亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 21-04.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Identification Schemes</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=21//-->
<!--PAGES=509-512//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="21-03.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch22/22-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Guillou-Quisquater Signature Scheme</I></B></FONT></P>
<P>This identification can be converted to a signature scheme, also suited for smart-card implementation [671,672].
</P>
<P>The public and private key setup is the same as before. Here&#146;s the protocol:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice picks a random integer <I>r,</I> such that <I>r</I> is between 1 and <I>n</I> - 1. She computes <I>T</I> = <I>r</I><SUP>v</SUP> mod <I>n.</I>
<DD><B>(2)</B>&nbsp;&nbsp;Alice computes <I>d</I> = <I>H</I>(<I>M,T</I>), where <I>M</I> is the message being signed and <I>H</I>(<I>x</I>) is a one-way hash function. The <I>d</I> produced by the hash function must be between 0 and <I>v</I> - 1 [1280]. If the output of the hash function is not within this range, it must be reduced modulo <I>v.</I>
<DD><B>(3)</B>&nbsp;&nbsp;Alice computes <I>D</I> = <I>rB</I><SUP>d</SUP> mod <I>n.</I> The signature consists of the message, <I>M,</I> the two calculated values, <I>d</I> and <I>D,</I> and her credentials, <I>J.</I> She sends this signature to Bob.
<DD><B>(4)</B>&nbsp;&nbsp;Bob computes <I>T</I>&#180; = <I>D</I><SUP>v</SUP><I>J</I><SUP>d</SUP> mod <I>n.</I> He then computes <I>d</I>&#180; = <I>H</I>(<I>M,T</I>&#180;). If <I>d</I> = <I>d</I>&#180;, then Alice must know <I>B</I> and the signature is valid.
</DL>
<P><FONT SIZE="+1"><B><I>Multiple Signatures</I></B></FONT></P>
<P>What if many people want to sign the same document? The easy solution has each of them signing separately, but this signature scheme can do better than that. Here Alice and Bob sign the same document and Carol verifies the signatures, but any number of people can be involved in the signature process. As before, Alice and Bob have their own unique <I>J</I> and <I>B</I> values: (<I>J</I><SUB>A</SUB>, <I>B</I><SUB>A</SUB>) and (<I>J</I><SUB>B</SUB>, <I>B</I><SUB>B</SUB>). The values <I>n</I> and <I>v</I> are common to the system.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice picks a random integer, <I>r</I><SUB>A</SUB>, such that <I>r</I><SUB>A</SUB> is between 1 and <I>n</I> - 1. She computes <I>T</I><SUB>A</SUB> = <I>r</I><SUB>A</SUB><SUP>v</SUP> mod <I>n</I> and sends <I>T</I><SUB>A</SUB> to Bob.
<DD><B>(2)</B>&nbsp;&nbsp;Bob picks a random integer, <I>r</I><SUB>B</SUB>, such that <I>r</I><SUB>B</SUB> is between 1 and <I>n</I> - 1. He computes <I>T</I><SUB>B</SUB> = <I>r</I><SUB>B</SUB><SUP>v</SUP> mod <I>n</I> and sends <I>T</I><SUB>B</SUB> to Alice.
<DD><B>(3)</B>&nbsp;&nbsp;Alice and Bob each compute <I>T</I> = (<I>T</I><SUB>A</SUB><I>T</I><SUB>B</SUB>) mod <I>n.</I>
<DD><B>(4)</B>&nbsp;&nbsp;Alice and Bob each compute <I>d</I> = <I>H</I>(<I>M,T</I>), where <I>M</I> is the message being signed and <I>H</I>(<I>x</I>) is a one-way hash function. The <I>d</I> produced by the hash function must be between 0 and <I>v</I> - 1 [1280]. If the output of the hash function is not within this range, it must be reduced modulo <I>v.</I>
<DD><B>(5)</B>&nbsp;&nbsp;Alice computes <I>D</I><SUB>A</SUB> = <I>r</I><SUB>A</SUB><I>B</I><SUB>A</SUB><SUP>d</SUP> mod <I>n</I> and sends <I>D</I><SUB>A</SUB> to Bob.
<DD><B>(6)</B>&nbsp;&nbsp;Bob computes <I>D</I><SUB>B</SUB> = <I>r</I><SUB>B</SUB><I>B</I><SUB>B</SUB><SUP>d</SUP> mod <I>n</I> and sends <I>D</I><SUB>B</SUB> to Alice.
