亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 24-02.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Example Implementations</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=24//-->
<!--PAGES=563-566//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="24-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="24-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">24.3 ISDN</FONT></H3>
<P>Bell-Northern Research developed a prototype secure Integrated Services Digital Network (ISDN) telephone terminal [499, 1192, 493, 500]. As a telephone, it was never developed beyond prototype. The resulting product was the Packet Data Security Overlay. The terminal uses Diffie-Hellman key exchange, RSA digital signatures, and DES data encryption; it can transmit and receive voice and data at 64 kilobits per second.
</P>
<P><FONT SIZE="+1"><B><I>Keys</I></B></FONT></P>
<P>A long-term public-key/private-key key pair is embedded in the phone. The private key is stored in a tamper-resistant area of the phone. The public key serves as the identification of the phone. These keys are part of the phone itself and cannot be altered in any way.
</P>
<P>Additionally, two other public keys are stored in the phone. One of these keys is the owner&#146;s public key. This key is used to authenticate commands from the owner and can be changed via a command signed by the owner. In this way an owner can transfer ownership of the phone to someone else.</P>
<P>The public key of the network is also stored in the phone. This key is used to authenticate commands from the network&#146;s key management facility and to authenticate calls from other users on the network. This key can also be changed via a signed command from the owner. This permits the owner to move his phone from one network to another.</P>
<P>These keys are considered long-term keys: rarely, if ever, changed. A short-term public-key/private-key key pair is also stored on the phone. These are encapsulated in a certificate signed by the key management facility. When two phones set up a call, they exchange certificates. The public key of the network authenticates these certificates.</P>
<P>This exchange and verification of certificates only sets up a secure call from phone to phone. To set up a secure call from person to person, the protocol has an additional piece. The owner&#146;s private key is stored on a hardware <B>ignition key</B>, which is inserted into the telephone by the owner. This ignition key contains the owner&#146;s private key, encrypted under a secret password known only by the owner (not by the phone, not by the network&#146;s key management facility, not by anybody). It also contains a certificate signed by the network&#146;s key management facility that contains the owner&#146;s public key and some identifying information (name, company, job title, security clearance, favorite pizza toppings, sexual preference, or whatever). This is also encrypted. To decrypt this information and enter it into the phone, the owner types his secret password on the phone&#146;s keypad. After the phone uses this information to set up calls, it is erased after the owner removes his ignition key.</P>
<P>The phone also stores a set of certificates from the network&#146;s key management facility. These certificates authorize particular users to use particular phones.</P>
<P><FONT SIZE="+1"><B><I>Calling</I></B></FONT></P>
<P>A call from Alice to Bob works as follows.
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice inserts her ignition key into the phone and enters her password.
<DD><B>(2)</B>&nbsp;&nbsp;The phone interrogates the ignition key to determine Alice&#146;s identity and gives Alice a dial tone.
<DD><B>(3)</B>&nbsp;&nbsp;The phone checks its set of certificates to ensure that Alice is authorized to use the particular phone.
<DD><B>(4)</B>&nbsp;&nbsp;Alice dials the number; the phone places the call.
<DD><B>(5)</B>&nbsp;&nbsp;The two telephones use a public-key cryptography key-exchange protocol to generate a unique and random session key. All subsequent protocol steps are encrypted using this key.
<DD><B>(6)</B>&nbsp;&nbsp;Alice&#146;s phone transmits its certificate and user authentication.
<DD><B>(7)</B>&nbsp;&nbsp;Bob&#146;s phone authenticates the signatures on both the certificate and the user authentication using the network&#146;s public key.
<DD><B>(8)</B>&nbsp;&nbsp;Bob&#146;s phone initiates a challenge-and-reply sequence. It demands real-time signed responses to time-dependent challenges. (This prevents an adversary from using certificates copied from a previous exchange.) One response must be signed by Alice&#146;s phone&#146;s private key; another must be signed by Alice&#146;s private key.
<DD><B>(9)</B>&nbsp;&nbsp;Bob&#146;s phone rings, unless he is already on the phone.
<DD><B>(10)</B>&nbsp;&nbsp;If Bob is home, he inserts his ignition key into the phone. His phone interrogates the ignition key and checks Bob&#146;s certificate as in steps (2) and (3).
<DD><B>(11)</B>&nbsp;&nbsp;Bob transmits his certificate and user authentication.
<DD><B>(12)</B>&nbsp;&nbsp;Alice&#146;s phone authenticates Bob&#146;s signatures as in step (7), and initiates a challenge-and-reply sequence as in step (8).
<DD><B>(13)</B>&nbsp;&nbsp;Both phones display the identity of the other user and phone on their displays.
<DD><B>(14)</B>&nbsp;&nbsp;The secure conversation begins.
<DD><B>(15)</B>&nbsp;&nbsp;When one party hangs up, the session key is deleted, as are the certificates Bob&#146;s phone received from Alice&#146;s phone and the certificates Alice&#146;s phone received from Bob&#146;s phone.
