亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 16-06.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Pseudo-Random-Sequence Generators and Stream Ciphers</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=16//-->
<!--PAGES=382-387//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="16-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="16-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Generalized Geffe Generator</I></B></FONT></P>
<P>Instead of choosing between two LFSRs, this scheme chooses between <I>k</I> LFSRs, as long as <I>k</I> is a power of 2. There are <I>k</I> &#43; 1 LFSRs total (see Figure 16.7). LFSR-1 must be clocked <I>log</I><SUB>2</SUB><I>k</I> times faster than the other <I>k</I> LFSRs.</P>
<I><P><A NAME="Fig6"></A><A HREF="javascript:displayWindow('images/16-06.jpg',204,111 )"><IMG SRC="images/16-06t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/16-06.jpg',204,111)"><FONT COLOR="#000077"><B>Figure 16.6</B></FONT></A>&nbsp;&nbsp;Geffe generator.</I>
</P>
<P>Even though this scheme is more complex than the Geffe generator, the same kind of correlation attack is possible. I don&#146;t recommend this generator.
</P>
<P><FONT SIZE="+1"><B><I>Jennings Generator</I></B></FONT></P>
<P>This scheme uses a multiplexer to combine two LFSRs [778,779,780]. The multiplexer, controlled by LFSR-1, selects 1 bit of LFSR-2 for each output bit. There is also a function that maps the output of LFSR-2 to the input of the multiplexer (see Figure 16.8).
</P>
<P>The key is the initial state of the two LFSRs and the mapping function. Although this generator has great statistical properties, it fell to Ross Anderson&#146;s meet-in-the-middle consistency attack [39] and the linear consistency attack [1638,442]. Don&#146;t use this generator.</P>
<P><FONT SIZE="+1"><B><I>Beth-Piper Stop-and-Go Generator</I></B></FONT></P>
<P>This generator, shown in Figure 16.9, uses the output of one LFSR to control the clock of another LFSR [151]. The clock input of LFSR-2 is controlled by the output of LFSR-1, so that LFSR-2 can change its state at time <I>t</I> only if the output of LFSR-1 was 1 at time <I>t</I> - 1.</P>
<P>No one has been able to prove results about this generator&#146;s linear complexity in the general case. However, it falls to a correlation attack [1639].</P>
<P><FONT SIZE="+1"><B><I>Alternating Stop-and-Go Generator</I></B></FONT></P>
<P>This generator uses three LFSRs of different length. LFSR-2 is clocked when the output of LFSR-1 is 1; LFSR-3 is clocked when the output of LFSR-1 is 0. The output of the generator is the XOR of LFSR-2 and LFSR-3 (see Figure 16.10) [673].
</P>
<P>This generator has a long period and large linear complexity. The authors found a correlation attack against LFSR-1, but it does not substantially weaken the generator. There have been other attempts at keystream generators along these lines [1534,1574,1477].</P>
<I><P><A NAME="Fig7"></A><A HREF="javascript:displayWindow('images/16-07.jpg',257,140 )"><IMG SRC="images/16-07t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/16-07.jpg',257,140)"><FONT COLOR="#000077"><B>Figure 16.7</B></FONT></A>&nbsp;&nbsp;Generalized Geffe generator.</I>
<I></P>
<P><A NAME="Fig8"></A><A HREF="javascript:displayWindow('images/16-08.jpg',251,107 )"><IMG SRC="images/16-08t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/16-08.jpg',251,107)"><FONT COLOR="#000077"><B>Figure 16.8</B></FONT></A>&nbsp;&nbsp;Jennings generator.</I>
</P>
<P><FONT SIZE="+1"><B><I>Bilateral Stop-and-Go Generator</I></B></FONT></P>
<P>This generator uses two LFSRs, both of length <I>n</I> (see Figure 16.11) [1638]. The output of the generator is the XOR of the outputs of each LFSR. If the output of LFSR-2 at time <I>t</I> &#150; 1 is 0 and the output at time <I>t</I> &#150; 2 is 1, then LFSR-2 does not clock at time <I>t</I>. Conversely, if the output of LFSR-1 at time <I>t</I> &#150; 1 is 0 and the output at <I>t</I> &#150; 2 is 1, and if LFSR-1 clocked at time <I>t</I>, then LFSR-2 does not clock at time <I>t</I>.</P>
<P>The linear complexity of this system is roughly equal to the period. According to [1638], &#147;no evident key redundancy has been observed in this system.&#148;</P>
<P><FONT SIZE="+1"><B><I>Threshold Generator</I></B></FONT></P>
<P>This generator tries to get around the security problems of the previous generators by using a variable number of LFSRs [277]. The theory is that if you use a lot of LFSRs, it&#146;s harder to break the cipher.
