亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 24-10.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Example Implementations</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=24//-->
<!--PAGES=587-589//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="24-09.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="24-11.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Smart cards can have different cryptographic protocols and algorithms programmed into them. They might be configured as an electronic purse, and be able to spend and receive digital cash. They may be able to perform zero-knowledge authentication protocols; they may have their own encryption keys. They might be able to sign documents, or unlock applications on a computer.
</P>
<P>Some smart cards are assumed to be tamperproof; this often protects the institution that issues the cards. A bank wouldn&#146;t want you to be able to hack their smart card to give yourself more money.</P>
<P>There is a lot of interest in smart cards, and a lot of information about them is available. A good survey article on the cryptography in smart cards is [672]. CARTES is a conference held in Paris every October; and CardTech is held in Washington, D.C. every April. The proceedings of two other smart-card conferences are [342, 382]. There are hundreds of smart-card patents, mostly owned by European companies. An interesting paper on possible future applications&#151;integrity checking, audit trails, copy protection, digital cash, secure postage meters&#151;is [1628].</P>
<H3><A NAME="Heading15"></A><FONT COLOR="#000077">24.14 Public-Key Cryptography Standards (PKCS)</FONT></H3>
<P>The Public-Key Cryptography Standards (PKCS) are RSA Data Security, Inc.&#146;s attempt to provide an industry standard interface for public-key cryptography. Traditionally, this sort of thing would be handled by ANSI, but, considering the current situation in cryptography politics, RSADSI figured that they had better do it on their own. Working with a variety of companies, they developed a series of standards. Some are compatible with other standards and some are not.
</P>
<P>These are not standards in the traditional sense of the word; no standards body convened and voted on PKCS. According to its own materials, RSADSI will &#147;retain sole decision-making authority on what each standard is&#148; and will &#147;publish revised standards when appropriate&#148; [803].</P>
<P>Even so, there is a lot of good stuff here. If you&#146;re not sure what kind of syntax and data structures to use when programming public-key cryptography, these standards are probably as good as anything else you can come up with. And, since they&#146;re not really standards, you can tailor them to suit your needs.</P>
<P>Following is a short description of each PKCS (PKCS #2 and PKCS #4 have been incorporated into PKCS #1).</P>