</DL>
<P>Each DES key is unique to each call. It exists only inside the two phones for the duration of the call and is destroyed immediately afterward. If an adversary captures one or both of the phones involved in the call, he will not be able to decrypt any previous call between the two phones.
</P>
<H3><A NAME="Heading5"></A><FONT COLOR="#000077">24.4 STU-III</FONT></H3>
<P>STU stands for &#147;Secure Telephone Unit, &#148; an NSA-designed secure phone. The unit is about the size and shape of a conventional telephone, and can be used as such. The phones are also tamper-resistant, enough so that they are unclassified if unkeyed. They also have a data port and can be used to secure modem traffic as well as voice [1133].
</P>
<P>Whitfield Diffie described the STU-III in [494]:</P>
<BLOCKQUOTE><P>To make a call with a STU-III, the caller first places an ordinary call to another STU-III, then inserts a key-shaped device containing a cryptographic variable and pushes a &#147;go secure&#148; button. After an approximately 15-second wait for cryptographic setup, each phone shows information about the identity and clearance of the other party on its display and the call can proceed.
</P>
<P>In an unprecedented move, Walter Deeley, NSA&#146;s deputy director for communications security, announced the STU-III or Future Secure Voice System in an exclusive interview given to <I>The New York Times</I> [282]. The objective of the new system was primarily to provide secure voice and low-speed data communications for the U.S. Defense Department and its contractors. The interview didn&#146;t say much about how it was going to work, but gradually the word began to leak out. The new system was using public key.</P>
<P>The new approach to key management was reported early on [68] and one article spoke of phones being &#147;reprogrammed once a year by secure telephone link, &#148; a turn of phrase strongly suggestive of a certificate passing protocol, similar to that described [in Section 24.3], that minimizes the need for phones to talk to the key management center. Recent reports have been more forthcoming, speaking of a key management system called FIREFLY that [1341] &#147;evolved from public key technology and is used to establish pair-wise traffic encryption keys.&#148; Both this description and testimony submitted to the U.S. Congress by Lee Neuwirth of Cylink [1164] suggest a combination of key exchange and certificates similar to that used in the ISDN secure phone and it is plausible that FIREFLY too is based on exponentiation.</P>
</BLOCKQUOTE><P>STU-IIIs are manufactured by AT&ampT and GE. Somewhere between 300, 000 and 400, 000 have been fielded through 1994. A new version, the Secure Terminal Equipment (STE), will work on ISDN lines.
</P>
<H3><A NAME="Heading6"></A><FONT COLOR="#000077">24.5 Kerberos</FONT></H3>
<P>Kerberos is a trusted third-party authentication protocol designed for TCP/IP networks. A Kerberos service, sitting on the network, acts as a trusted arbitrator. Kerberos provides secure network authentication, allowing a person to access different machines on the network. Kerberos is based on symmetric cryptography (DES as implemented, but other algorithms could be used instead). Kerberos shares a different secret key with every entity on the network and knowledge of that secret key equals proof of identity.
