亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 20-06.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Public-Key Digital Signature Algorithms</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=20//-->
<!--PAGES=493-496//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="20-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="20-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Patents</I></B></FONT></P>
<P>David Kravitz, formerly of the NSA, holds a patent on DSA [897]. According to NIST [538]:
</P>
<BLOCKQUOTE><P>NIST intends to make this DSS technique available world-wide on a royalty-free basis to the public interest. We believe this technique is patentable and that no other patents would apply to the DSS, but we cannot give firm assurances to such effect in advance of issuance of the patent.
</P>
</BLOCKQUOTE><P>Even so, three patent holders claim that the DSA infringes on their patents: Diffie-Hellman (see Section 22.1) [718], Merkle-Hellman (see Section 19.2) [720], and Schnorr (see Section 21.3) [1398]. The Schnorr patent is the most troublesome. The other two patents expire in 1997; the Schnorr patent is valid until 2008. The Schnorr algorithm was not developed with government money; unlike the PKP patents, the U.S. government has no rights to the Schnorr patent; and Schnorr patented his algorithm worldwide. Even if the U.S. courts rule in favor of DSA, it is unclear what other courts around the world would do. Is an international company going to adopt a standard that may be legal in some countries but infringes on a patent in others? This issue will take time to resolve; at the time of this writing it isn&#146;t even resolved in the United States.
</P>
<P>In June 1993 NIST proposed to give PKP an exclusive patent license to DSA [541]. The agreement fell through after public outcry and the standard was issued without any deal. NIST said [542]:</P>
<BLOCKQUOTE><P>...NIST has addressed the possible patent infringement claims, and has concluded that there are no valid claims.
</P>
</BLOCKQUOTE><P>So the standard is official, lawsuits are threatened, and no one knows what to do. NIST has said that it would help defend people sued for patent infringement, if they were using DSA to satisfy a government contract. Everyone else, it seems, is on their own. ANSI has a draft banking standard that uses DSA [60]. NIST is working to standardize DSA within the government. Shell Oil has made DSA their international standard. I know of no other proposed DSA standards.
</P>
<H3><A NAME="Heading3"></A><FONT COLOR="#000077">20.2 DSA Variants</FONT></H3>
<P>This variant makes computation easier on the signer by not forcing him to compute <I>k</I><SUP>-1</SUP> [1135]. All the parameters are as in DSA. To sign a message, <I>m</I>, Alice generates two random numbers, <I>k</I> and <I>d</I>, both less than <I>q</I>. The signature is</P>
<DL>
<DD><I>r</I> = (<I>g<SUP>k</I></SUP> mod <I>p</I>) mod <I>q</I>
<DD><I>s</I> = (<I>H</I>(<I>m</I>) &#43; <I>xr</I>) * <I>d</I> mod <I>q</I>
<DD><I>t</I> = <I>kd</I> mod <I>q</I>
</DL>
<P>Bob verifies the signature by computing
</P>
<DL>
<DD><I>w</I> = <I>t</I>/<I>s</I> mod <I>q</I>
<DD><I>u</I><SUB>1</SUB> = (<I>H</I>(<I>m</I>) * <I>w</I>) mod <I>q</I>
<DD><I>u</I><SUB>2</SUB> = (<I>rw</I>) mod <I>q</I>
</DL>
<P>If <I>r</I> = ((<I>g<SUP>u</I><SMALL>1</SMALL></SUP> * <I>y<SUP>u</I><SMALL>2</SMALL></SUP>) mod <I>p</I>) mod <I>q</I>, then the signature is verified.</P>
<P>This next variant makes computation easier on the verifier [1040,1629]. All the parameters are as in DSA. To sign a message, <I>m</I>, Alice generates a random number, <I>k</I>, less than <I>q</I>. The signature is</P>
<DL>
<DD><I>r</I> = (<I>g<SUP>k</I></SUP> mod <I>p</I>) mod <I>q</I>
<DD><I>s</I> = <I>k</I> * (<I>H</I>(<I>m</I>) &#43; <I>xr</I>)<SUP>-1</SUP> mod <I>q</I>
</DL>
<P>Bob verifies the signature by computing
</P>
<DL>
<DD><I>u</I><SUB>1</SUB> = (<I>H</I>(<I>m</I>) * <I>s</I>) mod <I>q</I>
<DD><I>u</I><SUB>2</SUB> = (<I>sr</I>) mod <I>q</I>
</DL>
<P>If <I>r</I> = ((<I>g<SUP>u</I><SMALL>1</SMALL></SUP> * <I>y<SUP>u</I><SMALL>2</SMALL></SUP>) mod <I>p</I>) mod <I>q</I>, then the signature is verified.</P>
<P>Another DSA variant allows for batch verification; Bob can verify signatures in batches [1135]. If they are all valid, he is done. If one isn&#146;t valid, then he still has to find it. Unfortunately, it is not secure; either the signer or the verifier can easily create a set of bogus signatures that satisfy the batch criteria [974].</P>
<P>There is also a variant for DSA prime generation, one that embeds <I>q</I> and the parameters used to generate the primes within <I>p</I>. Whether this scheme reduces the security of DSA is still unknown.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Choose an arbitrary sequence of at least 160 bits and call it <I>S</I>. Let <I>g</I> be the length of <I>S</I> in bits.