<P>PKCS #1 [1345] describes a method for RSA encryption and decryption, primarily for constructing the digital signatures and digital envelopes described in PKCS #7. For digital signatures, the message is hashed and then the hash is encrypted with the private key of the signer. Both message and hash are represented together as detailed in PKCS #7. For digital envelopes (encrypted messages), the message is first encrypted with a symmetric algorithm, and then the message key is encrypted with the public key of the recipient. The encrypted message and encrypted key are represented together according to the syntax of PKCS #7. Both of these methods are compatible with PEM standards. PKCS #1 also describes a syntax, identical to the syntax in X.509 and PEM, for RSA public and private keys and three signature algorithms&#151;MD2 and RSA, MD4 and RSA, and MD5 and RSA&#151;for signing certificates and the like.</P>
<P>PKCS #3 [1346] describes a method for implementing Diffie-Hellman key exchange.</P>
<P>PKCS #5 [1347] describes a method for encrypting messages with a secret key derived from a password. It uses either MD2 or MD5 to derive the key from the password, and encrypts with DES in CBC mode. The method is intended primarily to encrypt private keys when transferring them from one computer system to another, but can be used to encrypt messages.</P>
<P>PKCS #6 [1348] describes a standard syntax for public key certificates. The syntax is a superset of an X.509 certificate, so that X.509 certificates can be extracted if necessary. Over and above the X.509 set, additional attributes extend the certification process beyond just the public key. These include other information, such as electronic mail address.</P>
<P>PKCS # 7 [1349] is a general syntax for data that may be encrypted or signed, such as digital envelopes or digital signatures. The syntax is recursive, so that envelopes can be nested, or someone can sign some previously encrypted data. The syntax also allows other attributes, such as timestamps, to be authenticated along with the message content. PKCS #7 is compatible with PEM so that signed and encrypted messages can be converted to PEM messages without any cryptographic operations, and vice versa. PKCS #7 can support a variety of architectures&#151;PEM is one&#151;for certificate-based key management.</P>
<P>PKCS #8 [1350] describes a syntax for private key information&#151;including a private key and a set of attributes&#151;and a syntax for encrypted private keys. PKCS #5 can be used to encrypt the private key information.</P>
<P>PKCS #9 [1351] defines selected attribute types for PKCS #6 extended certificates, PKCS #7 digitally signed messages, and PKCS #8 private-key information.</P>
<P>PKCS #10 [1352] describes a standard syntax for certification requests. A certification comprises a distinguished name, a public key, and (optionally) a set of attributes, collectively signed by the person requesting certification. Certification requests are sent to a certification authority, who either transforms the request into an X.509 public-key certificate or a PKCS #6 certificate.</P>
<P>PKCS #11 [1353], the Cryptographic Token API Standard, specifies a programming interface called &#147;Cryptoki&#148; for portable cryptographic devices of all kinds. Cryptoki presents a common logical model, enabling applications to perform cryptographic operations on portable devices without knowing details of the underlying technology. The standard also defines application profiles: sets of algorithms that a device may support.</P>
