亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 21-01.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Identification Schemes</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=21//-->
<!--PAGES=503-505//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch20/20-09.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="21-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Chapter 21<BR>Identification Schemes
</FONT></H2>
<H3><A NAME="Heading2"></A><FONT COLOR="#000077">21.1 Feige-Fiat-Shamir</FONT></H3>
<P>Amos Fiat&#146;s and Adi Shamir&#146;s authentication and digital signature scheme is discussed in [566,567]. Uriel Feige, Fiat, and Shamir modified the algorithm to a zero-knowledge proof of identity [544,545]. This is the best-known zero-knowledge proof of identity.
</P>
<P>On July 9, 1986 the three authors submitted a U.S. patent application [1427]. Because of its potential military applications, the application was reviewed by the military. Occasionally the Patent Office responds not with a patent, but with something called a secrecy order. On January 6, 1987, three days before the end of their six-month period, the Patent Office imposed that order at the request of the Army. They stated that &#147;...the disclosure or publication of the subject matter...would be detrimental to the national security....&#148; The authors were ordered to notify all Americans to whom the research had been disclosed that unauthorized disclosure could lead to two years&#146; imprisonment, a $10,000 fine, or both. Furthermore, the authors had to inform the Commissioner of Patents and Trademarks of all foreign citizens to whom the information had been disclosed.</P>
<P>This was ludicrous. All through the second half of 1986, the authors had presented the work at conferences throughout Israel, Europe, and the United States. The authors weren&#146;t even American citizens, and all the work had been done at the Weizmann Institute in Israel.</P>
<P>Word spread through the academic community and the press. Within two days the secrecy order was rescinded; Shamir and others believe that the NSA pulled strings to rescind the order, although they officially had no comment. Further details of this bizarre story are in [936].</P>
<P><FONT SIZE="+1"><B><I>Simplified Feige-Fiat-Shamir Identification Scheme</I></B></FONT></P>
<P>Before issuing any private keys, the arbitrator chooses a random modulus, <I>n</I>, which is the product of two large primes. In real life, <I>n</I> should be at least 512 bits long and probably closer to 1024 bits. This <I>n</I> can be shared among a group of provers. (Choosing a Blum integer makes computation easier, but it is not required for security.)</P>
<P>To generate Peggy&#146;s public and private keys, a trusted arbitrator chooses a number, <I>v,</I> where <I>v</I> is a quadratic residue mod <I>n.</I> In other words, choose <I>v</I> such that <I>x</I><SUP>2</SUP> &#8801; <I>v</I> (mod <I>n</I>) has a solution and <I>v</I><SUP>-1</SUP> mod <I>n</I> exists. This <I>v</I> is Peggy&#146;s public key. Then calculate the smallest <I>s</I> for which <I>s</I> &#8801; sqrt (<I>v</I><SUP>-1</SUP>) (mod <I>n</I>). This is Peggy&#146;s private key.</P>
<P>The identification protocol can now proceed.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Peggy picks a random <I>r,</I> where <I>r</I> is less then <I>n.</I> She then computes <I>x</I> = <I>r</I><SUP>2</SUP> mod <I>n,</I> and sends <I>x</I> to Victor.
<DD><B>(2)</B>&nbsp;&nbsp;Victor sends Peggy a random bit, <I>b.</I>
<DD><B>(3)</B>&nbsp;&nbsp;If <I>b</I> = 0, then Peggy sends Victor <I>r.</I> If <I>b</I> = 1, then Peggy sends Victor <I>y</I> = <I>r</I> * <I>s</I> mod <I>n.</I>
<DD><B>(4)</B>&nbsp;&nbsp;If <I>b</I> = 0, Victor verifies that <I>x</I> = <I>r</I><SUP>2</SUP> mod <I>n,</I> proving that Peggy knows sqrt (<I>x</I>). If <I>b</I> = 1, Victor verifies that <I>x</I> = <I>y</I><SUP>2</SUP> * <I>v</I> mod <I>n,</I> proving that Peggy knows sqrt (<I>v</I><SUP>-1</SUP>).
