亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 24-12.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Example Implementations</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=24//-->
<!--PAGES=592-595//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="24-11.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch25/25-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Politics aside, the internal structure of the LEAF is worth discussing [812, 1154, 1594, 459, 107, 462]. The LEAF is a 128-bit string containing enough information to allow law enforcement to recover the session key, <I>K<SUB>S</SUB></I>, assuming the two <B>escrow agencies</B> in charge of those key-escrow databases cooperate. The LEAF contains a 32-bit unit identifier, <I>U</I>, unique to the Clipper chip. It also contains the current 80-bit session key encrypted with the chip&#146;s unique unit key, <I>K<SUB>U</SUB></I>, and a 16-bit checksum, <I>C</I>, called an escrow identifier. This checksum is a function of the session key, the IV, and possibly other information. These three fields are encrypted with a fixed family key, <I>K<SUB>F</SUB></I>, shared by all interoperable Clipper chips. The family key, the encryption modes used, the details of the checksum, and the exact structure of the LEAF are all secret. It probably looks something like this:</P>
<DL>
<DD><I>E<SUB><SMALL>K</SMALL><SUB>F</I></SUB></SUB>(<I>U,<SUB><SMALL>K</SMALL><SUB>U</I></SUB></SUB>(<I>K<SUB>S</SUB>, C</I>))
</DL>
<P><I>K<SUB>U</SUB></I> is programmed into Clipper chips at the factory. This key is then split (see Section 3.6) and stored in two different key-escrow databases, guarded by two different escrow agencies.</P>
<P>For Eve to recover <I>K<SUB>S</SUB></I> from the LEAF, she first has to decrypt the LEAF with <I>K<SUB>F</SUB></I> and recover <I>U.</I> Then she has to take a court order to each escrow agency, who each return half of <I>KU</I> for the given <I>U.</I> Eve XORs the two halves together to recover <I>K<SUB>U</SUB></I>, then she uses <I>K<SUB>U</SUB></I> to recover <I>K<SUB>S</SUB></I>, and <I>K<SUB>S</SUB></I> to eavesdrop on the conversation.</P>
<P>The checksum is designed to prevent someone from circumventing this scheme; the receiving Clipper chip won&#146;t decrypt if the checksum doesn&#146;t check. However, there are only 2<SUP>16</SUP> possible checksum values, and a bogus LEAF with the right checksum but the wrong key can be found in about 42 minutes [187]. This isn&#146;t much help for Clipper voice conversations. Because the key exchange protocol is not part of the Clipper chip, the 42-minute brute-force attack must occur after key exchange; it cannot be done before making the telephone call. This attack may work for facsimile transmission or with the Fortezza card (see Section 24.17).</P>
<P>Supposedly, the Clipper chip will resist reverse-engineering by &#147;a very sophisticated, well-funded adversary&#148; [1154], but rumors are that Sandia National Laboratories successfully reverse-engineered one. Even if those rumors aren&#146;t true, I suspect that the largest chip manufacturers in the world can reverse-engineer Clipper; it&#146;s just a matter of time before someone with the right combination of resources and ethics comes along.</P>
<P>Enormous privacy issues are associated with this scheme. Numerous civil liberty advocacy groups are actively campaigning against any key-escrow mechanism that gives the government the right to eavesdrop on citizens. But the sneaky thing is that this idea never went through Congress; NIST published the Escrowed Encryption Standard as a FIPS [1153], bypassing that irritating legislative process. Right now it looks like the EES is dying a slow and quiet death, but standards have a way of creeping up on you.</P>
<P>Anyway, Table 24.2 lists the different agencies participating in this program. Anyone want to do a threat analysis on having both escrow agents in the executive branch? Or on having escrow agents who really don&#146;t know anything about the wiretap requests, and can do no more than blindly approve them? Or on having the government impose a secret algorithm as a commercial standard?</P>