</P>
<P>This generator is illustrated in Figure 16.12. Take the output of a large number of LFSRs (use an odd number of them). Make sure the lengths of all the LFSRs are relatively prime and all the feedback polynomials are primitive: maximize the period. If more than half the output bits are 1, then the output of the generator is 1. If more than half the output bits are 0, then the output of the generator is 0.</P>
<I><P><A NAME="Fig9"></A><A HREF="javascript:displayWindow('images/16-09.jpg',287,109 )"><IMG SRC="images/16-09t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/16-09.jpg',287,109)"><FONT COLOR="#000077"><B>Figure 16.9</B></FONT></A>&nbsp;&nbsp;Beth-Piper stop-and-go generator.</I>
<I></P>
<P><A NAME="Fig10"></A><A HREF="javascript:displayWindow('images/16-10.jpg',245,101 )"><IMG SRC="images/16-10t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/16-10.jpg',245,101)"><FONT COLOR="#000077"><B>Figure 16.10</B></FONT></A>&nbsp;&nbsp;Alternating stop-and-go generator.</I>
</P>
<P>With three LFSRs, the output generator can be written as:
</P>
<DL>
<DD><I>b</I> = (<I>a</I><SUB>1</SUB> ^ <I>a</I><SUB>2</SUB>) &#8853; (<I>a</I><SUB>1</SUB> ^ <I>a</I><SUB>3</SUB>) &#8853; (<I>a</I><SUB>2</SUB> ^ <I>a</I><SUB>3</SUB>)
</DL>
<P>This is very similar to the Geffe generator, except that it has a larger linear complexity of
</P>
<DL>
<DD><I>n</I><SUB>1</SUB><I>n</I><SUB>2</SUB> &#43; <I>n</I><SUB>1</SUB><I>n</I><SUB>3</SUB> &#43; <I>n</I><SUB>2</SUB><I>n</I><SUB>3</SUB>
</DL>
<P>where <I>n</I><SUB>1</SUB>, <I>n</I><SUB>2</SUB>, and <I>n</I><SUB>3</SUB> are the lengths of the first, second, and third LFSRs.</P>
<P>This generator isn&#146;t great. Each output bit of the generator yields some information about the state of the LFSRs&#151;0.189 bit to be exact&#151;and the whole thing falls to a correlation attack. I don&#146;t recommend using it.</P>
<P><FONT SIZE="+1"><B><I>Self-Decimated Generators</I></B></FONT></P>
<P>Self-decimated generators are generators that control their own clock. Two have been proposed, one by Rainer Rueppel (see Figure 16.13) [1359] and another by Bill Chambers and Dieter Gollmann [308] (see Figure 16.14). In Rueppel&#146;s generator, when the output of the LFSR is 0, the LFSR is clocked <I>d</I> times. When the output of the LFSR is 1, the LFSR is clocked <I>k</I> times. Chambers&#146;s and Gollmann&#146;s generator is more complicated, but the idea is the same. Unfortunately, both generators are insecure [1639], although some modifications have been proposed that may correct the problems [1362].</P>
<I><P><A NAME="Fig11"></A><A HREF="javascript:displayWindow('images/16-11.jpg',305,144 )"><IMG SRC="images/16-11t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/16-11.jpg',305,144)"><FONT COLOR="#000077"><B>Figure 16.11</B></FONT></A>&nbsp;&nbsp;Bilateral stop-and-go generator.</I>
<I></P>
<P><A NAME="Fig12"></A><A HREF="javascript:displayWindow('images/16-12.jpg',223,114 )"><IMG SRC="images/16-12t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/16-12.jpg',223,114)"><FONT COLOR="#000077"><B>Figure 16.12</B></FONT></A>&nbsp;&nbsp;Threshold generator.</I>
</P>
<P><FONT SIZE="+1"><B><I>Multispeed Inner-Product Generator</I></B></FONT></P>
<P>This generator, by Massey and Rueppel [1014], uses two LFSRs clocked at two different speeds (see Figure 16.15). LFSR-2 is clocked <I>d</I> times as fast as LFSR-1. The individual bits of the two LFSRs are ANDed together and then XORed with each other to produce the final output bit of the generator.</P>
<P>Although this generator has high linear complexity and it possesses excellent statistical properties, it still falls to a linear consistency attack [1639]. If <I>n</I><SUB>1</SUB> is the length of LFSR-1, <I>n</I><SUB>2</SUB> is the length of the LFSR-2, and <I>d</I> is the speed multiple between the two, then the internal state of the generator can be recovered from an output sequence of length</P>
<DL>
<DD><I>n</I><SUB>1</SUB> &#43; <I>n</I><SUB>2</SUB> &#43; <I>log</I><SUB>2</SUB><I>d</I>
</DL>
<P><FONT SIZE="+1"><B><I>Summation Generator</I></B></FONT></P>
<P>More work by Rainer Rueppel, this generator adds the output of two LFSRs (with carry) [1358,1357]. This operation is highly nonlinear. Through the late 1980s, this generator was the security front-runner, but it fell to a correlation attack [1053,1054,1091]. And it has been shown that this is an example of a feedback with carry shift register (see Section 17.4), and can be broken [844].