</DL>
<P>This is a single round&#151;called an <B>accreditation</B>&#151;of the protocol. Peggy and Victor repeat this protocol <I>t</I> times, until Victor is convinced that Peggy knows <I>s.</I> It&#146;s a cut-and-choose protocol. If Peggy doesn&#146;t know <I>s,</I> she can pick <I>r</I> such that she can fool Victor if he sends her a 0, or she can pick <I>r</I> such that she can fool Victor if he sends her a 1. She can&#146;t do both. The odds of her fooling Victor once are 50 percent. The odds of her fooling him <I>t</I> times are 1 in 2<SUP>t</SUP>.</P>
<P>Another way for Victor to attack the protocol would be trying to impersonate Peggy. He could initiate the protocol with another verifier, Valerie. In step (1), instead of choosing a random <I>r,</I> he would just reuse an old <I>r</I> that he saw Peggy use. However, the odds of Valerie choosing the same value for <I>b</I> in step (2) that Victor did in the protocol with Peggy are 1 in 2. So, the odds of his fooling Valerie are 50 percent. The odds of his fooling her <I>t</I> times are 1 in 2<SUP>t</SUP>.</P>
<P>For this to work, Peggy must not reuse an <I>r,</I> ever. If she did, and Victor sent Peggy the other random bit in step (2), then he would have both of Peggy&#146;s responses. Then, from even one of these, he can calculate <I>s</I> and it&#146;s all over for Peggy.</P>
<P><FONT SIZE="+1"><B><I>Feige-Fiat-Shamir Identification Scheme</I></B></FONT></P>
<P>In their papers [544,545], Feige, Fiat and Shamir show how parallel construction can increase the number of accreditations per round and reduce Peggy and Victor&#146;s interactions.
</P>
<P>First generate <I>n</I> as in the previous example, the product of two large primes. To generate Peggy&#146;s public and private keys, first choose <I>k</I> different numbers: <I>v</I><SUB>1,</SUB> <I>v</I><SUB>2,...,</SUB> <I>v</I><SUB>k,</SUB> where each <I>v</I><SUB>i</SUB> is a quadratic residue mod <I>n.</I> In other words, choose <I>v</I><SUB>i</SUB> such that <I>x</I><SUP>2</SUP> = <I>v</I><SUB>i</SUB> mod <I>n</I> has a solution and <I>v</I><SUB>i</SUB><SUP>-1</SUP> mod <I>n</I> exists. This string, <I>v</I><SUB>1,</SUB> <I>v</I><SUB>2,...,</SUB> <I>v</I><SUB>k</SUB>, is the public key. Then calculate the smallest <I>s</I><SUB>i</SUB> such that <I>s</I><SUB>i</SUB> = sqrt (<I>v</I><SUB>i</SUB><SUP>-1</SUP>) mod <I>n.</I> This string, <I>s</I><SUB>1,</SUB> <I>s</I><SUB>2,...,</SUB> <I>s</I><SUB>k,</SUB> is the private key.</P>
<P>And the protocol is:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Peggy picks a random <I>r,</I> when <I>r</I> is less than <I>n.</I> She then computes <I>x</I> = <I>r</I><SUP>2</SUP> mod <I>n,</I> and sends <I>x</I> to Victor.
<DD><B>(2)</B>&nbsp;&nbsp;Victor sends Peggy a random binary string <I>k-</I>bits long: <I>b</I><SUB>1,</SUB> <I>b</I><SUB>2,...,</SUB> <I>b</I><SUB>k</SUB>.
<DD><B>(3)</B>&nbsp;&nbsp;Peggy computes <I>y</I> = <I>r</I> * (<I>s</I><SUB>1</SUB><SUP>b</SUP><SMALL><SUP>1</SUP></SMALL> * <I>s</I><SUB>2</SUB><SUP>b</SUP><SMALL><SUP>2</SUP></SMALL> *...* <I>s</I><SUB>k</SUB><SUP>b</SUP><SMALL><SUP>k</SUP></SMALL>) mod <I>n.</I> (She multiplies together whichever values of <I>s</I><SUB>i</SUB> that correspond to <I>b</I>i = 1. If Victor&#146;s first bit is a 1, then <I>s</I><SUB>1</SUB> is part of the product; if Victor&#146;s first bit is a 0, then <I>s</I><SUB>1</SUB> is not part of the product, and so on.) She sends <I>y</I> to Victor.
