亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 22-04.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Key-Exchange Algorithms</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=22//-->
<!--PAGES=521-523//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="22-03.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="22-05.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Here&#146;s how it works. As usual, Alice and Bob want to authenticate each other and generate a common key. They agree on some digital signature scheme where any number can serve as the private key, and where the public key is derived from the private key, rather than being generated along with it. The ElGamal and DSA algorithms work well for this. Alice&#146;s password <I>P</I> (or perhaps some simple hash of it) will serve as the private key and as <I>P&#180;.</I></P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice picks her random exponent <I>R</I><SUB>a</SUB> and transmits
<DL>
<DD><I>E</I><SUB>P&#180;</SUB>(<I>g</I><SUP>R<SMALL><SMALL>A</SMALL></SMALL></SUP> mod <I>n</I>)
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Bob, who knows only <I>P&#180;</I> and cannot derive <I>P</I> from it, chooses <I>R</I><SUB>b</SUB> and sends
<DL>
<DD><I>E</I><SUB>P&#180;</SUB>(<I>g<SUP>R<SMALL><SMALL>A</SMALL></SMALL></SUP></I> mod <I>n</I>)
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Both Alice and Bob calculate the shared session key <I>K</I> = <I>g</I><SUP>r<SMALL><SMALL>A</SMALL></SMALL></SUP>*<SUP>r<SMALL><SMALL>B</SMALL></SMALL></SUP> mod <I>n.</I> Finally, Alice proves that she knows <I>P</I> itself, and not just <I>P&#180;,</I> by sending
<DL>
<DD><I>EK</I>(<I>SP</I>(<I>K</I>))
</DL>
</DL>
<P>Bob, who knows both <I>K</I> and <I>P&#180;,</I> can decrypt and validate the signature. Only Alice could have sent this message, since only she knows <I>P;</I> an intruder who obtains a copy of Bob&#146;s password file can try guessing at <I>P,</I> but cannot otherwise sign the session key.</P>
<P>The A-EKE scheme does not work with the public-key variant of EKE, since in it one party chooses the session key and imposes it on the other. This permits a man-in-the-middle attack by an attacker who has captured <I>P&#180;.</I></P>
<P><FONT SIZE="+1"><B><I>Applications of EKE</I></B></FONT></P>
<P>Bellovin and Merritt suggest using this protocol for secure public telephones [109]:
</P>
<BLOCKQUOTE><P>Let us assume that encrypting public telephones are deployed. If someone wishes to use one of these phones, some sort of keying information must be provided. Conventional solutions...require that the caller possess a physical key. This is undesirable in many situations. EKE permits use of a short, keypad-entered password, but uses a much longer session key for the call.
</P>
<P>EKE would also be useful with cellular phones. Fraud has been a problem in the cellular industry; EKE can defend against it (and ensure the privacy of the call) by rendering a phone useless if a PIN has not been entered. Since the PIN is not stored within the phone, it is not possible to retrieve one from a stolen unit.</P>
</BLOCKQUOTE><P>EKE&#146;s primary strength is that both symmetric and public-key cryptography work together in a manner that strengthens them both:
</P>
<BLOCKQUOTE><P>From a general perspective, EKE functions as a <I>privacy amplifier.</I> That is, it can be used to strengthen comparatively weak symmetric and asymmetric systems when used together. Consider, for example, the key size needed to maintain security when using exponential key exchange. As LaMacchia and Odlyzko have shown [934], even modulus sizes once believed to be safe (to wit, 192 bits) are vulnerable to an attack requiring only a few minutes of computer time. But their attack is not feasible if one must first guess a password before applying it.</P>
<P>Conversely, the difficulty of cracking exponential key exchange can be used to frustrate attempts at password-guessing. Password-guessing attacks are feasible because of how rapidly each guess may be verified. If performing such verification requires solving an exponential key exchange, the total time, if not the conceptual difficulty, increases dramatically.</P>
</BLOCKQUOTE><P>EKE is patented [111].
</P>
<H3><A NAME="Heading7"></A><FONT COLOR="#000077">22.6 Fortified Key Negotiation</FONT></H3>
<P>This scheme also protects key-negotiation schemes from poorly chosen passwords and man-in-the-middle attacks [47,983]. It uses a hash function of two variables that has a very special property: It has many collisions on the first variable while having effectively no collisions on the second variable.
