亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 22-03.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號(hào):
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Key-Exchange Algorithms</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=22//-->
<!--PAGES=518-521//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="22-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="22-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>At step (3), both Alice and Bob know <I>K&#180;</I> and <I>K. K</I> is the session key and can be used to encrypt all other messages between Alice and Bob. Eve, sitting between Alice and Bob, only knows <I>EP</I>(<I>K&#180;</I>), <I>E</I><SUB>P</SUB>(<I>E</I><SUB>K&#180;</SUB>(<I>K</I>)), and some messages encrypted with <I>K.</I> In other protocols, Eve could make guesses at <I>P</I> (people choose bad passwords all the time, and if Eve is clever she can make some good guesses) and then test her guesses. In this protocol, Eve cannot test her guess without cracking the public-key algorithm as well. And if both <I>K&#180;</I> and <I>K</I> are chosen randomly, this can be an insurmountable problem.</P>
<P>The challenge-response portion of the protocol, steps (3) through (6), provides validation. Steps (3) through (5) prove to Alice that Bob knows <I>K;</I> steps (4) through (6) prove to Bob that Alice knows <I>K.</I> The Kerberos protocol timestamp exchange accomplishes the same thing.</P>
<P>EKE can be implemented with a variety of public-key algorithms: RSA, ElGamal, Diffie-Hellman. There are security problems with implementing EKE with a knapsack algorithm (aside from the inherent insecurity of knapsack algorithms): The normal distribution of the ciphertext messages negates the benefits of EKE.</P>
<P><FONT SIZE="+1"><B><I>Implementing EKE with RSA</I></B></FONT></P>
<P>The RSA algorithm seems perfect for this application, but there are some subtle problems. The authors recommend encrypting only the encryption exponent in step (1) and sending the modulus in the clear. An explanation of the reasoning behind this recommendation, as well as other subtleties involved in using RSA, is in [109].
</P>
<P><FONT SIZE="+1"><B><I>Implementing EKE with ElGamal</I></B></FONT></P>
<P>Implementing EKE with the ElGamal algorithm is straightforward, and there is even a simplification of the basic protocol. Using the notation from Section 19.6, <I>g</I> and <I>p</I> are parts of the public key and are common to all users. The private key is a random number <I>r.</I> The public key is <I>g</I><SUP>r</SUP> mod <I>p.</I> The message Alice sends to Bob in step (1) becomes</P>
<DL>
<DD>Alice, <I>g</I><SUP>r</SUP> mod <I>p</I>
</DL>
<P>Note that this public key does not have to be encrypted with <I>P.</I> This is not true in general, but it is true for the ElGamal algorithm. Details are in [109].</P>
<P>Bob chooses a random number, <I>R</I> (for the ElGamal algorithm and independent of any random numbers chosen for EKE), and the message he sends to Alice in step (2) becomes</P>
<DL>
<DD><I>E</I><SUB>P</SUB>(<I>g</I><SUP>R</SUP> mod <I>p, Kg</I><SUP>Rr</SUP> mod <I>p</I>)
</DL>
<P>Refer back to Section 19.6 for restrictions on choosing the variables for ElGamal.
</P>
<P><FONT SIZE="+1"><B><I>Implementing EKE with Diffie-Hellman</I></B></FONT></P>
<P>With the Diffie-Hellman protocol, <I>K</I> is generated automatically. The final protocol is even simpler. A value for <I>g</I> and <I>n</I> is set for all users on the network.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice picks a random number, <I>r</I><SUB>A</SUB>, and sends Bob
<DL>
<DD><I>A,</I> <I>g<SUP>r<SMALL><SMALL>A</SMALL></SMALL></SUP></I> mod <I>n</I>
</DL>
<BR>With Diffie-Hellman, Alice does not have to encrypt her first message with <I>P.</I>
<DD><B>(2)</B>&nbsp;&nbsp;Bob picks a random number, <I>r</I><SUB>B,</SUB> and calculates
<DL>
<DD><I>K</I> = <I>g</I><SUP>r</SUP>A*<SUP>r<SMALL><SMALL>B</SMALL></SMALL></SUP> mod <I>n</I>
</DL>
<BR>He generates a random string <I>RB,</I> then calculates and sends Alice:
<DL>
<DD><I>E</I><SUB>P</SUB>(<I>g</I><SUP>r<SMALL><SMALL>B</SMALL></SMALL></SUP> mod <I>n</I>), <I>EK</I>(<I>RB</I>)
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice decrypts the first half of Bob&#146;s message to obtain <I>g</I><SUP>r</SUP>B mod <I>n.</I> Then she calculates <I>K</I> and uses <I>K</I> to decrypt <I>R</I><SUB>B</SUB>. She generates another random string, <I>R</I><SUB>A</SUB>, encrypts both strings with <I>K,</I> and sends Bob the result.