</P>
<I><P><A NAME="Fig13"></A><A HREF="javascript:displayWindow('images/16-13.jpg',314,48 )"><IMG SRC="images/16-13t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/16-13.jpg',314,48)"><FONT COLOR="#000077"><B>Figure 16.13</B></FONT></A>&nbsp;&nbsp;Rueppel&#146;s self-decimated generator.</I>
<I></P>
<P><A NAME="Fig14"></A><A HREF="javascript:displayWindow('images/16-14.jpg',254,76 )"><IMG SRC="images/16-14t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/16-14.jpg',254,76)"><FONT COLOR="#000077"><B>Figure 16.14</B></FONT></A>&nbsp;&nbsp;Chambers&#146;s and Gollmann&#146;s self-decimated generator.</I>
</P>
<P><FONT SIZE="+1"><B><I>DNRSG</I></B></FONT></P>
<P>That stands for &#147;dynamic random-sequence generator&#148; [1117]. The idea is to have two different filter generators&#151;threshold, summation, or whatever&#151;fed by a single set of LFSRs and controlled by another LFSR.
</P>
<P>First clock all the LFSRs. If the output of LFSR-0 is 1, then compute the output of the first filter generator. If the output of LFSR-0 is 0, then compute the output of the second filter generator. The final output is the first output XOR the second.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="16-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="16-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲一线二线三线视频| 久久er精品视频| 亚洲欧美一区二区三区极速播放| 日韩欧美国产综合一区 | 久久国产视频网| 欧美aaa在线| 免费观看成人av| 琪琪久久久久日韩精品| 日本在线不卡一区| 免费观看30秒视频久久| 美女脱光内衣内裤视频久久网站| 亚洲第一精品在线| 日韩福利视频网| 久久精品国产精品青草| 久久 天天综合| 国产一区二区三区久久悠悠色av| 国产在线不卡一区| 高清在线观看日韩| eeuss鲁片一区二区三区在线观看 eeuss鲁片一区二区三区在线看 | 国产欧美一区二区三区沐欲| 久久久久9999亚洲精品| 久久久99精品免费观看不卡| 国产日韩欧美在线一区| 国产精品久久久久7777按摩 | 国产成人小视频| 成人激情av网| 在线一区二区三区做爰视频网站| 在线观看日韩国产| 欧美一区二区日韩| 久久婷婷国产综合精品青草| 中文字幕巨乱亚洲| 亚洲精品成人悠悠色影视| 亚洲一区二区三区中文字幕 | 黄色日韩网站视频| 成人涩涩免费视频| 99国产精品国产精品久久| 欧美色视频在线观看| 日韩欧美中文字幕公布| 久久久www成人免费毛片麻豆| 国产精品福利一区| 婷婷一区二区三区| 国产大片一区二区| 色8久久精品久久久久久蜜| 91精品国产综合久久香蕉的特点| 久久久亚洲国产美女国产盗摄| 