亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 20-09.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號(hào):
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Public-Key Digital Signature Algorithms</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=20//-->
<!--PAGES=500-502//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="20-08.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch21/21-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading8"></A><FONT COLOR="#000077">20.7 Cellular Automata</FONT></H3>
<P>A new and novel idea, studied by Papua Guam [665], is the use of cellular automata in public-key cryptosystems. This system is still far too new and has not been studied extensively, but a preliminary examination suggests that it may have a cryptographic weakness similar to one seen in other cases [562]. Still, this is a promising area of research. Cellular automata have the property that, even if they are invertible, it is impossible to calculate the predecessor of an arbitrary state by reversing the rule for finding the successor. This sounds a whole lot like a trapdoor one-way function.
</P>
<H3><A NAME="Heading9"></A><FONT COLOR="#000077">20.8 Other Public-Key Algorithms</FONT></H3>
<P>Many other public-key algorithms have been proposed and broken over the years. The Matsumoto-Imai algorithm [1021] was broken in [450]. The Cade algorithm was first proposed in 1985, broken in 1986 [774], and then strengthened in the same year [286]. In addition to these attacks, there are general attacks for decomposing polynomials over finite fields [605]. Any algorithm that gets its security from the composition of polynomials over a finite field should be looked upon with skepticism, if not outright suspicion.
</P>
<P>The Yagisawa algorithm combines exponentiation mod <I>p</I> with arithmetic mod <I>p</I> &#150; 1 [1623]; it was broken in [256]. Another public-key algorithm, Tsujii-Kurosawa-Itoh-Fujioka-Matsumoto [1548] is insecure [948]. A third system, Luccio-Mazzone [993], is insecure [717]. A signature scheme based on birational permutations [1425] was broken the day after it was presented [381]. Tatsuaki Okamoto has several signature schemes: one is provably as secure as the Discrete Logarithm Problem, and another is provably as secure as the Discrete Logarithm Problem <I>and</I> the Factoring Problem [1206]. Similar schemes are in [709].</P>
<P>Gustavus Simmons suggested J-algebras as a basis for public-key algorithms [1455,145]. This idea was abandoned after efficient methods for factoring polynomials were invented [951]. Special polynomial semigroups have also been studied [1619,962], but so far nothing has come of it. Harald Niederreiter proposed a public-key algorithm based on shift-register sequences [1166]. Another is based on Lyndon words [1476] and another on propositional calculus [817]. And a recent public-key algorithm gets its security from the matrix cover problem [82]. Tatsuaki Okamoto and Kazuo Ohta compare a number of digital signature schemes in [1212].</P>
<P>Prospects for creating radically new and different public-key cryptography algorithms seem dim. In 1988 Whitfield Diffie noted that most public-key algorithms are based on one of three hard problems [492, 494]:</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;Knapsack: Given a set of unique numbers, find a subset whose sum is <I>N</I>.
<DD><B>2.</B>&nbsp;&nbsp;Discrete logarithm: If <I>p</I> is a prime and <I>g</I> and <I>m</I> are integers, find <I>x</I> such that <I>g<SUP>x</I></SUP> &#8801; <I>M</I> (mod <I>p</I>).
<DD><B>3.</B>&nbsp;&nbsp;Factoring: If <I>N</I> is the product of two primes, either
<DL>
<DD><B>a)</B>&nbsp;&nbsp;factor <I>N</I>,
<DD><B>b)</B>&nbsp;&nbsp;given integers <I>M</I> and <I>C</I>, find <I>d</I> such that <I>M<SUP>d</SUP></I> &#8801; <I>C</I> (mod <I>N</I>),
<DD><B>c)</B>&nbsp;&nbsp;given integers <I>e</I> and <I>C</I>, find <I>M</I> such that <I>M<SUP>e</I></SUP> &#8801; <I>C</I> (mod <I>N</I>), or
<DD><B>d)</B>&nbsp;&nbsp;given an integer <I>x</I>, decide whether there exists an integer <I>y</I> such that <I>x</I> &#8801; <I>y</I><SUP>2</SUP> (mod <I>N</I>).
</DL>
</DL>
<P>According to Diffie [492,494], the Discrete Logarithm Problem was suggested by J. Gill, the Factoring Problem by Knuth, and the knapsack problem by Diffie himself.