<P>In any case, implementing Clipper raises enough problems to question its value in court. Remember, Clipper only works in OFB mode. Despite what you may have been told to the contrary, this does not provide integrity or authentication. Imagine that Alice is on trial, and a Clipper-encrypted telephone call is part of the evidence. Alice claims that she never made the call; the voice is not hers. The phone&#146;s compression algorithm is so bad that it is hard to recognize Alice&#146;s voice, but the prosecution argues that since only Alice&#146;s escrowed key will decipher the call it must have been made from her telephone.</P>
<P>Alice argues that the call was forged like so [984, 1339]: Given the ciphertext and the plaintext, it is possible to XOR them to get the keystream. This keystream can then be XORed with an entirely different plaintext to form a forged ciphertext, which can then be converted to forged plaintext when fed into the Clipper decryptor. True or not, this argument could easily put enough doubt in a jury&#146;s mind to disregard the telephone call as evidence.</P>
<P>Another attack, called the Squeeze attack, allows Alice to frame Bob. Here&#146;s how [575]: Alice calls Bob using Clipper. She saves a copy of his LEAF as well as the session key. Then, she calls Carol (who she knows is being wiretapped). During the key setup, Alice forces the session key to be identical to the one she used with Bob; this requires hacking the phone, but it is not hard. Then, instead of sending her LEAF she sends Bob&#146;s. It&#146;s a valid LEAF, so Carol&#146;s phone will not notice. Now she can say whatever she wants to Carol; when the police decrypt the LEAF, they will find that it is Bob&#146;s. Even if Bob wasn&#146;t framed by Alice, the mere fact that he can claim this in court undermines the purpose of the scheme.</P>
<P>The law enforcement authorities of the United States should not be in the business of collecting information in criminal investigations that is useless in court. Even if key escrow were a good idea, Clipper is a bad way of implementing it.</P>
<H3><A NAME="Heading18"></A><FONT COLOR="#000077">24.17 Capstone</FONT></H3>
<P>Capstone (also known as the MYK-80) is the other NSA-developed VLSI cryptographic chip that implements the U.S. government&#146;s Escrowed Encryption Standard [1153]. Capstone includes the following functions [1155, 462]:
</P>
<TABLE WIDTH="50%"><TH CAPTION ALIGN="CENTER" COLSPAN="1">Table 24.2<BR>EES Participating Agencies
<TR>
<TD COLSPAN="1"><HR>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Justice&#151;System Sponsor and Family Key Agent
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">NIST&#151;Program Manager and Escrow Agent
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">FBI&#151;Decrypt User and Family Key Agent
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Treasury&#151;Escrow Agent
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">NSA&#151;Program Developer
<TR>
<TD COLSPAN="1"><HR>
</TABLE>
<DL>
<DD>&#151; The Skipjack algorithm in any of the four basic modes: ECB, CBC, CFB, and OFB.
<DD>&#151; A public-key Key Exchange Algorithm (KEA), probably Diffie-Hellman.
<DD>&#151; The Digital Signature Algorithm (DSA).
<DD>&#151; The Secure Hash Algorithm (SHA).
<DD>&#151; A general purpose exponentiation algorithm.
<DD>&#151; A general purpose, random-number generator that uses a pure noise source.
</DL>
<P>Capstone provides the cryptographic functionality needed for secure electronic commerce and other computer-based applications. The first application of Capstone is in a PCMCIA card called Fortezza. (It was originally called Tessera until a company called Tessera, Inc. complained.)
</P>
<P>NSA had considered lengthening Capstone&#146;s LEAF checksum in production versions for use in Fortezza cards, in order to foil the brute-force attack against the LEAF previously discussed. Instead, they added a feature that reset the card after 10 incorrect LEAFs. This only increases the time required to find a fake but valid LEAF by 10 percent, to 46 minutes. I am not impressed.</P>
<H3><A NAME="Heading19"></A><FONT COLOR="#000077">24.18 AT&ampT Model 3600 Telephone Security Device (TSD)</FONT></H3>
<P>The AT&ampT Telephone Security Device (TSD) is the Clipper phone. Actually, there are four models of the TSD. One contains the Clipper chip, another contains an exportable proprietary AT&ampT encryption algorithm, the third contains a proprietary algorithm for domestic use plus the exportable algorithm, and the fourth contains the Clipper, domestic, and exportable algorithms.