综合分类小说区另类春色亚洲小说欧美| 欧美精品自拍偷拍| 国产日产精品1区| 亚洲一区二区三区四区在线观看 | 亚洲国产日韩综合久久精品| 免费久久精品视频| av综合在线播放| 欧美一级生活片| 综合av第一页| 六月丁香综合在线视频| av电影天堂一区二区在线| 日韩一区二区在线观看| 国产精品福利在线播放| 蜜臀av性久久久久av蜜臀妖精| 成人国产精品免费网站| 337p亚洲精品色噜噜狠狠| 国产精品三级电影| 男男视频亚洲欧美| 日本高清不卡视频| 国产三级精品三级在线专区| 午夜精品久久一牛影视| 99热精品国产| 精品福利av导航| 亚洲国产视频一区| 成人av电影在线| 欧美成人一区二区三区片免费| 亚洲男人天堂av| 国产成人亚洲综合a∨婷婷 | 午夜婷婷国产麻豆精品| 国产91丝袜在线观看| 欧美一二三四区在线| 亚洲男人电影天堂| 成人免费观看男女羞羞视频| 日韩欧美一二三| 首页国产丝袜综合| 色狠狠桃花综合| 国产精品毛片久久久久久久| 久久国产尿小便嘘嘘尿| 欧美精品视频www在线观看| 亚洲美腿欧美偷拍| 成人av资源网站| 国产欧美日韩精品a在线观看| 免费人成网站在线观看欧美高清| 欧洲在线/亚洲| 亚洲色图色小说| 9久草视频在线视频精品| 久久亚洲精精品中文字幕早川悠里| 午夜影院久久久| 99久久精品国产导航| 国产精品私人影院| 国产精品一区二区免费不卡| 欧美精品亚洲一区二区在线播放| 亚洲一区二区在线视频| 日本韩国一区二区三区视频| 中文字幕制服丝袜一区二区三区| 国产乱子轮精品视频| 337p粉嫩大胆色噜噜噜噜亚洲| 琪琪一区二区三区| 日韩视频一区在线观看| 日本中文字幕一区| 欧美一区二区三区视频免费| 亚洲成人精品一区| 欧美午夜寂寞影院| 亚洲不卡av一区二区三区| 91福利国产精品| 亚洲福利视频三区| 欧美日韩国产片| 日韩电影在线一区| 精品国产一区二区三区久久影院| 男人的j进女人的j一区| 欧美一区二区免费视频| 日本成人在线不卡视频| 日韩欧美国产一区二区在线播放| 老司机免费视频一区二区三区| 日韩一卡二卡三卡| 激情都市一区二区| 欧美国产精品一区二区| 不卡一区二区中文字幕| 亚洲激情图片小说视频| 欧美午夜精品理论片a级按摩| 天天影视涩香欲综合网| 精品久久久久久亚洲综合网 | 久久99国内精品| 国产婷婷色一区二区三区在线| 成人综合在线观看| 亚洲一二三区视频在线观看| 欧美久久一区二区| 国产精品69久久久久水密桃| 国产精品久久久久影视| 欧美视频一二三区| 精品一区二区三区免费观看| 中文字幕欧美日韩一区| 欧美又粗又大又爽| 美女视频网站久久| 国产精品女主播av| 欧美日本在线播放| 国产高清视频一区| 亚洲一区二区欧美激情| 日韩欧美美女一区二区三区| 风间由美性色一区二区三区| 亚洲香肠在线观看| 亚洲精品在线观看视频| 日本韩国精品一区二区在线观看| 日本亚洲三级在线| 国产精品欧美一区喷水| 高清在线观看日韩| 欧美国产精品中文字幕| 欧美日韩成人综合| 国产精品99久久久| 亚洲电影视频在线| 久久这里都是精品| 色婷婷av一区二区三区大白胸 | 五月天久久比比资源色| 欧美精品一区二区三区很污很色的 | 精品一区二区在线免费观看| 久久久高清一区二区三区| 色综合天天性综合| 热久久一区二区| 久久婷婷综合激情| 这里只有精品电影| 盗摄精品av一区二区三区| 亚洲成人自拍偷拍| 久久久www成人免费毛片麻豆| 91麻豆国产在线观看| 日韩avvvv在线播放| 国产精品欧美经典| 欧美日韩中文精品| 国产91精品精华液一区二区三区| 亚洲午夜久久久久中文字幕久| 精品欧美一区二区三区精品久久| 欧洲日韩一区二区三区| 国内精品国产成人国产三级粉色| 亚洲另类春色国产| 26uuu亚洲综合色欧美 | 亚洲欧美日韩综合aⅴ视频| 91精品国产综合久久精品麻豆| 粉嫩一区二区三区性色av| 午夜精品视频一区| 国产精品久久精品日日| 欧美一级一区二区| 欧美久久久久久久久中文字幕| 不卡一区在线观看| 国产一区二区按摩在线观看| 午夜精品在线视频一区| 亚洲三级电影网站| 91精品国产综合久久久久久久久久| 91在线精品秘密一区二区| 国产suv精品一区二区883| 日韩成人伦理电影在线观看| 亚洲精品久久7777| 26uuu精品一区二区| 日韩欧美黄色影院| 在线播放中文一区| 在线观看中文字幕不卡| 色婷婷综合久久久中文一区二区|