亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 24-08.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Example Implementations</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=24//-->
<!--PAGES=581-584//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="24-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="24-09.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Figures 24.5 and 24.6 show messages with public-key key management (called &#147;asymmetric&#148; in PEM nomenclature). The headers are different. In ENCRYPTED messages, after the &#147;DEK-Info&#148; field comes the &#147;Originator-Certificate&#148; field. The certificate follows the X.509 standard (see Section 24.9). The next field is &#147;Key-Info&#148; with two subfields. The first subfield specifies the public-key algorithm used to encrypt the DEK; currently only RSA is supported. The next subfield is the DEK, encrypted in the originator&#146;s public key. This is an optional field, intended to permit the originator to decrypt his own message in the event that it is returned by the mail system. The next field &#147;Issuer-Certificate, &#148; is the certificate of whomever signed the Originator-Certificate.
</P>
<P>Continuing with the asymmetric key-management case, the next field is &#147;MIC-Info.&#148; The first subfield gives the algorithm under which the MIC was computed. The second subfield shows the algorithm under which the MIC was signed. The third subfield consists of the MIC, signed by the sender&#146;s private key.</P>

<TABLE BORDER="2" BORDERCOLOR="#0000" ALIGN="CENTER">
<TR><TD>
<!-- CODE //-->
<PRE>
   -----BEGIN PRIVACY-ENHANCED MESSAGE-----
   Proc-Type: 4,MIC-ONLY
   Content-Domain: RFC822
   Originator-Certificate:
MIIBlTCCAScCAWUwDQYJKoZIhvcNAQECBQAwUTELMAkGA1UEBhMCVVMxIDAeBgNV
BAoTF1JTQSBEYXRhIFNlY3VyaXR5LCBJbmMuMQ8wDQYDVQQLEwZCZXRhIDExDzAN
BgNVBAsTBk5PVEFSWTAeFw05MTA5MDQxODM4MTdaFw05MzA5MDMxODM4MTZaMEUx
CzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjEU
MBIGA1UEAxMLVGVzdCBVc2VyIDEwWTAKBgRVCAEBAgICAANLADBIAkEAwHZHl7i&#43;
yJcqDtjJCowzTdBJrdAiLAnSC&#43;CnnjOJELyuQiBgkGrgIh3j8/x0fM&#43;YrsyF1u3F
LZPVtzlndhYFJQIDAQABMA0GCSqGSIb3DQEBAgUAA1kACKr0PqphJYw1j&#43;YPtcIq
iWlFPuN5jJ79Khfg7ASFxskYkEMjRNZV/HZDZQEhtVaU7Jxfzs2wfX5byMp2X3U/
    5XUXGx7qusDgHQGs7Jk9W8CW1fuSWUgN4w==
   Issuer-Certificate:
MIIB3DCCAUgCAQowDQYJKoZIhvcNAQECBQAwTzELMAkGA1UEBhMCVVMxIDAeBgNV
BAoTF1JTQSBEYXRhIFNlY3VyaXR5LCBJbmMuMQ8wDQYDVQQLEwZCZXRhIDExDTAL
BgNVBAsTBFRMQ0EwHhcNOTEwOTAxMDgwMDAwWhcNOTIwOTAxMDc1OTU5WjBRMQsw
CQYDVQQGEwJVUzEgMB4GA1UEChMXUlNBIERhdGEgU2VjdXJpdHksIEluYy4xDzAN
BgNVBAsTBkJldGEgMTEPMA0GA1UECxMGTk9UQVJZMHAwCgYEVQgBAQICArwDYgAw
XwJYCsnp6lQCxYykNlODwutF/jMJ3kL&#43;3PjYyHOwk&#43;/9rLg6X65B/LD4bJHtO5XW
cqAz/7R7XhjYCm0PcqbdzoACZtIlETrKrcJiDYoP&#43;DkZ8k1gCk7hQHpbIwIDAQAB
MA0GCSqGSIb3DQEBAgUAA38AAICPv4f9Gx/tY4&#43;p&#43;4DB7MV&#43;tKZnvBoy8zgoMGOx
dD2jMZ/3HsyWKWgSF0eH/AJB3qr9zosG47pyMnTf3aSy2nBO7CMxpUWRBcXUpE&#43;x
EREZd9&#43;&#43;32ofGBIXaialnOgVUn0OzSYgugiQ077nJLDUj0hQehCizEs5wUJ35a5h
   MIC-Info: RSA-MD5,RSA,
jV2OfH&#43;nnXHU8bnL8kPAad/mSQlTDZlbVuxvZAOVRZ5q5&#43;Ejl5bQvqNeqOUNQjr6
    EtE7K2QDeVMCyXsdJlA8fA==
LSBBIG1lc3NhZ2UgZm9yIHVzZSBpbiB0ZXN0aW5nLg0KLSBGb2xsb3dpbmcgaXMg
   YSBibGFuayBsaW5lOg0KDQpUaGlzIGlzIHRoZSBlbmQuDQo=
   -----END PRIVACY-ENHANCED MESSAGE-----
</PRE>
<!-- END CODE //-->
</TABLE>

<P><I>Figure 24.6 Example of an encapsulated MIC-ONLY message (asymmetric case).</I></P>