<DD><B>(7)</B>&nbsp;&nbsp;Alice and Bob each compute <I>D</I> = <I>D</I><SUB>A</SUB><I>D</I><SUB>B</SUB> mod <I>n.</I> The signature consists of the message, <I>M,</I> the two calculated values, <I>d</I> and <I>D,</I> and both of their credentials: <I>J</I><SUB>A</SUB> and <I>J</I><SUB>B</SUB>.
<DD><B>(8)</B>&nbsp;&nbsp;Carol computes <I>J</I> = <I>J</I><SUB>A</SUB><I>J</I><SUB>B</SUB> mod <I>n.</I>
<DD><B>(9)</B>&nbsp;&nbsp;Carol computes <I>T</I>&#180; = <I>D</I><SUP>v</SUP><I>J</I><SUP>d</SUP> mod <I>n.</I> She then computes <I>d</I>&#180; = <I>H</I>(<I>M,T</I>&#180;). If <I>d</I> &#8801; <I>d</I>&#180;, then the multiple signature is valid.
</DL>
<P>This protocol can be extended to any number of people. For multiple people to sign, they all multiply their individual <I>T</I><SUB>i</SUB> values together in step (3), and their individual <I>D</I><SUB>i</SUB> values together in step (7). To verify a multiple signature, multiply all the signers <I>J</I><SUB>i</SUB> values together in step (8). Either all the signatures are valid or there is at least one invalid signature.</P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">21.3 Schnorr</FONT></H3>
<P>Claus Schnorr&#146;s authentication and signature scheme [1396,1397] gets its security from the difficulty of calculating discrete logarithms. To generate a key pair, first choose two primes, <I>p</I> and <I>q,</I> such that <I>q</I> is a prime factor of <I>p</I> - 1. Then, choose an <I>a</I> not equal to 1, such that <I>a</I><SUP>q</SUP> &#8801; 1 (mod <I>p</I>). All these numbers can be common to a group of users and can be freely published.</P>
<P>To generate a particular public-key/private-key key pair, choose a random number less than <I>q.</I> This is the private key, <I>s.</I> Then calculate <I>v</I> = <I>a</I><SUP>-s</SUP> mod <I>p.</I> This is the public key.</P>
<P><FONT SIZE="+1"><B><I>Authentication Protocol</I></B></FONT></P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Peggy picks a random number, <I>r,</I> less than <I>q,</I> and computes <I>x</I> = <I>a</I><SUP>r</SUP> mod <I>p.</I> This is the preprocessing stage and can be done long before Victor is present.
<DD><B>(2)</B>&nbsp;&nbsp;Peggy sends <I>x</I> to Victor.
<DD><B>(3)</B>&nbsp;&nbsp;Victor sends Peggy a random number, <I>e,</I> between 0 and 2<SUP>t</SUP> - 1. (I&#146;ll discuss <I>t</I> in a moment.)
<DD><B>(4)</B>&nbsp;&nbsp;Peggy computes <I>y</I> = (<I>r</I> &#43; <I>se</I>) mod <I>q</I> and sends <I>y</I> to Victor.
<DD><B>(5)</B>&nbsp;&nbsp;Victor verifies that <I>x</I> = <I>a</I><SUP>y</SUP><I>v</I><SUP>e</SUP> mod <I>p.</I>
</DL>
<P>The security is based on the parameter <I>t.</I> The difficulty of breaking the algorithm is about 2<SUP>t</SUP>. Schnorr recommended that <I>p</I> be about 512 bits, <I>q</I> be about 140 bits, and <I>t</I> be 72.</P>
<P><FONT SIZE="+1"><B><I>Digital Signature Protocol</I></B></FONT></P>
<P>Schnorr can also be used as a digital signature protocol on a message, <I>M.</I> The public-key/private-key key pair is the same, but we&#146;re now adding a one-way hash function, <I>H</I>(<I>M</I>).</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice picks a random number, <I>r,</I> less than <I>q,</I> and computes <I>x</I> = <I>a</I><SUP>r</SUP> mod <I>p.</I> This computation is the preprocessing stage.
<DD><B>(2)</B>&nbsp;&nbsp;Alice concatenates <I>M</I> and <I>x,</I> and hashes the result:
<DL>
<DD><I>e</I> = <I>H</I>(<I>M,x</I>)
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice computes <I>y</I> = (<I>r</I> &#43; <I>se</I>) mod <I>q.</I> The signature is <I>e</I> and <I>y;</I> she sends these to Bob.
