亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 20-08.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號(hào):
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Public-Key Digital Signature Algorithms</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=20//-->
<!--PAGES=498-500//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="20-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="20-09.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>All the variants are equally secure, so it makes sense to choose a scheme that is easy to compute with. The requirement to compute inverses slows most of these schemes. As it turns out, a scheme in this pile allows computing both the signature equation and the verification equation without inverses and also gives message recovery. It is called the <B>p-NEW</B> scheme [1184].</P>
<DL>
<DD><I>r</I> = <I>mg<SUP>-k</SUP></I> mod <I>p</I>
<DD><I>s</I> = <I>k</I> &#150; <I>r&#146;x</I> mod <I>q</I>
</DL>
<P>And <I>m</I> is recovered (and the signature verified) by</P>
<DL>
<DD><I>m</I> = <I>g<SUP>s</SUP>y<SUP>r&#146;</SUP>r</I> mod <I>p</I>
</DL>
<P>Some variants sign two and three message blocks at the same time [740]; other variants can be used for blind signatures [741].
</P>
<P>This is a remarkable piece of research. All of the various discrete-logarithm-based digital signature schemes have been put in one coherent framework. In my opinion this finally puts to rest any patent dispute between Schnorr [1398] and DSA [897]: DSA is not a derivative of Schnorr, nor even of ElGamal. All three are examples of this general construction, and this general construction is unpatented.</P>
<H3><A NAME="Heading6"></A><FONT COLOR="#000077">20.5 Ong-Schnorr-Shamir</FONT></H3>
<P>This signature scheme uses polynomials modulo <I>n</I> [1219,1220]. Choose a large integer <I>n</I> (you need not know the factorization of <I>n</I>). Then choose a random integer, <I>k</I>, such that <I>k</I> and <I>n</I> are relatively prime. Calculate <I>h</I> such that</P>
<DL>
<DD><I>h</I> = &#150;<I>k</I><SUP>-2</SUP> mod <I>n</I> = -(<I>k</I><SUP>-1</SUP>)<SUP>2</SUP> mod <I>n</I>
</DL>
<P>The public key is <I>h</I> and <I>n</I>; <I>k</I> is the private key.</P>
<P>To sign a message, <I>M</I>, first generate a random number, <I>r</I>, such that <I>r</I> and <I>n</I> are relatively prime. Then calculate:</P>
<DL>
<DD><I>S</I><SUB>1</SUB> = 1/2 * (<I>M</I>/<I>r</I> &#43; <I>r</I>) mod <I>n</I>
<DD><I>S</I><SUB>2</SUB> = <I>k</I>/2 * (<I>M</I>/<I>r</I> &#150; <I>r</I>) mod <I>n</I>
</DL>
<P>The pair, <I>S</I><SUB>1</SUB> and <I>S</I><SUB>2</SUB>, is the signature.</P>
<P>To verify a signature, confirm that</P>
<DL>
<DD><I>S</I><SUB>1</SUB><SUP>2</SUP> &#43; <I>h</I> * <I>S</I><SUB>2</SUB><SUP>2</SUP> &#8801; <I>M</I> (mod <I>n</I>)
</DL>
<P>The version of the scheme described here is based on quadratic polynomials. When it was first proposed in [1217], a $100 reward was offered for successful cryptanalysis. It was proved insecure [1255,18], but its authors were not deterred. They proposed a modification of the algorithm based on cubic polynomials, which is also insecure [1255]. The authors then proposed a quartic version, which was also broken [524,1255]. A variant which fixes these problems is in [1134].
</P>
<H3><A NAME="Heading7"></A><FONT COLOR="#000077">20.6 ESIGN</FONT></H3>
<P>ESIGN is a digital signature scheme from NTT Japan [1205,583]. It is touted as being at least as secure and considerably faster than either RSA or DSA, with similar key and signature lengths.
</P>
<P>The private key is a pair of large prime numbers, <I>p</I> and <I>q</I>. The public key is <I>n</I>, when</P>
<DL>
<DD><I>n</I> = <I>p</I><SUP>2</SUP><I>q</I>
</DL>
<P><I>H</I> is a hash function that operates on a message, <I>m</I>, such that <I>H</I>(<I>m</I>) is between 0 and <I>n</I> &#150; 1. There is also a security parameter, <I>k</I>, which will be discussed shortly.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice picks a random number <I>x</I>, where <I>x</I> is less than <I>pq</I>.
<DD><B>(2)</B>&nbsp;&nbsp;Alice computes:
<DL>
<DD><I>w</I>, the least integer that is larger than or equal to
<DD>(<I>H</I>(<I>m</I>) &#150; <I>x<SUP>k</I></SUP> mod <I>n</I>)/<I>pq</I>
<DD><I>s</I> = <I>x</I> &#43; ((<I>w</I>/<I>kx<SUP>k</I> - 1</SUP>) mod <I>p</I>)<I>pq</I>
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Alice sends <I>s</I> to Bob.
