亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 22-01.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Key-Exchange Algorithms</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=22//-->
<!--PAGES=513-516//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch21/21-04.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="22-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Chapter 22<BR>Key-Exchange Algorithms
</FONT></H2>
<H3><A NAME="Heading2"></A><FONT COLOR="#000077">22.1 Diffie-Hellman</FONT></H3>
<P>Diffie-Hellman was the first public-key algorithm ever invented, way back in 1976 [496]. It gets its security from the difficulty of calculating discrete logarithms in a finite field, as compared with the ease of calculating exponentiation in the same field. Diffie-Hellman can be used for key distribution&#151;Alice and Bob can use this algorithm to generate a secret key&#151;but it cannot be used to encrypt and decrypt messages.
</P>
<P>The math is simple. First, Alice and Bob agree on a large prime, <I>n</I> and <I>g,</I> such that <I>g</I> is primitive mod <I>n.</I> These two integers don&#146;t have to be secret; Alice and Bob can agree to them over some insecure channel. They can even be common among a group of users. It doesn&#146;t matter.</P>
<P>Then, the protocol goes as follows:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice chooses a random large integer <I>x</I> and sends Bob
<DL>
<DD><I>X</I> = <I>g<SUP>x</SUP></I> mod <I>n</I>
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Bob chooses a random large integer <I>y</I> and sends Alice
<DL>
<DD><I>Y</I> = <I>g</I><SUP>y</SUP> mod <I>n</I>
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice computes
<DL>
<DD><I>k</I> = <I>Y<SUP>x</SUP></I> mod <I>n</I>
</DL>
<DD><B>(4)</B>&nbsp;&nbsp;Bob computes
<DL>
<DD><I>k&#180;</I> = <I>X</I><SUP>y</SUP> mod <I>n</I>
</DL>
</DL>
<P>Both <I>k</I> and <I>k&#180;</I> are equal to <I>g</I><SUP>xy</SUP> mod <I>n.</I> No one listening on the channel can compute that value; they only know <I>n, g, X,</I> and <I>Y.</I> Unless they can compute the discrete logarithm and recover <I>x</I> or <I>y,</I> they do not solve the problem. So, <I>k</I> is the secret key that both Alice and Bob computed independently.</P>
<P>The choice of <I>g</I> and <I>n</I> can have a substantial impact on the security of this system. The number (<I>n</I> - 1)/2 should also be a prime [1253]. And most important, <I>n</I> should be large: The security of the system is based on the difficulty of factoring numbers the same size as <I>n.</I> You can choose any <I>g,</I> such that <I>g</I> is primitive mod <I>n;</I> there&#146;s no reason not to choose the smallest <I>g</I> you can&#151;generally a one-digit number. (And actually, <I>g</I> does not have to be primitive; it just has to generate a large subgroup of the multiplicitive group mod <I>n.</I>)</P>
<P><FONT SIZE="+1"><B><I>Diffie-Hellman with Three or More Parties</I></B></FONT></P>
<P>The Diffie-Hellman key-exchange protocol can easily be extended to work with three or more people. In this example, Alice, Bob, and Carol together generate a secret key.
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice chooses a random large integer <I>x</I> and sends Bob
<DL>
<DD><I>X</I> = <I>g<SUP>x</SUP></I> mod <I>n</I>
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Bob chooses a random large integer <I>y</I> and sends Carol
<DL>
<DD><I>Y</I> = <I>g</I><SUP>y</SUP> mod <I>n</I>
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Carol chooses a random large integer <I>z</I> and sends Alice
<DL>
<DD><I>Z</I> = <I>g</I><SUP>z</SUP> mod <I>n</I>
</DL>
<DD><B>(4)</B>&nbsp;&nbsp;Alice sends Bob
<DL>
<DD><I>Z&#180;</I> = <I>Z</I><SUP>x</SUP> mod <I>n</I>
</DL>
<DD><B>(5)</B>&nbsp;&nbsp;Bob sends Carol
<DL>
<DD><I>X&#180;</I> = <I>X</I><SUP>y</SUP> mod <I>n</I>
</DL>
<DD><B>(6)</B>&nbsp;&nbsp;Carol sends Alice
<DL>
<DD><I>Y&#180;</I> = <I>Y</I><SUP><I>z</I></SUP> mod <I>n</I>
</DL>
<DD><B>(7)</B>&nbsp;&nbsp;Alice computes
<DL>
<DD><I>k</I> = <I>Y</I>&#180;<SUP><I>x</I></SUP> mod <I>n</I>
</DL>
<DD><B>(8)</B>&nbsp;&nbsp;Bob computes
<DL>
<DD><I>k</I> = <I>Z</I>&#180;<SUP><I>y</I></SUP> mod <I>n</I>
</DL>
<DD><B>(9)</B>&nbsp;&nbsp;Carol computes
<DL>
<DD><I>k</I> = <I>X</I>&#180;<SUP><I>z</I></SUP> mod <I>n</I>
</DL>
</DL>
<P>The secret key, <I>k,</I> is equal to g<SUP>xyz</SUP> mod <I>n,</I> and no one else listening in on the communications can compute that value. The protocol can be easily extended to four or more people; just add more people and more rounds of computation.</P>
<P><FONT SIZE="+1"><B><I>Extended Diffie-Hellman</I></B></FONT></P>
<P>Diffie-Hellman also works in commutitive rings [1253]. Z. Shmuley and Kevin McCurley studied a variant of the algorithm where the modulus is a composite number [1442,1038]. V. S. Miller and Neal Koblitz extended this algorithm to elliptic curves [1095,867]. Taher ElGamal used the basic idea to develop an encryption and digital signature algorithm (see Section 19.6).