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>R</I><SUB>A</SUB>, <I>R</I><SUB>B</SUB>)
</DL>
<DD><B>(4)</B>&nbsp;&nbsp;Bob decrypts the message to obtain <I>R</I><SUB>A</SUB> and <I>R</I><SUB>B</SUB>. Assuming the <I>R</I><SUB>B</SUB> he received from Alice is the same as the one he sent to Alice in step (2), he encrypts <I>R</I><SUB>A</SUB> with <I>K</I> and sends it to Alice.
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>R</I><SUB>A</SUB>)
</DL>
<DD><B>(5)</B>&nbsp;&nbsp;Alice decrypts the message to maintain <I>R</I><SUB>A</SUB>. Assuming the <I>R</I><SUB>A</SUB> she received from Bob is the same as the one she sent to Bob in step (3), the protocol is complete. Both parties now communicate using <I>K</I> as the session key.
</DL>
<P><FONT SIZE="+1"><B><I>Strengthening EKE</I></B></FONT></P>
<P>Bellovin and Merritt suggest an enhancement of the challenge-and-response portion of the protocol&#151;to prevent a possible attack if a cryptanalyst recovers an old <I>K</I> value.</P>
<P>Look at the basic EKE protocol. In step (3), Alice generates another random number, <I>S</I><SUB>A</SUB>, and sends Bob</P>
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>R</I><SUB>A</SUB>, <I>S</I><SUB>A</SUB>)
</DL>
<P>In step (4), Bob generates another random number, <I>SB,</I> and sends Alice</P>
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>R</I><SUB>A</SUB>, <I>R</I><SUB>B</SUB>, <I>S</I><SUB>B</SUB>)
</DL>
<P>Alice and Bob now can both calculate the true session key, <I>S</I><SUB>A</SUB> &#8853; <I>S</I><SUB>B</SUB>. This key is used for all future messages between Alice and Bob; <I>K</I> is just used as a key-exchange key.</P>
<P>Look at the levels of protection EKE provides. A recovered value of <I>S</I> gives Eve no information about <I>P,</I> because <I>P</I> is never used to encrypt anything that leads directly to <I>S.</I> A cryptanalytic attack on <I>K</I> is also not feasible; <I>K</I> is used only to encrypt random data, and <I>S</I> is never encrypted alone.</P>
<P><FONT SIZE="+1"><B><I>Augmented EKE</I></B></FONT></P>
<P>The EKE protocol suffers from one serious disadvantage: It requires that both parties possess the <I>P.</I> Most password-based authentication systems store a one-way hash of the user&#146;s password, not the password itself (see Section 3.2). The Augmented EKE (A-EKE) protocol uses a one-way hash of the user&#146;s password as the superencryption key in the Diffie-Hellman variant of EKE. The user then sends an extra message based on the original password; this message authenticates the newly chosen session key.