亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 22-02.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Key-Exchange Algorithms</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=22//-->
<!--PAGES=516-518//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="22-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="22-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading3"></A><FONT COLOR="#000077">22.2 Station-to-Station Protocol</FONT></H3>
<P>Diffie-Hellman key exchange is vulnerable to a man-in-the-middle attack. One way to prevent this problem is to have Alice and Bob sign their messages to each other [500].
</P>
<P>This protocol assumes that Alice has a certificate with Bob&#146;s public key and that Bob has a certificate with Alice&#146;s public key. These certificates have been signed by some trusted authority outside this protocol. Here&#146;s how Alice and Bob generate a secret key, <I>k.</I></P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice generates a random number, <I>x,</I> and sends it to Bob.
<DD><B>(2)</B>&nbsp;&nbsp;Bob generates a random number, <I>y.</I> Using the Diffie-Hellman protocol he computes their shared key based on <I>x</I> and <I>y: k.</I> He signs <I>x</I> and <I>y,</I> and encrypts the signature using <I>k.</I> He then sends that, along with <I>y,</I> to Alice.
<DL>
<DD><I>y,E</I><SUB>k</SUB>(<I>S</I><SUB>B</SUB>(<I>x,y</I>))
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice also computes <I>k.</I> She decrypts the rest of Bob&#146;s message and verifies his signature. Then she sends Bob a signed message consisting of <I>x</I> and <I>y,</I> encrypted in their shared key.
<DL>
<DD><I>E</I><SUB>k</SUB>(<I>S</I><SUB>A</SUB>(<I>x,y</I>))
</DL>
<DD><B>(4)</B>&nbsp;&nbsp;Bob decrypts the message and verifies Alice&#146;s signature.
</DL>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">22.3 Shamir&#146;s Three-Pass Protocol</FONT></H3>
<P>This protocol, invented by Adi Shamir but never published, enables Alice and Bob to communicate securely without any advance exchange of either secret keys or public keys [1008].
</P>
<P>This assumes the existence of a symmetric cipher that is commutative, that is:</P>
<DL>
<DD><I>E</I><SUB>A</SUB>(<I>E</I><SUB>B</SUB>(<I>P</I>)) = <I>E</I><SUB>B</SUB>(<I>E</I><SUB>A</SUB>(<I>P</I>))
</DL>
<P>Alice&#146;s secret key is <I>A;</I> Bob&#146;s secret key is <I>B.</I> Alice wants to send a message, <I>M,</I> to Bob. Here&#146;s the protocol.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice encrypts <I>M</I> with her key and sends Bob
<DL>
<DD><I>C</I><SUB>1</SUB> = <I>E</I><SUB>A</SUB>(<I>M</I>)
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Bob encrypts <I>C</I><SUB>1</SUB> with his key and sends Alice
<DL>
<DD><I>C</I><SUB>2</SUB> = <I>E</I><SUB>B</SUB>(<I>E</I><SUB>A</SUB>(<I>M</I>))
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice decrypts <I>C</I><SUB>2</SUB> with her key and sends Bob
<DL>
<DD><I>C</I><SUB>3</SUB> = <I>D</I><SUB>A</SUB>(<I>E</I><SUB>B</SUB>(<I>E</I><SUB>A</SUB>(<I>M</I>))) =<I>D</I><SUB>A</SUB>(<I>E</I><SUB>A</SUB>(<I>E</I><SUB>B</SUB>(<I>M</I>))) = <I>E</I><SUB>B</SUB>(<I>M</I>)
</DL>
<DD><B>(4)</B>&nbsp;&nbsp;Bob decrypts <I>C</I><SUB>3</SUB> with his key to recover <I>M.</I>
</DL>
<P>One-time pads are commutative and have perfect secrecy, but they will not work with this protocol. With a one-time pad, the three ciphertext messages would be:
</P>
<DL>
<DD><I>C</I><SUB>1</SUB> = <I>P</I>&#8853; <I>A</I>
<DD><I>C</I><SUB>2</SUB> = <I>P</I>&#8853; <I>A</I>&#8853; <I>B</I>
<DD><I>C</I><SUB>3</SUB> = <I>P</I>&#8853; <I>B</I>
</DL>
<P>Eve, who can record the three messages as they pass between Alice and Bob, simply XORs them together to retrieve the message:
</P>
<DL>
<DD><I>C</I><SUB>1</SUB> &#8853; <I>C</I><SUB>2</SUB> &#8853; <I>C</I><SUB>3</SUB> = (<I>P</I> &#8853; <I>A</I>) &#8853; (<I>P</I> &#8853; <I>A</I> &#8853; <I>B</I>) &#8853; (<I>P</I> &#8853; <I>B</I>) = <I>P</I>
</DL>
<P>This clearly won&#146;t work.