<DD><B>(2)</B>&nbsp;&nbsp;Compute <I>U</I> = SHA(<I>S</I>) &#8853; SHA ((<I>S</I> &#43; 1) mod 2<SUP><I>g</I></SUP>), where SHA is the Secure Hash Algorithm (see Section 18.7).
<DD><B>(3)</B>&nbsp;&nbsp;Form <I>q</I> by setting the most significant bit and the least significant bit of <I>U</I> to 1.
<DD><B>(4)</B>&nbsp;&nbsp;Check whether <I>q</I> is prime.
<DD><B>(5)</B>&nbsp;&nbsp;Let <I>p</I> be the concatenation of <I>q, S, C</I>, and SHA(<I>S</I>). <I>C</I> is set to 32 zero bits.
<DD><B>(6)</B>&nbsp;&nbsp;<I>p</I> = <I>p</I> &#150; (<I>p</I> mod <I>q</I>) &#43; 1.
<DD><B>(7)</B>&nbsp;&nbsp;<I>p</I> = <I>p</I> &#43; <I>q</I>.
<DD><B>(8)</B>&nbsp;&nbsp;If the <I>C</I> in <I>p</I> is 0x7fffffff, go to step (1).
<DD><B>(9)</B>&nbsp;&nbsp;Check whether <I>p</I> is prime.
<DD><B>(10)</B>&nbsp;&nbsp;If <I>p</I> is composite, go to step (7).
</DL>
<P>The neat thing about this variant is that you don&#146;t have to store the values of <I>C</I> and <I>S</I> used to generate <I>p</I> and <I>q</I>; they are embedded within <I>p</I>. For applications without a whole lot of memory, like smart cards, this can be a big deal.</P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">20.3 GOST Digital Signature Algorithm</FONT></H3>
<P>This is a Russian digital signature standard, officially called GOST R 34.10-94 [656]. The algorithm is very similar to DSA, and uses the following parameters
</P>
<DL>
<DD><I>p</I> = a prime number, either between 509 and 512 bits long, or between 1020 and 1024 bits long.
<DD><I>q</I> = a 254- to 256-bit prime factor of <I>p</I> &#150; 1.
<DD><I>a</I> = any number less than <I>p</I> &#150; 1 such that <I>a<SUP>q</I></SUP> mod <I>p</I> = 1.
<DD><I>x</I> = a number less than <I>q</I>.
<DD><I>y</I> = <I>a<SUP>x</I></SUP> mod <I>p</I>.