<DD><B>(4)</B>&nbsp;&nbsp;Victor verifies that <I>x</I> = <I>y</I><SUP>2</SUP> * (<I>v</I><SUB>1</SUB><SUP>b</SUP><SMALL><SUP>1</SUP></SMALL> * <I>v</I><SUB>2</SUB><SUP>b</SUP><SMALL><SUP>2</SUP></SMALL> *...* <I>v</I><SUB>k</SUB><SUP>b</SUP><SMALL><SUP>k</SUP></SMALL>) mod <I>n.</I> (He multiplies together the values of <I>v</I><SUB>i</SUB> based on the random binary string. If his first bit is a 1, then <I>v</I><SUB>1</SUB> is part of the product; if his first bit is a 0, then <I>v</I><SUB>1</SUB> is not part of the product, and so on.)
</DL>
<P>Peggy and Victor repeat this protocol <I>t</I> times, until Victor is convinced that Peggy knows <I>s</I><SUB>1,</SUB> <I>s</I><SUB>2,...,</SUB> <I>s</I><SUB>k</SUB>.</P>
<P>The chance that Peggy can fool Victor is 1 in 2<SUP>kt</SUP>. The authors recommend a 1 in 220 chance of a cheater fooling Victor and suggest that <I>k</I> = 5 and <I>t</I> = 4. If you are more paranoid, increase these numbers.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch20/20-09.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="21-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩视频在线永久播放| 性做久久久久久免费观看欧美| 日本中文字幕不卡| 欧美日韩三级一区二区| 亚洲综合在线视频| 欧美日韩专区在线| 日本亚洲一区二区| 精品久久五月天| 国产成人精品www牛牛影视| 久久久不卡网国产精品一区| 国产精品一级黄| 国产精品久久久久精k8| 在线观看一区不卡| 奇米777欧美一区二区| 精品国产91乱码一区二区三区 | 欧美国产日韩精品免费观看| 粉嫩一区二区三区在线看| 国产精品久久久久aaaa| 在线精品视频一区二区三四| 全部av―极品视觉盛宴亚洲| 精品国产成人在线影院| 91免费视频观看| 日韩精品1区2区3区| 26uuu另类欧美亚洲曰本| aaa欧美色吧激情视频| 亚洲国产精品麻豆| 亚洲精品一区二区精华| 99综合电影在线视频| 亚洲成人黄色影院| 久久久久久9999| 91国产丝袜在线播放| 韩国三级中文字幕hd久久精品| 综合av第一页| 精品国偷自产国产一区| 91视频国产资源| 麻豆精品在线看| 亚洲色欲色欲www在线观看| 91精品国产乱| 色综合天天做天天爱| 日本vs亚洲vs韩国一区三区 | 国产精品中文字幕日韩精品| 国产精品视频一二三| 宅男噜噜噜66一区二区66| 成人午夜视频免费看| 天天综合网 天天综合色| 欧美极品aⅴ影院| 日韩视频不卡中文| 91极品美女在线| 国产福利一区在线| 午夜伊人狠狠久久| 亚洲欧洲国产日韩| 久久丝袜美腿综合| 91精品国产麻豆| 