</P>
<P>Shamir (and independently, Jim Omura) described an encryption algorithm that will work with this protocol, one similar to RSA. Let <I>p</I> be a large prime for which <I>p</I> - 1 has a large prime factor. Choose an encryption key, <I>e,</I> such that <I>e</I> is relatively prime to <I>p</I> - 1. Calculate <I>d</I> such that <I>de</I> &#8801; 1 (mod <I>p</I> - 1).</P>
<P>To encrypt a message, calculate</P>
<DL>
<DD><I>C</I> = <I>M</I><SUP>e</SUP> mod <I>p</I>
</DL>
<P>To decrypt a message, calculate
</P>
<DL>
<DD><I>M</I> = <I>C</I><SUP>d</SUP> mod <I>p</I>
</DL>
<P>There seems to be no way for Eve to recover <I>M</I> without solving the discrete logarithm problem, but this has never been proved.</P>
<P>Like Diffie-Hellman, this protocol allows Alice to initiate secure communication with Bob without knowing any of his keys. For Alice to use a public-key algorithm, she has to know his public key. With Shamir&#146;s three-pass protocol, she just sends him a ciphertext message. The same thing with a public-key algorithm looks like:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice asks Bob (or a KDC) for his public key.
<DD><B>(2)</B>&nbsp;&nbsp;Bob (or the KDC) sends Alice his public key.
<DD><B>(3)</B>&nbsp;&nbsp;Alice encrypts <I>M</I> with Bob&#146;s public key and sends it to Bob.
</DL>
<P>Shamir&#146;s three-pass protocol will fall to a man-in-the-middle attack.
</P>
<H3><A NAME="Heading5"></A><FONT COLOR="#000077">22.4 COMSET</FONT></H3>
<P>COMSET (COMmunications SETup) is a mutual identification and key exchange protocol developed for the RIPE project [1305] (see Section 25.7). Using public-key cryptography, it allows Alice and Bob to identify themselves to each other and also to exchange a secret key.
</P>
<P>The mathematical principle behind COMSET is Rabin&#146;s scheme [1283] (see Section 19.5). The scheme itself was originally proposed in [224]. See [1305] for details.</P>
<H3><A NAME="Heading6"></A><FONT COLOR="#000077">22.5 Encrypted Key Exchange</FONT></H3>
<P>The Encrypted Key Exchange (EKE) protocol was designed by Steve Bellovin and Michael Merritt [109]. It provides security and authentication on computer networks, using both symmetric and public-key cryptography in a novel way: A shared secret key is used to encrypt a randomly generated public key.
</P>
<P><FONT SIZE="+1"><B><I>The Basic EKE Protocol</I></B></FONT></P>
<P>Alice and Bob (two users, a user and the host, or whoever) share a common password, <I>P.</I> Using this protocol, they can authenticate each other and generate a common session key, <I>K.</I></P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice generates a random public-key/private-key key pair. She encrypts the public key, <I>K&#180;,</I> using a symmetric algorithm and <I>P</I> as the key: <I>Ep</I>(<I>K&#180;</I>). She sends Bob
<DL>
<DD><I>A, E</I><SUB>P</SUB>(<I>K&#180;</I>)
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Bob knows <I>P.</I> He decrypts the message to obtain <I>K&#180;</I>. Then, he generates a random session key, <I>K,</I> and encrypts it with the public key he received from Alice and <I>P</I> as the key. He sends Alice
<DL>
<DD><I>E</I><SUB>P</SUB>(<I>E</I><SUB>K&#180;</SUB>(<I>K</I>))
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice decrypts the message to obtain <I>K.</I> She generates a random string, <I>R</I><SUB>A</SUB>, encrypts it with <I>K,</I> and sends Bob
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>R</I><SUB>A</SUB>)
</DL>
<DD><B>(4)</B>&nbsp;&nbsp;Bob decrypts the message to obtain <I>R</I><SUB>A</SUB>. He generates another random string, <I>R</I><SUB>B</SUB>, encrypts both strings with <I>K,</I> and sends Alice the result.