</P>
<P>This narrowness in the mathematical foundations of public-key cryptography is worrisome. A breakthrough in either the problem of factoring or of calculating discrete logarithms could render whole classes of public-key algorithms insecure. Diffie points out [492,494] that this risk is mitigated by two factors:</P>
<BLOCKQUOTE><DL>
<DD><B>1.</B>&nbsp;&nbsp;The operations on which public key cryptography currently depends&#151;multiplying, exponentiating, and factoring&#151;are all fundamental arithmetic phenomena. They have been the subject of intense mathematical scrutiny for centuries and the increased attention that has resulted from their use in public key cryptosystems has on balance enhanced rather than diminished our confidence.
<DD><B>2.</B>&nbsp;&nbsp;Our ability to carry out large arithmetic computations has grown steadily and now permits us to implement our systems with numbers sufficient in size to be vulnerable only to a dramatic breakthrough in factoring, logarithms, or root extraction.
</DL>
</BLOCKQUOTE>
<P>As we have seen, not all public-key algorithms based on these problems are secure. The strength of any public-key algorithm depends on more than the computational complexity of the problem upon which it is based; a hard problem does not necessarily imply a strong algorithm. Adi Shamir listed three reasons why this is so [1415]:
</P>
<BLOCKQUOTE><DL>
<DD><B>1.</B>&nbsp;&nbsp;Complexity theory usually deals with single isolated instances of a problem. A cryptanalyst often has a large collection of statistically related problems to solve&#151;several ciphertexts encrypted with the same key.
<DD><B>2.</B>&nbsp;&nbsp;The computational complexity of a problem is typically measured by its worst-case or average-case behavior. To be useful as a cipher, the problem must be hard to solve in almost all cases.
<DD><B>3.</B>&nbsp;&nbsp;An arbitrarily difficult problem cannot necessarily be transformed into a cryptosystem, and it must be possible to insert trapdoor information into the problem so that a shortcut solution is possible with this information and only with this information.
</DL>