</P>
<P>Kerberos was originally developed at MIT for Project Athena. The Kerberos model is based on Needham-Schroeder&#146;s trusted third-party protocol (see Section 3.3) [1159]. The original version of Kerberos, Version 4, is specified in [1094, 1499]. (Versions 1 through 3 were internal development versions.) Version 5, modified from Version 4, is specified in [876, 877, 878]. The best overview of Kerberos is [1163]. Other survey articles are [1384, 1493], and two good articles on using Kerberos in the real world are [781, 782].</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="24-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="24-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲影院在线观看| 精品黑人一区二区三区久久| 欧美人xxxx| 日韩一区二区三区观看| 国产亚洲欧洲997久久综合| ...中文天堂在线一区| 亚洲国产精品久久久久秋霞影院 | 国产999精品久久久久久绿帽| 高清不卡在线观看av| 91国内精品野花午夜精品| 欧美mv和日韩mv国产网站| 国产精品网站在线观看| 亚洲成在线观看| 国产一区二区三区不卡在线观看| 97久久精品人人爽人人爽蜜臀 | 婷婷开心激情综合| 国产精品综合网| 欧美在线观看一区二区| 精品成人一区二区| 亚洲一级二级三级| 国产真实精品久久二三区| 91久久精品国产91性色tv| 日韩免费福利电影在线观看| 亚洲欧洲精品天堂一级| 日本不卡1234视频| 91在线porny国产在线看| 欧美一区二区三区男人的天堂| 国产婷婷一区二区| 热久久久久久久| 99久久精品99国产精品| 精品欧美乱码久久久久久| 玉足女爽爽91| 国产69精品久久久久毛片| 在线成人午夜影院| 亚洲美女视频在线| 国产成人av自拍| 欧美一区二区三区四区五区 | 91福利在线导航| 久久精品亚洲麻豆av一区二区| 亚洲高清视频的网址| 成人免费高清在线观看| 精品久久一二三区| 性做久久久久久久免费看| 成人黄色a**站在线观看| 日韩精品中午字幕| 亚洲成人动漫在线观看| 99国产麻豆精品| 国产三级欧美三级| 理论片日本一区| 欧美精品在线观看一区二区| 亚洲欧美色综合| 成人激情小说网站| 久久品道一品道久久精品| 视频一区视频二区中文| 在线观看日韩一区| 亚洲视频每日更新| av亚洲精华国产精华| 久久久久九九视频| 久久99精品久久久久婷婷| 欧美久久久久久久久久| 亚洲一区在线视频观看| 91猫先生在线| 国产精品超碰97尤物18| 大尺度一区二区| 久久久久国产精品厨房| 国产一区二区调教| 2024国产精品视频| 黑人精品欧美一区二区蜜桃| 日韩一区和二区| 蜜桃av噜噜一区| 欧美大片国产精品| 国内外成人在线视频| 欧美mv和日韩mv国产网站| 麻豆精品在线视频| 日韩欧美国产一区在线观看| 日韩高清电影一区| 日韩欧美三级在线| 国内外精品视频| 久久久久久亚洲综合影院红桃| 国产自产高清不卡| 久久精品男人的天堂| 国产成人精品一区二区三区四区| 久久久国产午夜精品| 国产成人精品aa毛片| 亚洲国产成人在线| 9色porny自拍视频一区二区| 国产精品成人一区二区三区夜夜夜| 波多野结衣一区二区三区| 国产精品不卡在线| 91精品福利在线| 午夜免费久久看| 日韩亚洲欧美一区二区三区| 久久av资源网| 国产日本欧洲亚洲| 91小视频在线观看| 亚洲成人资源网| 欧美成人在线直播| 丰满放荡岳乱妇91ww| 中文字幕永久在线不卡| 91黄色在线观看| 日本vs亚洲vs韩国一区三区| 精品国产乱子伦一区| 国产91综合网| 亚洲另类一区二区| 91精品国产综合久久香蕉的特点| 蜜桃久久精品一区二区| 国产三级三级三级精品8ⅰ区| 99久久综合精品| 亚洲成人综合视频| 久久久99精品久久| 色视频欧美一区二区三区| 日韩电影在线一区二区| 久久久精品蜜桃| 欧美中文字幕一区| 美女在线视频一区| 中文字幕av不卡| 欧美在线一区二区| 精品一区二区三区免费观看| 国产精品另类一区| 欧美日韩亚州综合| 国产成人a级片| 午夜影院久久久| 久久久噜噜噜久久人人看| 91国偷自产一区二区开放时间| 美女视频黄a大片欧美| 自拍偷在线精品自拍偷无码专区| 欧美日本在线视频| 成人性生交大片免费看在线播放 | 欧美三级视频在线观看| 国产一区二区三区在线观看免费| 亚洲欧洲国产专区| 精品成a人在线观看| 色综合夜色一区| 精品一区二区av| 一区二区欧美国产| 久久女同性恋中文字幕| 欧美三级在线看| www.亚洲免费av| 老司机免费视频一区二区| 有码一区二区三区| 久久久久久影视| 538在线一区二区精品国产| 成人网在线播放| 日本一区中文字幕| 亚洲欧美韩国综合色| 2024国产精品视频| 91精品国产综合久久蜜臀 | 又紧又大又爽精品一区二区| 久久久久久久一区| 欧美一级二级三级蜜桃| 在线看国产一区二区| 国产91清纯白嫩初高中在线观看 | 日韩精品中文字幕在线不卡尤物| 色婷婷av一区| 成年人网站91| 狠狠色丁香九九婷婷综合五月| 伊人夜夜躁av伊人久久| 欧美国产乱子伦| 精品福利二区三区| 91精品国产色综合久久不卡电影 | 亚洲一区二区三区四区在线观看| 国产区在线观看成人精品 | 国产乱国产乱300精品| 午夜精品免费在线观看| 亚洲少妇30p| 国产精品久久久久7777按摩| 精品国产免费人成在线观看| 欧美一级黄色片| 欧美日产国产精品| 欧美日韩免费高清一区色橹橹 | 亚洲精品少妇30p| 国产精品色在线| 久久久久久久久久久99999| 精品久久久久久最新网址| 91麻豆精品国产91久久久资源速度 | 欧美一区二区三区色| 欧美日韩成人激情| 91超碰这里只有精品国产| 欧美亚洲日本一区| 欧美日韩国产影片| 欧美精品一级二级| 欧美精品tushy高清| 欧美日韩黄色一区二区| 欧美精品777| 日韩一区二区三| 精品成人一区二区| 久久精品无码一区二区三区| 欧美精品一区二区三区视频| 2021国产精品久久精品| 国产亚洲精品超碰| 中文字幕乱码日本亚洲一区二区| 国产三级一区二区三区| 国产精品久久久久久久久晋中 | 色哟哟亚洲精品| 欧美性高清videossexo| 欧美性大战久久久久久久蜜臀 | 免费av成人在线| 美国十次综合导航| 国产高清不卡二三区| 成人av集中营|