</P>
<DL>
<DD><I>H&#180;</I>(<I>x, y</I>) = <I>H</I>(<I>H</I>(<I>k, x</I>) mod 2<I><SUP>m</SUP></I>, <I>x</I>),
<DD>where <I>H</I>(<I>k, x</I>) is an ordinary hash function on <I>k</I> and <I>x</I>
</DL>
<P>Here&#146;s the protocol. Alice and Bob share a secret password, <I>P,</I> and have just exchanged a secret key, <I>K,</I> using Diffie-Hellman key exchange. They use <I>P</I> to check that their two session keys are the same (and that Eve is not attempting a man-in-the-middle attack), without giving <I>P</I> away to Eve.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice sends Bob
<DL>
<DD><I>H&#180;</I> (<I>P, K</I>)
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Bob computes <I>H&#180;</I> (<I>P, K</I>) and compares his result with what he received from Alice. If they match he sends Alice
<DL>
<DD><I>H&#180;</I>(<I>H</I>(<I>P, K</I>))
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice computes <I>H&#180;</I> (<I>H</I>(<I>P,</I> K)) and compares her result with what she received from Bob.
</DL>
<P>If Eve is trying a man-in-the-middle attack, she shares one key, <I>K</I><SUB>1</SUB>, with Alice, and another key, <I>K</I><SUB>2</SUB>, with Bob. To fool Bob in step (2), she has to figure out the shared password and then send Bob <I>H&#180;</I> * (<I>P, K</I><SUB>2</SUB>). With a normal hash function she can try common passwords until she guesses the correct one, and then successfully infiltrate the protocol. But with this hash function, many passwords are likely to produce the same value when hashed with <I>K</I><SUB>1</SUB>. So when she finds a match, she will probably have the wrong password, and hence Bob will not be fooled.</P>
<H3><A NAME="Heading8"></A><FONT COLOR="#000077">22.7 Conference Key Distribution and Secret Broadcasting</FONT></H3>
<P>Alice wants to broadcast a message, <I>M,</I> from a single transmitter. However, she doesn&#146;t want it to be intelligible by every listener. In fact, she only wants a select subset of listeners to be able to recover <I>M.</I> Everyone else should get nonsense.</P>
<P>Alice can share a different key (secret or public) with each listener. She encrypts the message in some random key, <I>K.</I> Then she encrypts a copy of <I>K</I> with each of the keys of her intended recipients. Finally, she broadcasts the encrypted message and then all of the encrypted <I>K</I>s. Bob, who is listening, either tries to decrypt all the <I>K</I>s with his secret key, looking for one that is correct, or, if Alice doesn&#146;t mind everyone knowing who her message is for, he looks for his name followed by an encrypted key. Multiple-key cryptography, previously discussed, also works.