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>R</I><SUB>A</SUB>, <I>R</I><SUB>B</SUB>)
</DL>
<DD><B>(5)</B>&nbsp;&nbsp;Alice decrypts the message to obtain <I>R</I><SUB>A</SUB> and <I>R</I><SUB>B</SUB>. Assuming the <I>R</I><SUB>A</SUB> she received from Bob is the same as the one she sent to Bob in step (3), she encrypts <I>R</I><SUB>B</SUB> with <I>K</I> and sends it to Bob.
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>R</I><SUB>B</SUB>)
</DL>
<DD><B>(6)</B>&nbsp;&nbsp;Bob decrypts the message to obtain <I>R</I><SUB>B</SUB>. Assuming the <I>R</I><SUB>B</SUB> he received from Alice is the same one he sent to Alice in step (4), the protocol is complete. Both parties now communicate using <I>K</I> as the session key.
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="22-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="22-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩亚洲综合一区| 极品尤物av久久免费看| 成人看片黄a免费看在线| www久久精品| 国产成人午夜精品影院观看视频 | 亚洲天堂成人在线观看| 成人18视频日本| 亚洲色图在线看| 在线视频一区二区三区| 亚洲国产日韩在线一区模特| 欧美在线观看你懂的| 首页国产欧美久久| 5858s免费视频成人| 久久99精品国产91久久来源| 国产欧美一区二区精品性色 | 日韩精品午夜视频| 日韩午夜小视频| 国产91在线观看丝袜| 亚洲男同性恋视频| 91精品国产免费| 国产麻豆9l精品三级站| 亚洲精品日产精品乱码不卡| 欧美日韩国产首页在线观看| 国模大尺度一区二区三区| 国产精品麻豆99久久久久久| 欧美性猛交xxxx黑人交| 国产一区二区三区四区五区入口 | 蜜臀av国产精品久久久久| 精品电影一区二区| 91视频国产观看| 捆绑调教美女网站视频一区| 国产精品乱码一区二区三区软件 | 亚洲电影激情视频网站| 日韩美一区二区三区| 99精品国产热久久91蜜凸| 亚洲成人在线网站| 欧美国产精品久久| 91精品国产手机| 91麻豆免费视频| 免费观看在线色综合| 亚洲欧美在线观看| 日韩精品中文字幕一区| 99久久久久免费精品国产| 日韩av电影免费观看高清完整版在线观看| 久久久久久亚洲综合影院红桃| 91极品视觉盛宴| 国产成人综合自拍| 久久精品国产亚洲aⅴ| 日韩毛片视频在线看| 久久免费电影网| 欧美日本在线一区| 91在线视频18| 国产福利一区二区三区视频在线| 亚洲一区二区三区四区五区黄 | 在线影院国内精品| 丰满岳乱妇一区二区三区| 蜜臀av性久久久久av蜜臀妖精| 亚洲综合激情另类小说区| 久久精品夜色噜噜亚洲a∨| 欧美一级黄色片| 欧美三级视频在线观看| 懂色av中文一区二区三区| 久久精品国产精品亚洲精品| 