</DL>
<P>The algorithm also makes use of a one-way hash function: <I>H</I>(<I>x</I>). The standard specifies GOST R 34.11-94 (see Section 18.11), a function based on the GOST symmetric algorithm (see Section 14.1) [657].</P>
<P>The first three parameters, <I>p, q</I>, and <I>a</I>, are public and can be common across a network of users. The private key is <I>x</I>; the public key is <I>y</I>.</P>
<P>To sign a message, <I>m</I></P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice generates a random number, <I>k</I>, less than <I>q</I>
<DD><B>(2)</B>&nbsp;&nbsp;Alice generates
<DL>
<DD><I>r</I> = (<I>a<SUP>k</I></SUP> mod <I>p</I>) mod <I>q</I>
<DD><I>s</I> = (<I>xr</I> &#43; <I>k</I>(<I>H</I>(<I>m</I>))) mod <I>q</I>
</DL>
<BR>If <I>H</I>(<I>m</I>) mod <I>q</I> = 0, then set it equal to 1. If <I>r</I> = 0, then choose another <I>k</I> and start again. The signature is two numbers: <I>r</I> mod 2<SUP>256</SUP> and <I>s</I> mod 2<SUP>256</SUP>. She sends these to Bob.
<DD><B>(3)</B>&nbsp;&nbsp;Bob verifies the signature by computing
<DL>
<DD><I>v</I> = <I>H</I>(<I>m</I>)<SUP><I>q</I>-2</SUP> mod <I>q</I>
<DD><I>z</I><SUB>1</SUB> = (<I>sv</I>) mod <I>q</I>
<DD><I>z</I><SUB>2</SUB> = ((<I>q</I> &#150; <I>r</I>) * <I>v</I>) mod <I>q</I>
<DD><I>u</I> = ((<I>a<SUP>z</I><SMALL>1</SMALL></SUP> * <I>y<SUP>z</I><SMALL>2</SMALL></SUP>) mod <I>p</I>) mod <I>q</I>
</DL>
<BR>If <I>u</I> = <I>r</I>, then the signature is verified.
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="20-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="20-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲伊人伊色伊影伊综合网| 日本韩国欧美一区| 人人狠狠综合久久亚洲| 亚洲欧美乱综合| 国产精品欧美一级免费| 国产精品久久久久国产精品日日| 国产视频在线观看一区二区三区 | 欧美成人午夜电影| 欧美丰满一区二区免费视频 | 亚洲制服丝袜av| 在线观看日产精品| 日本vs亚洲vs韩国一区三区| 欧美韩国日本不卡| 亚洲尤物在线视频观看| 日韩成人午夜电影| 国产精品99久久不卡二区| 丁香六月久久综合狠狠色| 欧美在线视频全部完| 欧美刺激午夜性久久久久久久| 久久久亚洲高清| 一区二区三区免费观看| 美国av一区二区| 99riav一区二区三区| 精品国产自在久精品国产| √…a在线天堂一区| 久久超碰97中文字幕| 色婷婷av一区二区三区之一色屋| 91精品免费在线| 亚洲午夜影视影院在线观看| 国产福利一区在线| 欧美mv和日韩mv国产网站| 