<P>Still continuing with asymmetric key management, the next fields deal with the recipients. There are two fields for each recipient: &#147;Recipient-ID-Asymmetric&#148; and &#147;Key-Info.&#148; The &#147;Recipient-ID-Asymmetric&#148; field has two subfields. The first identifies the authority that issued the receiver&#146;s public key; the second is an optional Version/Expiration subfield. The &#147;Key-Info&#148; field specifies the key management parameters: The first subfield identifies the algorithm used to encrypt the message and the second subfield is the DEK encrypted with the receiver&#146;s public key.</P>
<P><FONT SIZE="+1"><B><I>Security of PEM</I></B></FONT></P>
<P>RSA keys in PEM can range from 508 bits to 1024 bits. This should be long enough for anyone&#146;s security needs. A more likely attack would be against the key-management protocols. Mallory could steal your private key&#151;don&#146;t write it down anywhere&#151;or attempt to fool you into accepting a bogus public key. The key certification provisions of PEM make this unlikely if everyone follows proper procedures, but people have been known to be sloppy.
</P>
<P>A more insidious attack would be for Mallory to modify the PEM implementation running on your system. This modified implementation could surreptitiously send Mallory all of your mail, encrypted with his public key. It could even send him a copy of your private key. If the modified implementation works well, you will never know what is happening.</P>
<P>There&#146;s no real way to prevent this kind of attack. You could use a one-way hash function and fingerprint the PEM code. Then, each time you run it, you could check the fingerprint for modification. But Mallory could modify the fingerprint code at the same time he modifies the PEM code. You could fingerprint the fingerprint code, but Mallory could modify that as well. If Mallory can get access to your machine, he can subvert the security of PEM.</P>
<P>The moral is that you can never really trust a piece of software if you cannot trust the hardware it is running on. For most people, this kind of paranoia is unwarranted. For some, it is very real.</P>
<P><FONT SIZE="+1"><B><I>TIS/PEM</I></B></FONT></P>
<P>Trusted Information Systems, partially supported by the U.S. government Advanced Research Projects Agency, has designed and implemented a reference implementation of PEM (TIS/PEM). Developed for UNIX-based platforms, it has also been ported to VMS, DOS, and Windows.
</P>
<P>Although the PEM specifications indicate a single certification hierarchy for use by the Internet, TIS/PEM supports the existence of multiple certification hierarchies. Sites may specify a set of certificates that are to be considered valid, including all certificates issued by them. A site need not join the Internet hierarchy in order to use TIS/PEM.</P>
<P>TIS/PEM is currently available to all U.S. and Canadian organizations and citizens upon request. It will be distributed in source code form. Interested parties should contact: Privacy-Enhanced Mail, Trusted Information Systems, Inc., 3060 Washington Road (Rte. 97), Glenwood, MD 21738; (301) 854-6889; fax: (301) 854-5363; Internet: pem-info@tis.com.</P>
<P><FONT SIZE="+1"><B><I>RIPEM</I></B></FONT></P>
<P>RIPEM is a program, written by Mark Riordan, that implements the PEM protocols. Although technically not public domain, the program is publicly available and can be used royalty-free for personal, noncommercial applications. A license for its use is included with the documentation.