</P>
<P>TSDs use a different session key for each telephone call. A pair of TSDs generate a session key using Diffie-Hellman key exchange, independent of the Clipper chip. Since Diffie-Hellman incorporates no authentication, the TSD has two methods to thwart a man-in-the-middle attack.</P>
<P>The first is a screen. The TSD hashes the session key and displays that hash on a small screen as four Hex digits. The conversants should confirm that their screens show the same digits. The voice quality is good enough that they can recognize each other&#146;s voice.</P>
<P>Eve still has a possible attack. Imagine her in the middle of Alice and Bob&#146;s conversation. She uses one TSD on the line with Alice and a modified TSD on the line with Bob; in the middle she bridges the two phone calls. Alice tries to go secure. She generates a key as normal, except that Eve is acting as Bob. Eve recovers the key, and using the modified TSD, forces the key she generates with Bob to have the same hash value. This attack may not sound very likely, but the TSD uses a variant of the interlock protocol to prevent it.</P>
<P>The TSD generates random numbers using a noise source and a chaotic amplifier with digital feedback. This generates a bit stream, which is fed through a post-whitening filter using the digital signal processor.</P>
<P>Despite all of this, the TSD manual does not mention security at all. In fact, it says [70]:</P>
<BLOCKQUOTE><P>AT&ampT makes no warranty that the TSD will prevent cryptanalytic attack on any encrypted transmission by any government agency, its agents, or any third party. Furthermore, AT&ampT makes no warranty that the TSD will prevent any attack on any communication by methods which bypass encryption.
</P>
</BLOCKQUOTE><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="24-11.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch25/25-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品久久午夜夜伦鲁鲁| 亚洲一区二区三区不卡国产欧美| 日韩综合小视频| 色婷婷综合久久久久中文一区二区 | 91精品欧美一区二区三区综合在 | 中文字幕av在线一区二区三区| 亚洲视频精选在线| 粉嫩欧美一区二区三区高清影视| 日本一区二区三区dvd视频在线| 高清国产一区二区三区| 国产精品福利电影一区二区三区四区| 色综合亚洲欧洲| 婷婷开心激情综合| 精品国产一区二区三区四区四| 国产一区二区三区| 成人欧美一区二区三区小说| 欧美性生活一区| 久久精品国产精品青草| 欧美国产一区二区| 在线观看日韩av先锋影音电影院| 日韩专区一卡二卡| 国产精品欧美一区喷水| 欧美视频你懂的| 欧美一区二区三区色| 久久成人久久爱| 国产嫩草影院久久久久| 欧美三区在线观看| 国产成人午夜视频| 亚洲一级二级三级| 久久久国产精品麻豆| 在线日韩国产精品| 国产精品1区二区.