亚洲男人都懂的| 95精品视频在线| 国产欧美日韩综合精品一区二区| 蜜臀va亚洲va欧美va天堂| 91免费版在线| 亚洲欧美另类小说| 99国产精品视频免费观看| 国产精品麻豆视频| 粉嫩久久99精品久久久久久夜| 亚洲国产日韩综合久久精品| 成人污视频在线观看| 国产日产精品1区| 国产乱色国产精品免费视频| 日韩三级视频在线看| 免费看黄色91| 精品国产伦一区二区三区免费| 久久精品免费看| 精品欧美久久久| 成人午夜看片网址| 亚洲欧美在线aaa| 91成人在线精品| 全部av―极品视觉盛宴亚洲| 宅男在线国产精品| 国产精一品亚洲二区在线视频| www久久精品| 成人午夜又粗又硬又大| 一区二区三区四区不卡视频| 欧美日韩午夜在线视频| 老司机免费视频一区二区三区| 欧美大胆人体bbbb| av一区二区久久| 午夜精品久久久久| 国产欧美精品一区aⅴ影院| 91在线一区二区三区| 免费成人在线观看视频| 欧美高清在线一区| 日韩网站在线看片你懂的| 成人激情图片网| 日韩中文欧美在线| 《视频一区视频二区| 精品乱人伦小说| 欧美男生操女生| 在线中文字幕一区| 成人爱爱电影网址| 免费国产亚洲视频| 午夜久久电影网| 中文字幕在线不卡一区 | 亚洲人精品午夜| 911精品产国品一二三产区| a美女胸又www黄视频久久| 久久精工是国产品牌吗| 高清国产一区二区| 欧美精品免费视频| 亚洲欧美日韩小说| 欧美激情一区二区| 中文字幕国产一区二区| 欧美v国产在线一区二区三区| 欧美疯狂做受xxxx富婆| 91麻豆精品国产91久久久更新时间| 一本久道中文字幕精品亚洲嫩| 成人免费av资源| av午夜精品一区二区三区| 不卡免费追剧大全电视剧网站| 成人av电影在线观看| 91在线视频18| 3d成人动漫网站| 久久亚洲私人国产精品va媚药| 精品日韩在线一区| 国产精品久久久久影院亚瑟 | 强制捆绑调教一区二区| 蜜臀av一区二区三区| 丁香婷婷深情五月亚洲| 91麻豆123| 精品国产亚洲一区二区三区在线观看| 亚洲精品在线观| 一区二区三区美女| 蜜桃精品视频在线| 99久久精品国产一区| 欧美日韩亚洲国产综合| 久久久五月婷婷| 亚洲成av人片| 成人在线综合网| 欧美成人精品高清在线播放| 国产精品福利一区二区三区| 青青草原综合久久大伊人精品| 国产一区二区三区香蕉| 一本久久综合亚洲鲁鲁五月天| 精品av久久707| 亚洲五码中文字幕| 波多野结衣精品在线| 欧美成人vps| 亚洲一二三四在线| av在线一区二区三区| 日韩精品专区在线影院重磅| 亚洲国产精品影院| 91女神在线视频| 中文字幕在线一区二区三区| 韩国女主播成人在线观看| 日韩无一区二区| 日韩综合小视频| 欧美一区三区四区| 免费欧美高清视频| 欧美一区二区高清| 狠狠色综合日日| 精品国产伦一区二区三区观看方式| 香蕉影视欧美成人| 欧美日韩一区二区三区四区五区 | 在线精品视频一区二区三四| 亚洲日本电影在线| 欧美日韩免费一区二区三区 | 色综合久久天天| 亚洲国产精品视频| 欧美一级二级在线观看| 蜜臀av国产精品久久久久| 久久久久久久久久看片| 成人av综合在线| 婷婷丁香激情综合| 日本一区二区三区四区| 91久久线看在观草草青青| 亚洲第一福利视频在线| 久久综合久久久久88| 91影院在线观看| 久久精品99国产精品| 亚洲日本va午夜在线电影| 91精品啪在线观看国产60岁| 国产激情一区二区三区四区| 亚洲综合一区二区| 国产视频视频一区| 欧美一区二区三区性视频| www..com久久爱| 国产在线播放一区三区四| 一区二区三区不卡视频在线观看| 日韩丝袜美女视频| 欧美一区二区三区四区高清| 日韩伦理免费电影| 在线观看不卡视频| 成人一区二区视频| 久久福利视频一区二区| 五月天欧美精品| 亚洲激情欧美激情| 中文字幕在线不卡| 久久久91精品国产一区二区三区| 欧美视频一区二区三区四区| 懂色av中文一区二区三区| 美国十次综合导航| 精品影院一区二区久久久| 日韩专区在线视频| 香蕉影视欧美成人| 奇米一区二区三区| 麻豆精品在线播放| 久久成人免费网| 国产精品一品视频| 成人做爰69片免费看网站| 成人av资源站| 日本国产一区二区| 欧美日韩另类一区| 91精品国产综合久久久久久久久久 | 久久国产欧美日韩精品| 久久国产夜色精品鲁鲁99| 国产一区高清在线| 91视频一区二区三区| 欧美日韩在线一区二区| 日韩精品中文字幕一区| 国产校园另类小说区| 亚洲精品视频一区| 久久99精品视频| 91在线看国产| 久久久久久久久久久久久久久99| 国产精品日日摸夜夜摸av|