欧美三级欧美一级| 99久久亚洲一区二区三区青草| 麻豆精品在线看| 日韩二区三区四区| 亚洲午夜一区二区三区| 一区在线中文字幕| 国产亚洲一区二区三区四区 | 亚欧色一区w666天堂| 亚洲视频一区二区在线| 久久久久久久国产精品影院| 欧美xxxx老人做受| 69久久99精品久久久久婷婷 | 亚洲一区二区视频在线观看| 国产午夜精品久久久久久久 | 国产精品美女www爽爽爽| 欧美一区二区三区人| 欧美三级韩国三级日本三斤| 91网站在线观看视频| jiyouzz国产精品久久| 成人一区在线看| 成人综合在线网站| 国产99久久久精品| 国产成人精品午夜视频免费 | 亚洲人成小说网站色在线| 国产亚洲污的网站| 欧美精品一区在线观看| 久久久久久久久久久久电影| 精品理论电影在线观看| 欧美一级精品大片| 日韩一区二区三区观看| 日韩一级免费观看| 日韩欧美国产成人一区二区| 日韩一区二区三区免费看| 日韩欧美一区电影| 欧美tickling挠脚心丨vk| 日韩免费视频线观看| 2023国产精品| 欧美激情资源网| 国产精品久久久久一区二区三区| 国产欧美日韩精品一区| 中文成人综合网| 国产精品国产精品国产专区不蜜| 国产精品传媒视频| 亚洲国产视频网站| 免费成人美女在线观看.| 国模冰冰炮一区二区| 国产精品123| 91网站在线观看视频| 欧美日本一区二区| 久久久影视传媒| 一区二区中文字幕在线| 亚洲午夜久久久久久久久久久| 免费成人在线网站| 国产91丝袜在线播放九色| 99re在线精品| 6080午夜不卡| 国产亚洲污的网站| 亚洲国产欧美另类丝袜| 久久97超碰色| 色综合婷婷久久| 日韩欧美不卡在线观看视频| 国产日产欧美精品一区二区三区| 亚洲欧美国产高清| 免费人成在线不卡| 国产拍揄自揄精品视频麻豆| 亚洲综合免费观看高清完整版在线 | 精品视频全国免费看| 7777女厕盗摄久久久| 国产午夜亚洲精品理论片色戒 | 欧美高清一级片在线| 久久人人爽人人爽| 亚洲丝袜精品丝袜在线| 日韩专区欧美专区| 成人午夜电影网站| 制服丝袜av成人在线看| 国产精品久久久久永久免费观看| 亚洲成人激情自拍| 成人av网站在线观看| 91精品国产一区二区三区香蕉| 欧美极品美女视频| 免费在线观看不卡| 欧美最新大片在线看| 国产欧美日产一区| 日本女人一区二区三区| 色综合天天狠狠| 久久久久久毛片| 天堂久久久久va久久久久| 成人免费视频播放| 日韩欧美一区电影| 色哟哟一区二区| 国产午夜亚洲精品不卡| 欧美a一区二区| 日本道在线观看一区二区| 久久九九久久九九| 日本中文字幕一区二区有限公司| 一本高清dvd不卡在线观看| 国产午夜亚洲精品午夜鲁丝片 | 亚洲视频一区二区免费在线观看| 另类小说视频一区二区| 欧美日韩精品欧美日韩精品一综合| 中文一区二区完整视频在线观看 | 中文字幕一区三区| 极品瑜伽女神91| 欧美一级一区二区| 午夜视频一区二区三区| 色狠狠桃花综合| 日韩美女视频19| 国产91对白在线观看九色| 久久综合九色综合97婷婷女人| 蜜臀a∨国产成人精品| 制服丝袜成人动漫| 日韩福利视频网| 欧美嫩在线观看| 性感美女久久精品| 欧美调教femdomvk| 亚洲第一激情av| 欧美四级电影网| 亚洲成人中文在线| 欧美怡红院视频| 亚洲国产一区二区a毛片| 欧美亚日韩国产aⅴ精品中极品| 一区二区三区蜜桃| 欧美视频一区在线| 亚洲一区二区黄色| 欧美美女激情18p| 午夜精品久久久久久久99樱桃| 欧美日韩一区二区三区视频| 夜夜揉揉日日人人青青一国产精品| 色综合久久天天综合网| 亚洲综合在线观看视频| 欧美午夜理伦三级在线观看| 亚洲第一福利一区| 日韩一级黄色大片| 国内精品免费在线观看| 欧美激情一区三区| 99久久夜色精品国产网站| 亚洲已满18点击进入久久| 欧美日韩视频在线第一区 | 欧美一区二区福利在线| 奇米精品一区二区三区四区| 久久麻豆一区二区| 91在线视频免费91| 五月天一区二区三区| 精品久久久三级丝袜| 国产91清纯白嫩初高中在线观看| 亚洲伦理在线精品| 欧美一区二区三区免费在线看|