<P>PKCS #12 [1354] describes syntax for storing in software a user&#146;s public keys, protected private keys, certificates, and other related cryptographic information. The goal is to standardize on a single key file for use among a variety of applications.</P>
<P>These standards are comprehensive, but not exhaustive. Many things are outside their scope: the problem of naming, noncryptographic issues surrounding certification, key lengths, and conditions on various parameters. What the PKCS provide are a format for transferring data based on public-key cryptography and an infrastructure to support that transfer.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="24-09.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="24-11.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲一区二区av在线| 日韩精品电影在线观看| 欧美日韩小视频| 国产福利一区在线| 欧美aaaaa成人免费观看视频| 欧美国产一区二区在线观看| 日韩美女主播在线视频一区二区三区| av在线不卡免费看| 国产精品自拍网站| 国产精品 欧美精品| 欧美男男青年gay1069videost| 欧美色爱综合网| 欧美国产精品中文字幕| 激情文学综合插| 国产一区二区免费在线| 国产suv精品一区二区883| 国产91在线观看丝袜| 日韩欧美卡一卡二| 五月激情综合色| 美女在线一区二区| 国产一区二区网址| 日韩一级黄色片| 国产蜜臀av在线一区二区三区| 国产欧美日韩精品一区| 国精产品一区一区三区mba桃花| 欧美三日本三级三级在线播放| 亚洲视频一区二区在线| 亚洲一二三四久久| 亚洲高清一区二区三区| 91美女视频网站| 欧美一级生活片| 欧美国产精品专区| 国产不卡免费视频| 欧美激情综合五月色丁香小说| 狠狠色狠狠色综合系列| 日韩一区二区在线免费观看| 免费成人在线观看| 精品少妇一区二区三区免费观看| 欧美极品xxx| 欧美精品1区2区3区| 免费在线观看视频一区| 免费成人美女在线观看.| 欧美高清视频www夜色资源网| 亚洲一区在线视频观看| 久久视频一区二区| 色欧美乱欧美15图片| 久久久久久久免费视频了| 性做久久久久久久免费看| 国产一区不卡视频| 日韩成人伦理电影在线观看| 欧美激情综合在线| 亚洲午夜久久久久久久久电影网| 亚洲影视在线观看| 香蕉久久一区二区不卡无毒影院| 日韩av在线发布| 欧美军同video69gay| 国产精品视频在线看| 精品久久久网站| 日韩三级视频在线看| 亚洲成a人片在线不卡一二三区| 奇米在线7777在线精品| 欧美日韩一区二区三区四区| 久久人人97超碰com| 九九在线精品视频| 亚洲宅男天堂在线观看无病毒| 视频一区免费在线观看| 欧美三级视频在线播放| 国产精品不卡一区二区三区| 国产精品黄色在线观看| 亚洲丝袜制服诱惑| 91精品国产高清一区二区三区| 一区二区在线免费观看| 一区二区在线观看免费| 美女在线视频一区| 欧美国产欧美亚州国产日韩mv天天看完整| 99久久精品免费看国产| 色一区在线观看| 一个色在线综合| 免费高清视频精品| 亚洲麻豆国产自偷在线| 欧美午夜片在线看| 久久久久久久久久久久久夜| 国产美女娇喘av呻吟久久| 九色porny丨国产精品| 99精品国产热久久91蜜凸| 日韩中文字幕麻豆| 亚洲黄色免费网站| 一区二区三区蜜桃网| 一区二区三区精品久久久| 一区二区久久久| 亚洲v中文字幕| 日韩黄色免费网站| 蜜桃视频在线观看一区| 国产自产v一区二区三区c| 久久精品久久99精品久久| 精品国产1区2区3区| 91麻豆免费在线观看| 91国产丝袜在线播放| 国产伦理精品不卡| 国产**成人网毛片九色| 99免费精品在线| 欧美日韩午夜精品| 日韩欧美亚洲国产另类| 久久久久久久久久电影| 国产精品情趣视频| 一区二区三区中文在线观看| 亚洲成va人在线观看| 久久99日本精品| av成人免费在线观看| 在线免费av一区| 成人精品视频一区二区三区尤物| 日本成人在线一区| 国产一区亚洲一区| 91美女片黄在线| 欧美一激情一区二区三区| 久久久久久久久久美女| 亚洲色图一区二区| 日韩avvvv在线播放| 福利一区福利二区| 欧美三区免费完整视频在线观看| 91精品国产日韩91久久久久久| 久久久噜噜噜久久人人看| 亚洲乱码国产乱码精品精的特点| 天天综合日日夜夜精品| 国产精品一区二区在线看| 在线中文字幕不卡| 久久精品欧美日韩精品| 精品福利二区三区| 亚洲免费在线视频一区 二区| 日产精品久久久久久久性色| 成人理论电影网| 777奇米成人网| 7777精品伊人久久久大香线蕉最新版 | 欧美日韩精品一区二区三区四区| 日韩精品一区二区三区四区| 亚洲色图另类专区| 国产自产视频一区二区三区| 在线视频一区二区三区| 欧美国产1区2区| 老汉av免费一区二区三区 | 一本久久综合亚洲鲁鲁五月天| 欧美一区二区女人| 亚洲精品视频在线| 国产精品亚洲午夜一区二区三区| 91黄视频在线| 国产精品激情偷乱一区二区∴| 精品在线一区二区三区| 欧美夫妻性生活| 性久久久久久久久久久久| caoporen国产精品视频| 久久久国产精品麻豆| 另类小说图片综合网| 在线播放91灌醉迷j高跟美女| 日韩美女视频一区二区 | 国产美女娇喘av呻吟久久| 日韩一级片在线播放| 日韩激情一区二区| 欧美日韩精品一区二区| 成人欧美一区二区三区黑人麻豆| 洋洋av久久久久久久一区| 成人听书哪个软件好| 久久视频一区二区| 国产美女娇喘av呻吟久久| 2024国产精品| 国产乱码精品一区二区三区五月婷| 欧美电影在线免费观看| 亚洲va欧美va人人爽午夜| 欧美色综合网站| 亚洲午夜久久久久久久久电影院| 一本色道久久综合亚洲精品按摩| 国产精品网站一区| 成人午夜视频在线| 欧美高清在线视频| 国产激情一区二区三区四区 | 国产91丝袜在线播放0| 久久精品亚洲麻豆av一区二区| 国产在线精品视频| 国产欧美日韩三区| 99国产精品久久久| 玉米视频成人免费看| 欧美日韩一区在线| 亚洲第一搞黄网站| 欧美一区二区视频在线观看2022 | 午夜视频在线观看一区二区三区| 欧美亚洲图片小说| 亚洲va欧美va国产va天堂影院| 欧美视频在线观看一区二区| 日韩福利电影在线| 日韩欧美国产综合| 国产a久久麻豆| 亚洲免费看黄网站| 51精品国自产在线| 国产盗摄一区二区三区| 亚洲欧美日韩电影| 欧美精品在线观看播放| 精品中文av资源站在线观看| 国产精品欧美一区喷水| 91福利精品视频| 麻豆国产精品官网| 丝袜美腿亚洲色图|