二区| 国内精品伊人久久久久av影院| 亚洲黄色免费网站| 久久久99精品免费观看| 8x8x8国产精品| 91丨九色porny丨蝌蚪| 久久国产精品99精品国产| 亚洲乱码国产乱码精品精98午夜| 2020国产精品| 91麻豆精品国产91久久久久久| 99久久精品情趣| 国产一区二区导航在线播放| 天使萌一区二区三区免费观看| 中文字幕在线观看一区| 精品国产亚洲一区二区三区在线观看| 在线精品视频一区二区三四| 成人午夜激情视频| 国产九色精品成人porny| 亚洲大片精品永久免费| 中文字幕在线观看一区| 国产欧美日韩在线| 精品国产一区二区三区忘忧草| 欧美日韩成人综合天天影院| 91国偷自产一区二区三区观看 | 亚洲h在线观看| 亚洲图片另类小说| 国产精品国产自产拍在线| 久久久久久黄色| 精品粉嫩aⅴ一区二区三区四区| 欧美精选午夜久久久乱码6080| 日本久久一区二区三区| 99精品视频免费在线观看| 国产一区在线视频| 久99久精品视频免费观看| 日韩福利视频导航| 五月婷婷久久综合| 性欧美大战久久久久久久久| 亚洲自拍偷拍九九九| 亚洲精品国产品国语在线app| 国产精品理伦片| 中文字幕成人av| 国产精品三级视频| 国产免费观看久久| 国产精品丝袜在线| 国产精品丝袜91| 国产精品美女久久福利网站| 国产视频一区在线观看| 国产欧美日韩中文久久| 国产日韩综合av| 国产精品无人区| 中文字幕永久在线不卡| ㊣最新国产の精品bt伙计久久| 亚洲欧洲精品一区二区精品久久久| 中文字幕不卡在线观看| 中文字幕一区二区三区不卡在线 | 日韩欧美成人一区| 日韩精品中文字幕一区| 精品久久久久久久人人人人传媒| 欧美不卡激情三级在线观看| 精品欧美久久久| 国产三级一区二区| 中文字幕乱码亚洲精品一区| 中文字幕一区二区三区av| 亚洲欧洲成人av每日更新| 亚洲日本欧美天堂| 亚洲自拍欧美精品| 日韩精品色哟哟| 久久精品国产久精国产| 国精产品一区一区三区mba视频 | 天天av天天翘天天综合网| 日韩电影免费在线观看网站| 另类小说视频一区二区| 国产主播一区二区| 不卡一二三区首页| 欧美在线一二三| 欧美一区二区三区视频免费| 精品国产精品一区二区夜夜嗨| 国产亚洲精久久久久久| 亚洲欧洲美洲综合色网| 亚洲午夜久久久久久久久电影网 | 欧美激情艳妇裸体舞| 亚洲激情图片qvod| 午夜不卡av在线| 国产美女在线观看一区| 97精品久久久久中文字幕| 欧美久久久久久久久久| 国产亚洲精品aa午夜观看| 亚洲精品乱码久久久久久黑人| 亚洲成人免费看| 国产一区二区按摩在线观看|