<DD><B>(4)</B>&nbsp;&nbsp;Bob computes <I>x</I><SUP>&#180;</SUP> = <I>a</I><SUP>y</SUP><I>v</I><SUP>e</SUP> mod <I>p.</I> He then confirms that the concatenation of <I>M</I> and <I>x</I><SUP>&#180;</SUP> hashes to <I>e.</I>
<DL>
<DD><I>e</I> = <I>H</I>(<I>M,x</I><SUP>&#180;</SUP>)
<DD>If it does, he accepts the signature as valid.
</DL>
</DL>
<P>In his paper, Schnorr cites these novel features of his algorithm:
</P>
<BLOCKQUOTE><P>Most of the computation for signature generation can be completed in a preprocessing stage, independent of the message being signed. Hence, it can be done during idle time and not affect the signature speed. An attack against this preprocessing stage is discussed in [475], but I don&#146;t think it&#146;s practical.
</P>
<P>For the same level of security, the length of signatures is less for Schnorr than for RSA. For example, with a 140-bit <I>q,</I> signatures are only 212-bits long, less than half the length of RSA signatures. Schnorr&#146;s signatures are also much shorter than ElGamal signatures.</P>
</BLOCKQUOTE><P>Of course, practical considerations may make even fewer bits suitable for a given scheme: For example, an identification scheme where the cheater must perform an on-line attack in only a few seconds, versus a signature scheme where the cheater can calculate for years off-line to come up with a forgery.
</P>
<P>A modification of this algorithm, by Ernie Brickell and Kevin McCurley, enhances its security [265].</P>
<P><FONT SIZE="+1"><B><I>Patents</I></B></FONT></P>
<P>Schnorr is patented in the United States [1398] and in many other countries. In 1993, PKP acquired the worldwide rights to the patent (see Section 25.5). The U.S. patent expires on February 19, 2008.
</P>
<H3><A NAME="Heading5"></A><FONT COLOR="#000077">21.4 Converting Identification Schemes to Signature Schemes</FONT></H3>
<P>There is a standard method of converting an identification scheme into a signature scheme: Replace Victor with a one-way hash function. The message is not hashed before it is signed; instead the hashing is incorporated into the signing algorithm. In principle, this can be done with any identification scheme.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="21-03.