</P>
<P>The code cannot be exported. Of course, U.S. government laws don&#146;t apply outside the United States, and some people have ignored the export rules. RIPEM code is available on bulletin boards worldwide. Something called RIPEM/SIG, which only does digital signatures, is exportable.</P>
<P>At this writing, RIPEM is not a complete implementation of the PEM protocols; it does not implement certificates for authenticating keys.</P>
<P>Before writing RIPEM, Riordan wrote a similar program called RPEM. This was intended to be a public-domain electronic-mail encryption program. To try to avoid patent issues, Riordan used Rabin&#146;s algorithm (see Section 19.5). Public Key Partners claimed that their patents were broad enough to cover all of public-key cryptography and threatened to sue; Riordan stopped distributing the program.</P>
<P>RPEM isn&#146;t really used anymore. It is not compatible with RIPEM. Since RIPEM can be used with the full blessing of Public Key Partners, there is no reason to use RPEM instead.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="24-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="24-09.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲在线观看免费| 欧美二区三区91| 国产视频一区在线播放| 亚洲丝袜自拍清纯另类| 粉嫩13p一区二区三区| 国产精品素人一区二区| 国产精品亚洲第一区在线暖暖韩国| 日韩欧美一级二级| 六月丁香婷婷色狠狠久久| 欧美日韩一区二区三区免费看 | 国产精品蜜臀av| 国产一区二区免费视频| 久久精品无码一区二区三区| 国产一区二区精品久久99| 久久综合九色综合欧美98| 青草av.久久免费一区| 91精品国产综合久久婷婷香蕉| 91在线观看免费视频| 亚洲男人电影天堂| 欧美视频中文字幕| 蜜桃免费网站一区二区三区| 欧美xingq一区二区| 国产91高潮流白浆在线麻豆| 国产精品午夜在线观看| 97se亚洲国产综合在线| 亚洲国产毛片aaaaa无费看 | 久久综合视频网| 人人爽香蕉精品| 久久久久国产精品麻豆| caoporm超碰国产精品| 亚洲免费在线观看| 欧美伦理电影网| 国产尤物一区二区在线| 最好看的中文字幕久久| 欧美色倩网站大全免费| 久久国产福利国产秒拍| 中国av一区二区三区| 欧美在线观看一区二区| 美女在线观看视频一区二区| 久久精品亚洲一区二区三区浴池| 99久久99久久精品免费看蜜桃| 亚洲尤物视频在线| 久久久久一区二区三区四区| 波多野结衣中文一区| 五月激情丁香一区二区三区| 国产亚洲一区二区三区在线观看| 91免费观看国产| 美日韩黄色大片| 1024成人网色www| 欧美成人a∨高清免费观看| jizzjizzjizz欧美| 日韩精品三区四区| 国产精品美女视频| 91.