</P>
<P>This algorithm also works in the Galois field GF(2<SUP>k</SUP>) [1442,1038]. Some implementations take this approach [884,1631,1632], because the computation is much quicker. Similarly, cryptanalytic computation is equally fast, so it is important to carefully choose a field large enough to ensure security.</P>
<P><FONT SIZE="+1"><B><I>Hughes</I></B></FONT></P>
<P>This variant of Diffie-Hellman allows Alice to generate a key and send it to Bob [745].
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice chooses a random large integer <I>x</I> and generates
<DL>
<DD><I>k</I> = <I>g</I><SUP><I>x</I></SUP> mod <I>n</I>
</DL>
<DD><B>(2)</B>&nbsp;&nbsp;Bob chooses a random large integer <I>y</I> and sends Alice
<DL>
<DD><I>Y</I> = <I>g<SUP>y</I></SUP> mod <I>n</I>
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice sends Bob
<DL>
<DD><I>X</I> = <I>Y<SUP>x</I></SUP> mod <I>n</I>
</DL>
<DD><B>(4)</B>&nbsp;&nbsp;Bob computes
<DL>
<DD><I>z</I> = <I>y</I><SUP>-1</SUP>
<DD><I>k&#180;</I> = <I>X<SUP>z</I></SUP> mod <I>n</I>
</DL>
</DL>
<P>If everything goes correctly, <I>k</I> = <I>k&#180;</I>.</P>
<P>The advantage of this protocol over Diffie-Hellman is that <I>k</I> can be computed before any interaction, and Alice can encrypt a message using <I>k</I> prior to contacting Bob. She can send it to a variety of people and interact with them to exchange the key individually later.</P>
<P><FONT SIZE="+1"><B><I>Key Exchange without Exchanging Keys</I></B></FONT></P>
<P>If you have a community of users, each could publish a public key, <I>X</I> = <I>g<SUP>x</I></SUP> mod <I>n,</I> in a common database. If Alice wants to communicate with Bob, she just has to retrieve Bob&#146;s public key and generate their shared secret key. She could then encrypt a message with that key and send it to Bob. Bob would retrieve Alice&#146;s public key to generate the shared secret key.</P>
<P>Each pair of users would have a unique secret key, and no prior communication between users is required. The public keys have to be certified to prevent spoofing attacks and should be changed regularly, but otherwise this is a pretty clever idea.</P>
<P><FONT SIZE="+1"><B><I>Patents</I></B></FONT></P>
<P>The Diffie-Hellman key-exchange algorithm is patented in the United States [718] and Canada [719]. A group called Public Key Partners (PKP) licenses the patent, along with other public-key cryptography patents (see Section 25.5). The U.S. patent will expire on April 29, 1997.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch21/21-04.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="22-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
