亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? index.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head>
<TITLE>
	ASSUREDIGIT:APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Foreword
</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=Foreword//-->
<!--PAGES=xv-xviii//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="ewtoc.html">Previous</A></TD>
<TD><A HREF="ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="about.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Foreword By Whitfield Diffie</FONT></H2>
<P>The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman&#146;s monograph <I>The Index of Coincidence and Its Applications in Cryptography</I>, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.</P>
<P>After the First World War, however, things began to change. U.S. Army and Navy organizations, working entirely in secret, began to make fundamental advances in cryptography. During the thirties and forties a few basic papers did appear in the open literature and several treatises on the subject were published, but the latter were farther and farther behind the state of the art. By the end of the war the transition was complete. With one notable exception, the public literature had died. That exception was Claude Shannon&#146;s paper &#147;The Communication Theory of Secrecy Systems,&#148; which appeared in the <I>Bell System Technical Journal</I> in 1949 [1432]. It was similar to Friedman&#146;s 1918 paper, in that it grew out of wartime work of Shannon&#146;s. After the Second World War ended it was declassified, possibly by mistake.</P>
<P>From 1949 until 1967 the cryptographic literature was barren. In that year a different sort of contribution appeared: David Kahn&#146;s history, <I>The Codebreakers</I> [794]. It didn&#146;t contain any new technical ideas, but it did contain a remarkably complete history of what had gone before, including mention of some things that the government still considered secret. The significance of <I>The Codebreakers</I> lay not just in its remarkable scope, but also in the fact that it enjoyed good sales and made tens of thousands of people, who had never given the matter a moment&#146;s thought, aware of cryptography. A trickle of new cryptographic papers began to be written.</P>
<P>At about the same time, Horst Feistel, who had earlier worked on identification friend or foe devices for the Air Force, took his lifelong passion for cryptography to the IBM Watson Laboratory in Yorktown Heights, New York. There, he began development of what was to become the U.S. Data Encryption Standard; by the early 1970s several technical reports on this subject by Feistel and his colleagues had been made public by IBM [1482,1484,552].</P>
<P>This was the situation when I entered the field in late 1972. The cryptographic literature wasn&#146;t abundant, but what there was included some very shiny nuggets.</P>
<P>Cryptology presents a difficulty not found in normal academic disciplines: the need for the proper interaction of cryptography and cryptanalysis. This arises out of the fact that in the absence of real communications requirements, it is easy to propose a system that appears unbreakable. Many academic designs are so complex that the would&#150;be cryptanalyst doesn&#146;t know where to start; exposing flaws in these designs is far harder than designing them in the first place. The result is that the competitive process, which is one strong motivation in academic research, cannot take hold.</P>
<P>When Martin Hellman and I proposed public&#150;key cryptography in 1975 [496], one of the indirect aspects of our contribution was to introduce a problem that does not even appear easy to solve. Now an aspiring cryptosystem designer could produce something that would be recognized as clever&#151;something that did more than just turn meaningful text into nonsense. The result has been a spectacular increase in the number of people working in cryptography, the number of meetings held, and the number of books and papers published.</P>