| 视频一区中文字幕国产| 国产精品午夜在线| 日韩欧美三级在线| 色网综合在线观看| 国产福利91精品一区二区三区| 夜夜亚洲天天久久| 国产嫩草影院久久久久| 91精品欧美久久久久久动漫| 成人免费高清在线| 免费在线一区观看| 亚洲激情自拍视频| 日本一区二区三区视频视频| 欧美一区二区国产| 在线观看成人免费视频| www.爱久久.com| 国产在线精品一区二区夜色| 亚洲高清在线视频| 国产精品福利影院| 欧美国产禁国产网站cc| 91麻豆精品国产自产在线观看一区 | 成人伦理片在线| 久久成人免费网| 午夜精品福利久久久| 亚洲精品自拍动漫在线| 国产欧美一区二区精品秋霞影院| 91精品综合久久久久久| 在线一区二区三区四区| av在线不卡电影| 国产成人av自拍| 激情另类小说区图片区视频区| 天堂va蜜桃一区二区三区漫画版| 亚洲日本乱码在线观看| 国产片一区二区| 久久影音资源网| 精品国一区二区三区| 日韩一区二区三区在线| 欧美丰满美乳xxx高潮www| 欧美揉bbbbb揉bbbbb| 91豆麻精品91久久久久久| 成人av先锋影音| 豆国产96在线|亚洲| 高清在线观看日韩| 国产成人综合在线播放| 国产精品自拍毛片| 国产乱淫av一区二区三区| 国产一区二区调教| 国产精品夜夜爽| 国产成人免费av在线| 成人免费av网站| 97精品电影院| 91福利在线免费观看| 欧美在线观看视频一区二区 | 不卡一区二区中文字幕| gogo大胆日本视频一区| 色综合亚洲欧洲| 精品视频1区2区3区| 精品视频在线免费观看| 4438x亚洲最大成人网| 精品国产一区二区三区不卡 | 免费观看一级欧美片| 国产乱国产乱300精品| 播五月开心婷婷综合| eeuss鲁片一区二区三区在线看| 一本色道亚洲精品aⅴ| 欧美理论电影在线| 日韩免费观看2025年上映的电影| 久久嫩草精品久久久久| 亚洲欧洲日韩一区二区三区| 亚洲精品视频一区| 日韩不卡免费视频| 激情深爱一区二区| 91视频国产观看| 精品视频一区三区九区| 欧美大片在线观看一区| 国产精品欧美久久久久一区二区 | 中文文精品字幕一区二区| 亚洲伦在线观看| 日本少妇一区二区| 国产91精品在线观看| 91传媒视频在线播放| 精品国产乱码久久久久久免费| 中文字幕成人在线观看| 亚洲国产综合人成综合网站| 国内成人自拍视频| 91黄色免费观看| 精品裸体舞一区二区三区| 日韩一区在线看| 蜜臀av一区二区在线观看| av中文字幕不卡| 日韩一级大片在线观看| 中文字幕中文字幕在线一区 | 亚洲一区二区三区影院| 国内精品国产成人国产三级粉色| 色综合咪咪久久| 日韩欧美国产精品| 亚洲综合久久av| 国产盗摄视频一区二区三区| 欧美在线色视频| 国产精品久久久久久久久免费相片 | 91国产视频在线观看| 亚洲精品一区在线观看| 一区二区三区中文在线| 国产福利一区二区| 欧美一区日韩一区| 亚洲一区二区三区在线| av一区二区久久| 久久久久久一二三区| 免费精品视频在线| 在线精品视频免费播放| 国产精品久久国产精麻豆99网站| 久久91精品国产91久久小草| 欧美色区777第一页| 亚洲图片另类小说| 福利91精品一区二区三区| 日韩精品一二区| 色综合咪咪久久| 国产精品家庭影院| 国产99久久久国产精品免费看| 欧美一区二区二区| 日韩国产欧美视频| 欧美三级三级三级爽爽爽| 亚洲人成网站精品片在线观看| 国产一区二区三区在线观看免费视频| 欧美精选在线播放| 亚洲成人精品一区| 日本精品一区二区三区四区的功能| 国产精品久久久久久久蜜臀| 国产91精品露脸国语对白| 精品少妇一区二区三区日产乱码 | 国产在线播精品第三| 日韩一区二区在线观看视频 | 成人免费看视频| 久久精品免费在线观看| 国产一区二区h| 国产视频在线观看一区二区三区 | 色国产综合视频| 亚洲欧美电影院| 91视频在线看| 亚洲综合图片区| 777xxx欧美| 蜜臀av在线播放一区二区三区| 日韩欧美久久久| 国产精品一级在线| 国产精品护士白丝一区av| 日韩高清不卡一区| 欧美成人一区二区| 国产成人午夜视频| 亚洲欧美日韩综合aⅴ视频| 91精彩视频在线观看| 日韩1区2区日韩1区2区| 欧美成人精品福利| 国产成人免费视频一区| 亚洲欧美日韩国产中文在线| 91久久免费观看| 日本午夜一区二区| 久久综合色之久久综合| 成人短视频下载| 悠悠色在线精品| 91精品国产乱码| 国产老女人精品毛片久久| 最近日韩中文字幕| 在线成人午夜影院| 国产真实乱子伦精品视频| 综合电影一区二区三区 | 日韩精品一级二级| 国产午夜亚洲精品不卡| 日本高清免费不卡视频| 强制捆绑调教一区二区|