亚洲一区二区三区不卡国产欧美| 欧美国产日韩在线观看| 久久久亚洲精品一区二区三区| 欧美群妇大交群的观看方式| 91丨porny丨在线| 成人小视频在线| 国产成a人无v码亚洲福利| 激情五月婷婷综合网| 免费一级片91| 日本aⅴ亚洲精品中文乱码| 亚洲一区在线观看免费观看电影高清| 国产精品国模大尺度视频| 亚洲国产精品成人综合| 亚洲国产高清不卡| 国产精品欧美精品| 国产精品乱码一区二三区小蝌蚪| 欧美精品一区二区高清在线观看| 日韩一区二区在线免费观看| 在线播放国产精品二区一二区四区| 91成人在线精品| 欧美性生活久久| 欧美吻胸吃奶大尺度电影| 欧美少妇bbb| 欧美乱妇20p| 91精品国模一区二区三区| 欧美视频一区二区三区四区| 4hu四虎永久在线影院成人| 欧美久久久久久久久中文字幕| 欧美乱熟臀69xxxxxx| 欧美一级日韩免费不卡| 精品精品国产高清a毛片牛牛| 欧美大肚乱孕交hd孕妇| 国产亚洲成aⅴ人片在线观看| 国产喂奶挤奶一区二区三区| 国产精品三级在线观看| 亚洲色图在线视频| 日韩影视精彩在线| 精品一区二区在线视频| 成人性视频网站| 在线观看亚洲一区| 91精品福利在线一区二区三区| 精品福利一区二区三区免费视频| 中文字幕av一区二区三区高| 国产精品久久福利| 午夜成人免费电影| 国产麻豆精品在线| 一本大道久久a久久综合| 欧美天堂亚洲电影院在线播放| 欧美日韩高清一区二区三区| 精品99一区二区三区| 欧美国产精品专区| 亚洲成人午夜影院| 国产九色精品成人porny | 日本一二三不卡| 亚洲国产乱码最新视频 | 国产在线视频一区二区| 成人综合在线观看| 51精品国自产在线| 国产三级一区二区| 亚洲国产cao| 国产成人8x视频一区二区| 91黄色免费观看| 欧美大片在线观看| 中文字幕一区免费在线观看| 五月天婷婷综合| 成人免费av资源| 欧美一区二区视频免费观看| 亚洲国产精品成人综合色在线婷婷| 亚洲国产综合色| 国产高清亚洲一区| 在线不卡一区二区| 亚洲欧美电影一区二区| 国产综合色精品一区二区三区| 欧美天堂一区二区三区| 国产精品久久国产精麻豆99网站| 免费久久99精品国产| 色狠狠色狠狠综合| 中文一区一区三区高中清不卡| 日本午夜一本久久久综合| 99re6这里只有精品视频在线观看| 日韩欧美二区三区| 亚洲国产裸拍裸体视频在线观看乱了| 懂色av中文字幕一区二区三区 | 91久久精品国产91性色tv | 国产a区久久久| 日韩女优av电影| 三级不卡在线观看| 日本久久一区二区三区| 国产精品久久99| 国产91精品精华液一区二区三区| 日韩欧美美女一区二区三区| 亚洲综合小说图片| 日本韩国欧美一区二区三区| 国产精品三级在线观看| 国产大陆精品国产| 久久久蜜臀国产一区二区| 美洲天堂一区二卡三卡四卡视频 | 欧美日韩精品一二三区| 中文字幕一区二区不卡| 成人av电影免费观看| 中国av一区二区三区| 成人国产亚洲欧美成人综合网| 久久午夜免费电影| 国产曰批免费观看久久久| 精品久久久久久无| 久久91精品久久久久久秒播| 91精品国产欧美一区二区| 天天亚洲美女在线视频| 91精品国产入口| 免费日韩伦理电影| 日韩精品一区二区三区视频在线观看| 婷婷久久综合九色综合伊人色| 欧美性色综合网| 日韩在线a电影| 精品国产亚洲在线| 精品在线免费观看| 欧美国产精品一区| 一本到高清视频免费精品| 亚洲最新视频在线播放| 欧美日韩在线播| 人人爽香蕉精品| 久久综合一区二区| 国产99久久精品| 亚洲天堂av一区| 国产精品久久久久9999吃药| 亚洲一区在线观看免费观看电影高清| 日本乱人伦一区| 日本 国产 欧美色综合| 精品国产精品网麻豆系列| 国产精品亚洲视频| 国产精品国产馆在线真实露脸| 色欧美日韩亚洲| 日韩国产欧美在线视频| 久久亚洲一区二区三区四区| 成人综合在线观看| 亚洲第一激情av| wwwwww.欧美系列|