<P>In my acceptance speech for the Donald E. Fink award&#151;given for the best expository paper to appear in an IEEE journal&#151;which I received jointly with Hellman in 1980, I told the audience that in writing &#147;Privacy and Authentication,&#148; I had an experience that I suspected was rare even among the prominent scholars who populate the IEEE awards ceremony: I had written the paper I had wanted to study, but could not find, when I first became seriously interested in cryptography. Had I been able to go to the Stanford bookstore and pick up a modern cryptography text, I would probably have learned about the field years earlier. But the only things available in the fall of 1972 were a few classic papers and some obscure technical reports.</P>
<P>The contemporary researcher has no such problem. The problem now is choosing where to start among the thousands of papers and dozens of books. The contemporary researcher, yes, but what about the contemporary programmer or engineer who merely wants to use cryptography? Where does that person turn? Until now, it has been necessary to spend long hours hunting out and then studying the research literature before being able to design the sort of cryptographic utilities glibly described in popular articles.</P>
<P>This is the gap that Bruce Schneier&#146;s <I>Applied Cryptography</I> has come to fill. Beginning with the objectives of communication security and elementary examples of programs used to achieve these objectives, Schneier gives us a panoramic view of the fruits of 20 years of public research. The title says it all; from the mundane objective of having a secure conversation the very first time you call someone to the possibilities of digital money and cryptographically secure elections, this is where you&#146;ll find it.</P>
<P>Not satisfied that the book was about the real world merely because it went all the way down to the code, Schneier has included an account of the world in which cryptography is developed and applied, and discusses entities ranging from the International Association for Cryptologic Research to the NSA.</P>
<P>When public interest in cryptography was just emerging in the late seventies and early eighties, the National Security Agency (NSA), America&#146;s official cryptographic organ, made several attempts to quash it. The first was a letter from a long&#150;time NSA employee allegedly, avowedly, and apparently acting on his own. The letter was sent to the IEEE and warned that the publication of cryptographic material was a violation of the International Traffic in Arms Regulations (ITAR). This viewpoint turned out not even to be supported by the regulations themselves&#151;which contained an explicit exemption for published material&#151;but gave both the public practice of cryptography and the 1977 Information Theory Workshop lots of unexpected publicity.</P>
<P>A more serious attempt occurred in 1980, when the NSA funded the American Council on Education to examine the issue with a view to persuading Congress to give it legal control of publications in the field of cryptography. The results fell far short of NSA&#146;s ambitions and resulted in a program of voluntary review of cryptographic papers; researchers were requested to ask the NSA&#146;s opinion on whether disclosure of results would adversely affect the national interest before publication.</P>
<P>As the eighties progressed, pressure focused more on the practice than the study of cryptography. Existing laws gave the NSA the power, through the Department of State, to regulate the export of cryptographic equipment. As business became more and more international and the American fraction of the world market declined, the pressure to have a single product in both domestic and offshore markets increased. Such single products were subject to export control and thus the NSA acquired substantial influence not only over what was exported, but also over what was sold in the United States.</P>
<P>As this is written, a new challenge confronts the public practice of cryptography. The government has augmented the widely published and available Data Encryption Standard, with a secret algorithm implemented in tamper&#150;resistant chips. These chips will incorporate a codified mechanism of government monitoring. The negative aspects of this &#147;key&#150;escrow&#148; program range from a potentially disastrous impact on personal privacy to the high cost of having to add hardware to products that had previously encrypted in software. So far key escrow products are enjoying less than stellar sales and the scheme has attracted widespread negative comment, especially from the independent cryptographers. Some people, however, see more future in programming than politicking and have redoubled their efforts to provide the world with strong cryptography that is accessible to public scrutiny.</P>