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch22/22-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲一区日韩精品中文字幕| 日本欧美一区二区三区乱码| 午夜电影一区二区三区| 精品一区二区三区日韩| 欧美影院一区二区| 国产婷婷色一区二区三区在线| 亚洲福利电影网| 99精品一区二区三区| 精品日产卡一卡二卡麻豆| 亚洲国产精品天堂| 91在线免费视频观看| 2020日本不卡一区二区视频| 午夜成人在线视频| 在线观看欧美黄色| 中文字幕亚洲不卡| 丰满亚洲少妇av| 久久久久久久久久久久久久久99 | 国产欧美日本一区二区三区| 日韩一区欧美二区| 欧美午夜理伦三级在线观看| 亚洲欧美国产毛片在线| 成人综合激情网| 国产嫩草影院久久久久| 国产精品一区三区| 日韩视频在线你懂得| 免费视频一区二区| 欧美一区二区三区在线看| 天天综合色天天综合| 欧美日韩精品电影| 亚洲成a人v欧美综合天堂| 色一区在线观看| 亚洲伊人伊色伊影伊综合网| 91久久一区二区| 亚洲一区欧美一区| 欧美日韩国产一级| 日本欧美加勒比视频| 日韩视频在线你懂得| 蜜桃视频一区二区| 欧美精品一区二区三区一线天视频| 捆绑变态av一区二区三区| 26uuu另类欧美亚洲曰本| 国产乱码精品1区2区3区| 国产片一区二区| 97精品电影院| 亚洲国产中文字幕| 欧美大片在线观看| 国产麻豆91精品| **网站欧美大片在线观看| 色婷婷精品大视频在线蜜桃视频 | 国产精品卡一卡二| 色婷婷av一区二区三区大白胸 | 国内精品伊人久久久久av一坑| 日韩欧美成人午夜| 大胆欧美人体老妇| 亚洲一区二区精品久久av| 欧美一区二区三区视频免费| 国产一区999| 亚洲激情校园春色| 日韩精品一区二区三区在线播放 | 一区二区免费视频| 日韩欧美一区在线| 成人av免费在线播放| 亚洲成人综合在线| 久久久国产午夜精品 | voyeur盗摄精品| 亚洲电影在线免费观看| 久久综合久久综合久久综合| av日韩在线网站| 蜜桃视频一区二区三区在线观看| 国产网站一区二区| 在线播放国产精品二区一二区四区| 老色鬼精品视频在线观看播放| 国产精品久久看| 日韩精品一区二区三区中文不卡| 99久久免费视频.com| 免费日韩伦理电影| 亚洲精品高清在线| 国产欧美一区二区精品性色超碰| 欧美猛男男办公室激情| 成人av网站在线观看| 日本欧美一区二区三区乱码| 亚洲激情中文1区| 国产欧美一二三区| 精品毛片乱码1区2区3区| 在线精品视频一区二区| 成人一区二区三区视频 | 亚洲一区二区精品视频| 中文字幕av不卡| 精品国产伦一区二区三区免费| 一本一本大道香蕉久在线精品| 美美哒免费高清在线观看视频一区二区 | 国产精品福利av| 欧美精品一区二区三区蜜臀 | 日本道精品一区二区三区| 国产高清精品久久久久| 免费高清不卡av| 五月婷婷另类国产| 亚洲一区二三区| 亚洲日本va午夜在线影院| 国产三级久久久| 久久综合色天天久久综合图片| 欧美久久高跟鞋激| 欧美日韩国产123区| 91极品视觉盛宴| 色婷婷精品久久二区二区蜜臀av | 丁香六月综合激情| 精东粉嫩av免费一区二区三区| 午夜欧美2019年伦理| 亚洲综合色在线| 亚洲综合久久av| 亚洲愉拍自拍另类高清精品| 亚洲免费观看高清在线观看| 亚洲欧洲av一区二区三区久久| 国产清纯在线一区二区www| 久久久综合九色合综国产精品| 综合久久国产九一剧情麻豆| 国产精品成人在线观看 | 久久中文娱乐网| 久久综合狠狠综合久久激情 | 国产在线不卡视频| 国内精品在线播放| 成人小视频免费观看| 不卡的av中国片| 91国偷自产一区二区开放时间| 欧美综合一区二区三区| 欧美日韩免费高清一区色橹橹 | 欧美激情综合五月色丁香| 欧美国产日韩在线观看| 一色屋精品亚洲香蕉网站| 亚洲免费观看高清完整版在线观看| 亚洲欧美aⅴ...| 亚洲国产成人porn| 美女视频一区二区三区| 国产久卡久卡久卡久卡视频精品| 国产91丝袜在线播放0| 成人av资源网站| 在线观看三级视频欧美| 欧美精品v日韩精品v韩国精品v| 精品久久久久久最新网址| 欧美国产精品一区二区三区| 日韩美女久久久| 日韩avvvv在线播放| 国产在线精品不卡| 91九色02白丝porn| 精品久久人人做人人爽| 自拍偷在线精品自拍偷无码专区 | 成人免费毛片片v| 日本韩国一区二区| 亚洲精品一区二区三区99| 日韩毛片高清在线播放| 蜜臀91精品一区二区三区| 波多野结衣中文字幕一区 | 天天亚洲美女在线视频| 国产高清精品网站| 欧美日韩的一区二区| 国产校园另类小说区| 午夜伊人狠狠久久| 成人一区二区三区中文字幕| 欧美日韩aaa| 亚洲视频一二三区| 国产美女精品在线| 69成人精品免费视频| 中文字幕va一区二区三区| 蜜桃91丨九色丨蝌蚪91桃色| aaa亚洲精品| 久久精品人人做| 日本成人中文字幕在线视频| 91首页免费视频| 国产午夜亚洲精品理论片色戒 | 91精品国产乱码| 日韩伦理免费电影| 国产传媒欧美日韩成人| 欧美高清视频不卡网| 最新国产の精品合集bt伙计| 国产真实乱对白精彩久久| 欧美喷潮久久久xxxxx| 一区二区激情视频| 99久久精品情趣| 中文字幕乱码久久午夜不卡| 麻豆免费精品视频| 欧美精品色一区二区三区| 亚洲欧美另类小说视频| 成人精品视频一区| 中文字幕欧美日韩一区| 国产主播一区二区三区| 欧美xxxxxxxxx| 伦理电影国产精品| 欧美另类z0zxhd电影| 亚洲国产一区二区在线播放| 色欧美88888久久久久久影院| 国产欧美日韩综合精品一区二区 | 国产精品午夜在线观看| 国产麻豆精品久久一二三| 精品国产髙清在线看国产毛片| 日韩av电影天堂| 91精品免费在线观看| 日韩av电影免费观看高清完整版 | 免费成人av在线| 精品少妇一区二区| 麻豆成人91精品二区三区|