在线观看亚洲精品视频| 国产欧美日韩精品a在线观看| 欧美综合在线视频| 91视频精品在这里| 北条麻妃国产九九精品视频| 成人avav影音| 一本高清dvd不卡在线观看| 波波电影院一区二区三区| 成人国产视频在线观看| 成人爱爱电影网址| 色香蕉久久蜜桃| 91麻豆产精品久久久久久| 色av综合在线| 欧美日韩一区二区三区在线| 欧美精品自拍偷拍动漫精品| 欧美日本韩国一区| 日韩一级黄色大片| 久久众筹精品私拍模特| 国产三级三级三级精品8ⅰ区| 国产午夜精品一区二区三区嫩草 | 在线免费观看日本一区| 在线观看三级视频欧美| 欧美高清视频在线高清观看mv色露露十八 | 国产成人午夜精品影院观看视频| 国产精品888| 97久久精品人人爽人人爽蜜臀| 色一区在线观看| 欧美一区午夜精品| 久久亚洲精品小早川怜子| 中文字幕免费不卡在线| 一区二区免费在线| 日本v片在线高清不卡在线观看| 国产原创一区二区| 91影视在线播放| 欧美高清视频不卡网| 精品少妇一区二区三区视频免付费| 国产日产精品一区| 亚洲猫色日本管| 老司机精品视频导航| 成人黄色国产精品网站大全在线免费观看 | 亚洲同性同志一二三专区| 一区二区三区四区不卡视频| 日本欧美一区二区在线观看| 国产一区二区精品久久91| 99久久国产综合色|国产精品| 欧美日韩综合色| 国产亚洲精品7777| 一区二区三区四区视频精品免费 | 国产成人精品影院| 色妹子一区二区| 精品捆绑美女sm三区| 国产精品区一区二区三区| 午夜精品爽啪视频| 国产成人精品1024| 777午夜精品视频在线播放| 国产片一区二区三区| 亚洲成人av资源| 国产91色综合久久免费分享| 在线视频欧美区| 国产日韩欧美综合一区| 偷窥少妇高潮呻吟av久久免费| 国产成人av电影免费在线观看| 4hu四虎永久在线影院成人| 国产精品久久久久久户外露出| 日韩精品午夜视频| 99国内精品久久| 2024国产精品| 免费在线看成人av| 91久久人澡人人添人人爽欧美| 久久精品免视看| 欧美一级黄色大片| 国产精品国产三级国产专播品爱网| 日本最新不卡在线| 欧美亚一区二区| 亚洲国产成人午夜在线一区| 久久国产婷婷国产香蕉| 欧洲国内综合视频| 亚洲欧洲三级电影| 国产美女视频91| 日韩一级片在线播放| 亚洲va天堂va国产va久| 粗大黑人巨茎大战欧美成人| 精品国产免费一区二区三区四区| 亚洲午夜日本在线观看| 91亚洲国产成人精品一区二区三| 欧美精品一区二区三区很污很色的| 午夜视频一区二区| 欧美这里有精品| 亚洲欧美日韩系列| 99国产精品国产精品久久| 中文字幕av一区二区三区高| 国产一区二区免费视频| 精品国产一区久久| 美国毛片一区二区三区| 欧美精三区欧美精三区| 日韩黄色一级片| 欧美三级中文字幕在线观看| 一二三四区精品视频| 色哟哟一区二区在线观看 | 美女免费视频一区| 91麻豆精品久久久久蜜臀| 亚洲18色成人| 欧美精品九九99久久| 天天操天天色综合| 欧美精品vⅰdeose4hd| 日韩va亚洲va欧美va久久| 欧美一区二区三区不卡| 日本最新不卡在线| 美国一区二区三区在线播放| 日韩一区二区三区观看| 美腿丝袜亚洲一区| 精品国产电影一区二区| 久久精品免费观看| 久久久影视传媒| 国产91精品久久久久久久网曝门| 欧美国产禁国产网站cc| 成人高清视频在线观看| 亚洲视频一区二区免费在线观看| 91浏览器在线视频| 天堂va蜜桃一区二区三区漫画版| 欧美精品电影在线播放| 久久99国产精品免费| 久久久电影一区二区三区| 国v精品久久久网| 亚洲色图制服诱惑 | 一区二区三区在线观看视频| 欧美视频在线一区二区三区| 日韩精品亚洲一区| 久久精品人人做人人综合| av电影在线观看不卡| 亚洲丰满少妇videoshd| 日韩一区二区免费高清| 国产麻豆欧美日韩一区| 亚洲男人的天堂一区二区| 欧美绝品在线观看成人午夜影视| 麻豆成人久久精品二区三区红 | 一区二区三区四区不卡在线 | 91美女视频网站| 婷婷国产v国产偷v亚洲高清| 国产亚洲欧洲一区高清在线观看| 99国产精品久久久久久久久久久| 日韩精品一二三四| 国产亚洲综合av| 欧美系列一区二区| 国产剧情一区在线| 亚洲激情男女视频| 精品国产一区二区三区av性色| 成人的网站免费观看| 日韩va欧美va亚洲va久久| 亚洲国产精品成人综合 | 亚洲精品免费一二三区| 欧美一区二区在线观看| 成人免费毛片app| 日韩成人精品在线观看| 国产精品国产三级国产普通话三级| 欧美电影一区二区| 成人免费看视频| 蜜臀av一级做a爰片久久| 中文字幕一区二区在线观看| 久久国产综合精品| 亚洲精品视频自拍| 久久久久国产精品麻豆| 欧美美女视频在线观看| 处破女av一区二区| 麻豆91免费看| 亚洲精品ww久久久久久p站| 久久婷婷国产综合精品青草| 欧美三级蜜桃2在线观看| 成人免费看片app下载| 毛片基地黄久久久久久天堂| 夜夜嗨av一区二区三区网页| 国产丝袜在线精品| 91精品婷婷国产综合久久性色| 不卡的看片网站| 国产一区在线观看麻豆| 丝袜诱惑制服诱惑色一区在线观看 | 亚洲视频一二区| 久久只精品国产| 欧美一级二级三级乱码| 色成人在线视频| 91一区在线观看| 成人黄色片在线观看| 国产精品18久久久| 捆绑变态av一区二区三区| 亚洲国产一区视频| 成人免费在线观看入口| 国产日韩影视精品| 久久综合久久久久88| 欧美一区二区免费| 欧美喷潮久久久xxxxx| 91年精品国产| av男人天堂一区| 国产不卡高清在线观看视频| 国产一区二区三区| 国产一区视频在线看| 日韩精品一区二区在线观看| 51久久夜色精品国产麻豆| 欧美日产在线观看| 欧美日韩高清一区二区| 欧美日韩色综合|