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="22-03.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="22-05.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99久久精品国产一区二区三区| 裸体一区二区三区| 五月激情六月综合| 成人深夜福利app| 欧美一区二区视频网站| 亚洲素人一区二区| 国产又黄又大久久| 日韩一区二区免费在线观看| 中文字幕日本不卡| 国产电影一区在线| 日韩色视频在线观看| 午夜精品久久久久久久| kk眼镜猥琐国模调教系列一区二区| 7777精品伊人久久久大香线蕉| 欧美激情艳妇裸体舞| 日本成人中文字幕在线视频| 欧日韩精品视频| 亚洲欧美国产毛片在线| 国产精品77777| 久久亚洲二区三区| 九九**精品视频免费播放| 欧洲亚洲精品在线| 一区二区三区日韩在线观看| 东方欧美亚洲色图在线| 久久久久久久性| 精品一区二区三区免费毛片爱| 精品视频在线免费观看| 一区二区三区中文在线观看| 99久久精品免费| 亚洲免费在线看| 色婷婷综合久久久久中文一区二区| 久久久精品国产免费观看同学| 免费成人在线网站| 日韩限制级电影在线观看| 五月激情六月综合| 日韩区在线观看| 美女尤物国产一区| 精品国产乱子伦一区| 国产精品 欧美精品| 国产亚洲va综合人人澡精品| 丁香婷婷综合网| 国产精品成人网| 色菇凉天天综合网| 亚洲h在线观看| 欧美高清精品3d| 久久精品二区亚洲w码| 久久综合色8888| 成人h版在线观看| 亚洲精品五月天| 欧美日韩国产精品成人| 午夜精品一区二区三区电影天堂| 884aa四虎影成人精品一区| 另类人妖一区二区av| 国产午夜精品久久久久久久| 成人涩涩免费视频| 亚洲宅男天堂在线观看无病毒| 欧美精品第一页| 国产二区国产一区在线观看| 亚洲视频一区二区在线| 欧美日韩国产乱码电影| 激情综合亚洲精品| 亚洲三级小视频| 欧美一区二区三区日韩视频| 国产成人综合精品三级| 一区二区日韩电影| 精品福利一区二区三区| 91美女在线看| 久久99久久精品| 亚洲色图欧美激情| 精品国产sm最大网站免费看| jvid福利写真一区二区三区| 亚洲一二三四在线| 日本一区二区在线不卡| 欧美日韩免费高清一区色橹橹| 精品一区二区在线免费观看| 亚洲日本va在线观看| 精品久久久久香蕉网| 色婷婷综合久久久久中文| 久久99精品国产麻豆不卡| 亚洲四区在线观看| 久久久www免费人成精品| 欧美午夜在线观看| 懂色av中文一区二区三区| 日日嗨av一区二区三区四区| 国产精品久久免费看| 日韩三级视频中文字幕| 色噜噜狠狠一区二区三区果冻| 国产一区亚洲一区| 婷婷开心久久网| 亚洲狠狠丁香婷婷综合久久久| 精品粉嫩超白一线天av| 欧美日韩电影在线| 91九色最新地址| 波多野结衣中文一区| 麻豆成人免费电影| 日韩激情一区二区| 亚洲国产三级在线| 夜夜精品视频一区二区| 国产精品日韩精品欧美在线| 日韩免费视频一区二区| 欧美日韩一二三| www.色精品| 国产99久久久精品| 国产在线视频不卡二| 日韩av一区二| 偷拍日韩校园综合在线| 一区二区免费看| 中文字幕一区二区三区蜜月| 久久久久久久久97黄色工厂| 91精品国产色综合久久ai换脸 | 国产精品久久三| 欧美国产日韩精品免费观看| 日韩亚洲欧美高清| 26uuu久久天堂性欧美| 日韩亚洲欧美一区| 精品电影一区二区| 久久综合给合久久狠狠狠97色69| 欧美电影免费观看高清完整版在 | 一区二区三区小说| 亚洲妇熟xx妇色黄| 日本视频免费一区| 国产真实乱子伦精品视频| 精品一区二区日韩| 国产老肥熟一区二区三区| 国产盗摄一区二区| av一区二区不卡| 91国内精品野花午夜精品| 在线观看一区二区精品视频| 欧美日韩精品专区| 日韩欧美国产精品一区| 久久夜色精品国产欧美乱极品| 欧美精品一区二区高清在线观看| 久久―日本道色综合久久| 国产欧美日韩激情| 亚洲免费观看高清完整版在线观看熊 | 国产色综合一区| 国产欧美日韩卡一| 一区二区三区在线观看视频| 亚洲国产另类av| 蜜桃视频在线观看一区| 国产超碰在线一区| 色婷婷亚洲精品| 制服丝袜亚洲色图| 国产欧美日韩视频在线观看| 一区二区在线免费| 久久99热99| 色妹子一区二区| 日韩精品在线网站| 中文字幕亚洲成人| 日本三级亚洲精品| 99国产精品99久久久久久| 欧美日韩在线精品一区二区三区激情| 67194成人在线观看| 国产蜜臀97一区二区三区| 亚洲国产日韩精品| 国产风韵犹存在线视精品| 欧美在线免费观看视频| 精品国产自在久精品国产| 亚洲欧美日韩综合aⅴ视频| 精品一区二区三区日韩| 日本精品免费观看高清观看| 久久夜色精品国产噜噜av| 一区二区三区四区高清精品免费观看| 久久97超碰色| 欧美亚洲国产一区二区三区| 久久香蕉国产线看观看99| 午夜电影网一区| 99久久综合狠狠综合久久| 欧美一区二区三区小说| 国产精品国产三级国产普通话蜜臀 | 久久99精品久久久| 在线免费亚洲电影| 日本一二三四高清不卡| 青青草国产精品97视觉盛宴 | 555夜色666亚洲国产免| 亚洲欧洲成人自拍| 国产69精品久久99不卡| 欧美一区二区黄| 亚洲成人免费视| 91看片淫黄大片一级在线观看| 久久久久国产一区二区三区四区 | 精品国产a毛片| 蜜臀av性久久久久蜜臀aⅴ四虎| 在线观看亚洲精品视频| 亚洲天堂网中文字| 国产91精品一区二区麻豆网站| 欧美一区二区三区婷婷月色| 亚洲一区二区三区四区中文字幕| www.久久久久久久久| 国产亚洲欧美日韩在线一区| 国产专区综合网| 日韩欧美高清在线| 美女在线视频一区| 日韩欧美在线影院| 免费美女久久99| 欧美成人午夜电影| 国产精品中文字幕日韩精品| 精品99一区二区| 国产在线麻豆精品观看| 国产欧美日韩综合|