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="22-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="22-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人app在线| 午夜精品福利视频网站| 成熟亚洲日本毛茸茸凸凹| 婷婷成人综合网| 色婷婷av一区二区三区软件| 欧美最猛性xxxxx直播| 欧美一区二区二区| 久久精品男人的天堂| 蜜芽一区二区三区| 激情丁香综合五月| 丁香婷婷深情五月亚洲| 欧美精品一区二区三区蜜臀| 日韩一级在线观看| 精一区二区三区| 日韩女优电影在线观看| 韩国欧美国产1区| 久久久久久一二三区| 久久久噜噜噜久久中文字幕色伊伊| 另类欧美日韩国产在线| 日本三级亚洲精品| 日韩免费一区二区| 另类欧美日韩国产在线| 欧美激情在线一区二区| 97成人超碰视| 欧美日韩亚州综合| 免费久久99精品国产| 国产午夜精品一区二区三区嫩草| 粉嫩av一区二区三区| 亚洲欧洲制服丝袜| 91精品午夜视频| 国产精品正在播放| 综合欧美一区二区三区| 天天做天天摸天天爽国产一区 | 色综合欧美在线| 亚洲一级电影视频| 久久国产人妖系列| 国产性天天综合网| 欧美性视频一区二区三区| 青草av.久久免费一区| 久久九九99视频| 日本久久一区二区| 精品无人区卡一卡二卡三乱码免费卡| 337p亚洲精品色噜噜| 日韩电影在线观看网站| 国产精品嫩草影院av蜜臀| 极品少妇xxxx精品少妇偷拍| 国产精品日韩精品欧美在线| 欧美色综合天天久久综合精品| 午夜视频在线观看一区| 国产亚洲一区二区三区| 99久久99久久免费精品蜜臀| 欧美成人高清电影在线| 午夜婷婷国产麻豆精品| 一本色道亚洲精品aⅴ| 久久久不卡影院| 91蝌蚪porny| 欧美日韩国产高清一区二区| 热久久一区二区| 亚洲成在人线免费| 国产欧美日韩在线看| 午夜精品一区二区三区三上悠亚| 欧美日韩视频在线第一区 | 亚洲伦理在线精品| 日韩精品影音先锋| 国产成人精品一区二区三区四区| 国产福利一区二区三区| 亚洲综合在线五月| 国产欧美日韩在线视频| 欧美一区二区三区四区在线观看| av电影在线观看不卡| 午夜精品久久久久久| 亚洲人成影院在线观看| 久久婷婷国产综合国色天香 | 色综合天天综合网天天狠天天| 国产亚洲综合在线| 日韩一区二区三区四区五区六区| 色综合久久精品| 99热这里都是精品| 国产成人免费视频网站| 久久精品国产99| 日韩av电影一区| 亚洲裸体xxx| www激情久久| 欧美成人官网二区| 欧美草草影院在线视频| 欧美一区二区三区视频在线| 成人免费视频一区二区| 国产福利91精品一区二区三区| 久久久午夜电影| 欧美日韩小视频| 国产精品久久久久久久久晋中 | 成人精品小蝌蚪| 国产一区二区三区在线观看精品| 成人一区二区三区视频在线观看 | 久久久一区二区三区| 精品99999| 国产专区欧美精品| 国产91精品久久久久久久网曝门| 成人毛片在线观看| 国产最新精品精品你懂的| 香蕉成人伊视频在线观看| 亚洲成国产人片在线观看| 天天爽夜夜爽夜夜爽精品视频| 天天综合天天综合色| 日韩在线播放一区二区| 日本亚洲天堂网| 国内精品视频666| 国产一区二区成人久久免费影院| 狠狠色丁香婷婷综合久久片| 久久er精品视频| 国产精品18久久久| 波多野结衣在线一区| av日韩在线网站| 欧美视频一区二区三区| 日韩三级中文字幕| 国产调教视频一区| 亚洲精品综合在线| 日韩一区欧美二区| 精品亚洲成a人在线观看| 国产成人av电影在线观看| 91网站在线播放| 色成年激情久久综合| 欧美精品粉嫩高潮一区二区| 精品国产乱码久久久久久免费 | 欧美精品第1页| 欧美裸体一区二区三区| 欧美精三区欧美精三区| 久久久综合视频| 亚洲靠逼com| 蜜臀av亚洲一区中文字幕| 成人一级视频在线观看| 欧美日韩一区二区三区在线看| 精品国产麻豆免费人成网站| 一区在线观看视频| 蜜臀精品久久久久久蜜臀| 国产成人激情av| 欧美日韩一区视频| 国产视频一区不卡| 亚洲va在线va天堂| 国产精品一卡二| 欧美天堂一区二区三区| 久久久美女毛片| 午夜精品久久久久久不卡8050| 国产高清在线精品| 欧洲精品在线观看| 国产日本一区二区| 天涯成人国产亚洲精品一区av| 国产精品一区在线观看你懂的| 欧美日韩中字一区| 亚洲女同一区二区| 91网站黄www| 亚洲视频网在线直播| 成人在线一区二区三区| 久久久青草青青国产亚洲免观| 麻豆精品国产传媒mv男同| 51精品国自产在线| 午夜av电影一区| 欧美日韩精品一区二区天天拍小说| 亚洲欧美日韩国产一区二区三区| 高清在线观看日韩| 久久精品夜色噜噜亚洲a∨| 久久精品999| 日韩一二三区不卡| 免费一级欧美片在线观看| 欧美日韩一区 二区 三区 久久精品| 国产精品成人一区二区艾草| 成人听书哪个软件好| 国产婷婷色一区二区三区| 国产91露脸合集magnet| 国产欧美精品在线观看| 福利一区二区在线| 亚洲欧美在线另类| 色综合久久久久网| 亚洲国产aⅴ成人精品无吗| 欧美丝袜自拍制服另类| 天天av天天翘天天综合网色鬼国产 | 91精品综合久久久久久| 日韩av中文字幕一区二区| 日韩欧美中文一区二区| 韩国v欧美v亚洲v日本v| 国产欧美日韩在线观看| 99re在线精品| 亚洲成人av资源| 精品三级在线看| 不卡电影免费在线播放一区| 国产精品国产三级国产| 91九色最新地址| 免费成人av在线| 久久久综合网站| 色婷婷亚洲综合| 日韩av中文在线观看| 久久久久久久久久久久久久久99 | 久久精品国产精品亚洲红杏| 久久综合色8888| 不卡欧美aaaaa| 日日摸夜夜添夜夜添精品视频| 久久久久久亚洲综合影院红桃| av在线不卡网| 日本女人一区二区三区| 亚洲国产成人在线|