成人天堂一区| 成人免费三级在线| 日韩经典一区二区| 亚洲视频免费在线| 欧美性大战久久久久久久| 蜜桃一区二区三区在线观看| 1024亚洲合集| 久久精品免视看| 欧美高清视频不卡网| 成人黄色国产精品网站大全在线免费观看| 一区二区三区免费在线观看| 久久综合久久鬼色| 欧美精品自拍偷拍| 99国产精品久久久久久久久久 | 中文字幕的久久| 欧美精品在线一区二区三区| eeuss鲁片一区二区三区在线观看| 日本特黄久久久高潮| 18涩涩午夜精品.www| 久久久久久毛片| 亚洲日韩欧美一区二区在线| 国产午夜精品一区二区三区视频| 欧美丰满一区二区免费视频| 91香蕉视频污在线| 成人午夜精品一区二区三区| 美女视频网站久久| 亚洲成人你懂的| 中文字幕亚洲精品在线观看| 久久精品日韩一区二区三区| 日韩欧美黄色影院| 91精品国产综合久久香蕉麻豆| 欧美午夜精品理论片a级按摩| 极品美女销魂一区二区三区 | 久久久久久久久97黄色工厂| 欧美一区三区四区| 欧美日韩一区二区三区在线| 欧亚一区二区三区| 成人免费视频caoporn| 成人激情校园春色| 国产一区二区精品久久| 国产精品一区二区免费不卡| 久久99久久久欧美国产| 久久精品国产秦先生| 日本不卡不码高清免费观看| 免费精品视频最新在线| 麻豆成人av在线| 天堂成人免费av电影一区| 亚洲天堂福利av| 亚洲国产一区二区a毛片| 亚洲自拍偷拍综合| 亚洲va欧美va人人爽| 视频一区二区不卡| 青青草97国产精品免费观看 | 久久精品久久综合| 蜜臀av国产精品久久久久| 麻豆91精品视频| 国内精品国产成人国产三级粉色 | 国产一区二区按摩在线观看| 日韩精品亚洲一区二区三区免费| 依依成人精品视频| 亚洲成在人线免费| 青青国产91久久久久久| 玖玖九九国产精品| 成人免费视频网站在线观看| 99精品国产99久久久久久白柏 | 亚洲欧洲精品一区二区精品久久久| 国产精品久久毛片| 亚洲欧美国产77777| 亚洲chinese男男1069| 免费人成精品欧美精品| 国产福利电影一区二区三区| 91麻豆国产在线观看| 欧美无乱码久久久免费午夜一区 | fc2成人免费人成在线观看播放| 国产精品一线二线三线| 91亚洲精华国产精华精华液| 欧美精品自拍偷拍动漫精品| 久久久蜜桃精品| 一个色妞综合视频在线观看| 毛片不卡一区二区| 成人sese在线| 成人动漫在线一区| 成人午夜伦理影院| 欧美一区二区三区爱爱| 亚洲免费在线看| 处破女av一区二区| 日韩免费视频一区| 午夜精品国产更新| 欧洲一区在线观看| 国产精品电影一区二区| 国产精品亚洲视频| 精品sm在线观看| 青青草精品视频| 欧美夫妻性生活| 亚洲高清免费观看 | 肉肉av福利一精品导航| 91小视频在线免费看| 亚洲国产精品t66y| 国产精品99久| 久久综合久久99| 精品一区二区三区视频在线观看 | 日韩色视频在线观看| 亚洲成人av电影| 欧美揉bbbbb揉bbbbb| 亚洲福利一区二区| 日本久久精品电影| 一区二区三区国产豹纹内裤在线| av在线播放成人| 亚洲同性gay激情无套| 不卡电影一区二区三区| 国产精品乱码妇女bbbb| 国产电影一区二区三区| 久久久久久久综合日本| 国产精品一卡二| 国产欧美日韩一区二区三区在线观看| 激情综合色播激情啊| 精品久久久久久久久久久院品网| 老司机午夜精品| 国产婷婷色一区二区三区在线| 国内精品视频一区二区三区八戒| 久久久久青草大香线综合精品| 国产呦萝稀缺另类资源| 亚洲国产精品t66y| 99视频精品免费视频| 亚洲免费观看高清在线观看| 欧美午夜在线一二页| 视频一区中文字幕| 欧美变态口味重另类| 韩国女主播成人在线观看| 国产人成亚洲第一网站在线播放 | 国产成人8x视频一区二区| 国产三区在线成人av| 9l国产精品久久久久麻豆| 亚洲码国产岛国毛片在线| 欧美日韩国产首页| 美女网站一区二区| 国产精品你懂的| 在线一区二区三区做爰视频网站| 亚洲成人免费在线观看| 欧美成人精品3d动漫h| 成人18精品视频| 天堂av在线一区| 国产女主播视频一区二区| 久久精品人人做人人综合| gogo大胆日本视频一区| 视频在线观看一区| 久久久久久综合|