</BLOCKQUOTE>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="20-08.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch21/21-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人永久看片免费视频天堂| 美女视频黄免费的久久 | 日本va欧美va精品| 欧美日本精品一区二区三区| 日本欧美大码aⅴ在线播放| 欧美一卡二卡三卡| 国产精品一区二区在线看| 国产精品美女久久久久aⅴ| 99天天综合性| 亚洲成人手机在线| 欧美一区二区黄| 国产精品一区二区三区99| 国产精品丝袜一区| 欧美日韩亚洲综合在线 欧美亚洲特黄一级| 亚洲动漫第一页| 精品国产伦一区二区三区免费 | 日韩三级高清在线| 粉嫩av亚洲一区二区图片| 一级日本不卡的影视| 欧美一二区视频| 高清在线成人网| 午夜精品久久久久久久蜜桃app| 欧美成人精品二区三区99精品| 国产91丝袜在线播放九色| 亚洲狠狠爱一区二区三区| 欧美α欧美αv大片| av中文字幕一区| 日韩avvvv在线播放| 欧美国产禁国产网站cc| 欧美日本不卡视频| 成人免费高清视频在线观看| 亚洲成av人**亚洲成av**| 久久精品视频免费观看| 欧美丝袜第三区| 国产成人av电影| 日本成人在线不卡视频| 综合电影一区二区三区 | www.色精品| 毛片一区二区三区| 夜夜精品浪潮av一区二区三区| 久久综合中文字幕| 欧美日韩国产免费| 不卡一区二区三区四区| 美女精品自拍一二三四| 亚洲成人久久影院| 国产精品国产三级国产a| 亚洲精品一区二区三区99| 欧美色图激情小说| 精品国产精品一区二区夜夜嗨| 91视频观看视频| 国产成人自拍高清视频在线免费播放| 午夜伦欧美伦电影理论片| 国产精品电影一区二区| 久久这里只有精品视频网| 69久久99精品久久久久婷婷 | 亚洲成a天堂v人片| 亚洲精品视频自拍| 国产精品色呦呦| 国产欧美精品日韩区二区麻豆天美| 欧美人狂配大交3d怪物一区| 色偷偷成人一区二区三区91| 粉嫩av一区二区三区在线播放| 极品美女销魂一区二区三区免费| 五月婷婷欧美视频| 亚洲午夜精品17c| 亚洲精品精品亚洲| 亚洲蜜臀av乱码久久精品蜜桃| 欧美国产国产综合| 国产精品乱码人人做人人爱| 国产网站一区二区三区| 久久精品亚洲精品国产欧美 | 91亚洲永久精品| www.亚洲精品| 99精品视频免费在线观看| 成人午夜av影视| 成人午夜电影小说| av在线播放不卡| youjizz国产精品| 色激情天天射综合网| 色老汉一区二区三区| 欧美亚洲综合久久| 欧美喷潮久久久xxxxx| 欧美人成免费网站| 欧美一区二区视频网站| 欧美大胆一级视频| 久久久久久9999| 国产欧美日韩综合精品一区二区| 亚洲国产精品高清| 亚洲免费av观看| 五月天丁香久久| 蜜臀av性久久久久蜜臀aⅴ流畅| 久久不见久久见免费视频7| 国产精品中文字幕日韩精品| 国产1区2区3区精品美女| 91啪亚洲精品| 欧美日本一道本| 久久先锋影音av鲁色资源网| 国产精品天美传媒| 亚洲一区二区在线免费看| 日韩av网站在线观看| 国产精品91一区二区| 色综合欧美在线| 正在播放一区二区| 国产午夜亚洲精品理论片色戒| 亚洲日本成人在线观看| 日产精品久久久久久久性色| 国产伦精品一区二区三区视频青涩 | 美女www一区二区| 岛国精品在线播放| 欧美日免费三级在线| 欧美成人aa大片| 亚洲美女一区二区三区| 蜜桃久久av一区| 99久久综合色| 日韩一区二区三| 亚洲欧美另类在线| 麻豆中文一区二区| 色综合久久九月婷婷色综合| 日韩精品一区二区三区四区视频| 综合在线观看色| 麻豆专区一区二区三区四区五区| 99久久亚洲一区二区三区青草| 337p亚洲精品色噜噜噜| 国产精品国产自产拍高清av| 日韩精品久久久久久| 99r国产精品| 久久久三级国产网站| 亚洲国产欧美在线| 成人一级黄色片| 日韩一级大片在线| 一级女性全黄久久生活片免费| 国产一区二区在线观看视频| 欧美午夜在线一二页| 国产精品麻豆一区二区| 蜜臀91精品一区二区三区| 91福利在线看| 国产精品素人一区二区| 国内精品国产成人国产三级粉色| 欧美亚洲一区二区在线观看| 国产精品婷婷午夜在线观看| 久久99久久99小草精品免视看| 欧美综合天天夜夜久久| 国产精品色眯眯| 国产综合色产在线精品| 91精品国产综合久久香蕉的特点| 亚洲女爱视频在线| 成人一区二区三区视频| 久久久久99精品国产片| 美女视频黄免费的久久 | 91精品国产综合久久香蕉麻豆 | 久久综合久久鬼色| 奇米精品一区二区三区在线观看 | 免费观看一级特黄欧美大片| 欧美午夜精品一区二区三区| 亚洲精品视频自拍| thepron国产精品| 国产精品视频在线看| 国产91精品一区二区麻豆亚洲| 久久嫩草精品久久久精品| 加勒比av一区二区| 精品久久久久香蕉网| 久久精品国产澳门| 日韩精品中文字幕一区 | av电影在线观看一区| 欧美国产精品久久| 99精品视频一区| 亚洲女同女同女同女同女同69| 99在线热播精品免费| 亚洲精品视频一区| 色成人在线视频| 亚洲线精品一区二区三区| 欧美在线综合视频| 亚洲va天堂va国产va久| 91精品视频网| 久草中文综合在线| 久久久天堂av| 91婷婷韩国欧美一区二区| 亚洲精品少妇30p| 7777女厕盗摄久久久| 麻豆国产精品777777在线| 精品成人a区在线观看| 国产成人超碰人人澡人人澡| 国产精品久久久久久妇女6080 | 国产乱国产乱300精品| 久久久久久免费网| av一区二区三区黑人| 一区二区欧美视频| 日韩一区二区麻豆国产| 国产福利精品一区二区| 综合色中文字幕| 91精品国产黑色紧身裤美女| 国产精品一区二区三区四区| 亚洲欧洲成人av每日更新| 欧美系列在线观看| 久久精品国产精品青草| 国产精品高潮呻吟久久| 欧美网站大全在线观看| 久久精品国产久精国产爱| 中文字幕成人av| 欧美老女人第四色|