<P>A sharp step back from the notion that export control law could supersede the First Amendment seemed to have been taken in 1980 when the <I>Federal Register</I> announcement of a revision to ITAR included the statement: &#147;...provision has been added to make it clear that the regulation of the export of technical data does not purport to interfere with the First Amendment rights of individuals.&#148; But the fact that tension between the First Amendment and the export control laws has not gone away should be evident from statements at a conference held by RSA Data Security. NSA&#146;s representative from the export control office expressed the opinion that people who published cryptographic programs were &#147;in a grey area&#148; with respect to the law. If that is so, it is a grey area on which the first edition of this book has shed some light. Export applications for the book itself have been granted, with acknowledgement that published material lay beyond the authority of the Munitions Control Board. Applications to export the enclosed programs on disk, however, have been denied.</P>
<P>The shift in the NSA&#146;s strategy, from attempting to control cryptographic research to tightening its grip on the development and deployment of cryptographic products, is presumably due to its realization that all the great cryptographic papers in the world do not protect a single bit of traffic. Sitting on the shelf, this volume may be able to do no better than the books and papers that preceded it, but sitting next to a workstation, where a programmer is writing cryptographic code, it just may.</P>
<TABLE WIDTH="100%"><TD WIDTH="75%" ALIGN="RIGHT">
<TD WIDTH="25%" ALIGN="LEFT">Whitfield Diffie<BR>Mountain View, CA
</TABLE>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="ewtoc.html">Previous</A></TD>
<TD><A HREF="ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="about.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
五月婷婷激情综合| www.欧美日韩| 91丨porny丨蝌蚪视频| 欧美日精品一区视频| 国产日韩精品一区二区浪潮av| 一区二区三区四区中文字幕| 国内精品久久久久影院一蜜桃| 欧美日韩精品一二三区| 欧美国产国产综合| 老司机精品视频导航| 欧美三级电影一区| √…a在线天堂一区| 精品在线播放午夜| 91麻豆精品久久久久蜜臀 | 在线看日本不卡| 国产亚洲成av人在线观看导航| 亚洲va天堂va国产va久| 一本大道久久a久久综合婷婷| 久久久久久久久久美女| 免费一级片91| 91精品久久久久久久99蜜桃| 亚洲午夜精品17c| 91网站在线观看视频| 欧美国产欧美综合| 国产夫妻精品视频| 精品日产卡一卡二卡麻豆| 日本女人一区二区三区| 欧美日韩亚洲国产综合| 亚洲自拍另类综合| 色哟哟精品一区| 亚洲美女偷拍久久| 91免费看片在线观看| 一区二区三区在线视频播放| 不卡av在线免费观看| 国产精品国产三级国产a| 成人av网址在线| 国产精品久久久久影院亚瑟| 成人性生交大片免费| 综合久久久久久| 99re成人精品视频| 亚洲最色的网站| 欧美精品一二三四| 久久不见久久见免费视频1| 欧美不卡在线视频| 国产一区二区福利视频| 国产精品网曝门| 91蜜桃在线观看| 亚洲va国产va欧美va观看| 欧美视频在线播放| 免费成人在线视频观看| 欧美r级在线观看| 成人深夜福利app| 亚洲色欲色欲www在线观看| 欧美日韩一区视频| 蜜臀av一区二区在线免费观看 | 亚洲最大色网站| 欧美另类高清zo欧美| 麻豆精品一二三| 欧美极品xxx| 欧美午夜精品久久久久久超碰| 日韩精品乱码免费| 久久一二三国产| 成人深夜福利app| 亚洲成人高清在线| 国产日韩欧美综合在线| 91福利社在线观看| 精彩视频一区二区三区| 成人欧美一区二区三区小说| 91精品国产一区二区| 国产在线一区观看| 亚洲综合激情另类小说区| 日韩欧美久久久| 91免费看`日韩一区二区| 日韩va亚洲va欧美va久久| 国产精品素人一区二区| 欧美三级视频在线| 成人国产精品免费观看动漫 | 全国精品久久少妇| 中文字幕一区三区| 欧美一区二区免费| 一本一本大道香蕉久在线精品 | 久久精工是国产品牌吗| 欧美国产精品一区| 日韩三级高清在线| 99国产精品国产精品久久| 奇米影视一区二区三区小说| 亚洲三级小视频| 久久综合色婷婷| 欧美美女直播网站| aaa国产一区| 狠狠色丁香婷综合久久| 一级特黄大欧美久久久| 久久九九久久九九| 日韩免费福利电影在线观看| 色欧美88888久久久久久影院| 国内外成人在线视频| 午夜不卡av免费| 亚洲色图一区二区三区| 国产亚洲短视频| 久久伊99综合婷婷久久伊| 欧美精品777| 欧美无砖专区一中文字| 3d成人动漫网站| 色婷婷久久久综合中文字幕| 国产成人aaa| 激情综合亚洲精品| 蜜臀av性久久久久蜜臀aⅴ四虎| 亚洲国产精品久久人人爱| 最好看的中文字幕久久| 国产精品激情偷乱一区二区∴| 久久精品一级爱片| 久久先锋影音av| 精品久久久久久久一区二区蜜臀| 91精品国产欧美一区二区| 亚洲色大成网站www久久九九| 国产农村妇女毛片精品久久麻豆| 欧美大片在线观看| 欧美一区二区播放| 精品国产乱子伦一区| 精品剧情v国产在线观看在线| 欧美一区二区视频网站| 欧美一级久久久| 欧美sm美女调教| 亚洲精品一区二区三区精华液| 欧美大尺度电影在线| 欧美成人一区二区三区| 日韩免费高清av| 亚洲精品一区二区三区四区高清| www欧美成人18+| 久久九九久久九九| 亚洲日本在线a| 亚洲大尺度视频在线观看| 日韩精品一二三区| 国内精品在线播放| av激情综合网| 欧美日韩国产区一| 精品卡一卡二卡三卡四在线| 国产精品午夜久久| 一区二区三区免费观看| 亚洲电影你懂得| 黑人精品欧美一区二区蜜桃| 波多野结衣亚洲一区| 欧美性受xxxx| 精品sm在线观看| 亚洲精品中文在线影院| 免费的成人av| av一区二区三区黑人| 欧美精品v日韩精品v韩国精品v| 久久影院午夜论| 亚洲精品视频在线观看网站| 亚洲成人你懂的| 国产在线观看一区二区| 国产在线精品免费| 欧美在线视频不卡| 精品久久人人做人人爱| 国产精品美女久久久久久久 | 欧美军同video69gay| 欧美一区二区三区播放老司机| 9人人澡人人爽人人精品| 色婷婷综合久久久中文一区二区| 欧美欧美欧美欧美首页| 日韩视频免费观看高清在线视频| 日韩免费视频一区二区| 亚洲区小说区图片区qvod| 五月天国产精品| 久久99国内精品| 99国产欧美另类久久久精品| 一区在线观看免费| 亚洲国产精品一区二区久久恐怖片| 强制捆绑调教一区二区| 99久久99久久久精品齐齐| 精品国产乱码久久久久久蜜臀| 久久久.com| 日韩专区在线视频| 国产成人av一区二区三区在线 | 国产精品超碰97尤物18| 亚洲成人一二三| 久久99精品视频| 福利一区二区在线观看| 正在播放亚洲一区| 国产精品久久久久久久第一福利| 亚洲国产精品嫩草影院| 国内不卡的二区三区中文字幕| 777亚洲妇女| 亚洲女人小视频在线观看| 久久超级碰视频| 欧美一级二级在线观看| 一区二区三区四区亚洲| 粉嫩aⅴ一区二区三区四区五区| 欧洲国产伦久久久久久久| 国产精品欧美综合在线| 国产精品69久久久久水密桃 | 国产精品一品视频| 欧美精品在线视频| 中文字幕一区二区三中文字幕| 国产精品一级在线| 精品国产乱码久久久久久蜜臀| 午夜精品久久久久久久99樱桃| 欧美在线观看禁18| 日韩伦理电影网|