<DD><B>(4)</B>&nbsp;&nbsp;To verify the signature, Bob computes <I>s<SUP>k</I></SUP> mod <I>n</I>. He also computes <I>a</I>, which is the least integer larger than or equal to two times the number of bits of <I>n</I> divided by 3. If <I>H</I>(<I>m</I>) is less than or equal to <I>s<SUP>k</I></SUP> mod <I>n</I>, and if <I>s<SUP>k</I></SUP> mod <I>n</I> is less than <I>H</I>(<I>m</I>) &#43; 2<SUP><I>a</I></SUP>, then the signature is considered valid.
</DL>
<P>This algorithm works faster with precomputation. This precomputation can be done at any time and has nothing to do with the message being signed. After picking <I>x</I>, Alice could break step (2) into two partial steps. The first can be precomputed.</P>
<DL>
<DD><B>(2a)</B>&nbsp;&nbsp;Alice computes:
<DL>
<DD><I>u</I> = <I>x<SUP>k</I></SUP> mod <I>n</I>
<DD><I>v</I> = 1/(<I>kx<SUP>k</I> - 1</SUP>) mod <I>p</I>
</DL>
<DD><B>(2b)</B>&nbsp;&nbsp;Alice computes:
<DL>
<DD><I>w</I> = the least integer that is larger than or equal to
<DD>(<I>H</I>(<I>m</I>) &#150; <I>u</I>)/<I>pq</I>)
<DD><I>s</I> = <I>x</I> &#43; (<I>wv</I> mod <I>p</I>)<I>pq</I>
</DL>
</DL>
<P>For the size of numbers generally used, this precomputation speeds up the signature process by a factor of 10. Almost all the hard work is done in the precomputation stage. A discussion of modular arithmetic operations to speed ESIGN can be found in [1625,1624]. This algorithm can also be extended to work with elliptic curves [1206].
</P>
<P><FONT SIZE="+1"><B><I>Security of ESIGN</I></B></FONT></P>
<P>When this algorithm was originally proposed, <I>k</I> was set to 2 [1215]. This was quickly broken by Ernie Brickell and John DeLaurentis [261], who then extended their attack to <I>k</I> = 3. A modified version of this algorithm [1203] was broken by Shamir [1204]. The variant proposed in [1204] was broken in [1553]. ESIGN is the current incarnation of this family of algorithms. Another new attack [963] does not work against ESIGN.</P>
<P>The authors currently recommend these values for <I>k</I>: 8, 16, 32, 64, 128, 256, 512, and 1024. They also recommend that <I>p</I> and <I>q</I> each be of at least 192 bits, making <I>n</I> at least 576 bits long. (I think <I>n</I> should be twice that length.) With these parameters, the authors conjecture that ESIGN is as secure as RSA or Rabin. And their analysis shows favorable speed comparison to RSA, ElGamal, and DSA [582].</P>
<P><FONT SIZE="+1"><B><I>Patents</I></B></FONT></P>
<P>ESIGN is patented in the United States [1208], Canada, England, France, Germany, and Italy. Anyone who wishes to license the algorithm should contact Intellectual Property Department, NTT, 1&#150;6 Uchisaiwai-cho, 1-chome, Chiyada-ku, 100 Japan.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="20-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="20-09.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色婷婷综合久色| 日韩中文字幕一区二区三区| 亚洲欧美一区二区三区孕妇| 亚洲精品中文字幕乱码三区| 婷婷国产v国产偷v亚洲高清| 国内精品嫩模私拍在线| av影院午夜一区| 欧美日韩情趣电影| 久久精品视频一区| 亚洲天堂2014| 免费三级欧美电影| 成人黄色777网| 欧美久久一二区| 国产午夜亚洲精品理论片色戒| 亚洲男人的天堂在线aⅴ视频| 日韩电影免费一区| av激情成人网| 日韩视频一区在线观看| 国产精品全国免费观看高清| 亚洲成人免费av| 国产精品一二三在| 欧美日韩精品一二三区| 欧美高清在线精品一区| 性做久久久久久| 成人avav影音| 日韩欧美高清一区| 亚洲欧美另类久久久精品2019| 免费美女久久99| 91麻豆自制传媒国产之光| 欧美不卡123| 亚洲中国最大av网站| 国产精品99久| 欧美电影一区二区| 亚洲三级久久久| 国内精品第一页| 欧美一卡二卡在线| 一区二区三区四区五区视频在线观看| 韩国精品免费视频| 制服丝袜亚洲网站| 亚洲一线二线三线视频| 成人黄色片在线观看| 日韩午夜激情av| 亚洲国产精品欧美一二99| 成人app软件下载大全免费| 日韩欧美久久一区| 日韩国产在线观看| 欧美色图在线观看| 亚洲欧美日韩国产成人精品影院| 国产一二三精品| 日韩一级成人av| 亚洲国产精品一区二区久久恐怖片| 99re热视频这里只精品| 欧美国产国产综合| 国产精品综合视频| 日韩精品在线一区| 日本午夜一本久久久综合| 欧美三级电影网站| 亚洲美女免费在线| 91丨九色丨尤物| 国产精品久久久久一区二区三区| 国产伦理精品不卡| 337p粉嫩大胆色噜噜噜噜亚洲| 日本va欧美va精品发布| 欧美精品第1页| 午夜久久久久久久久久一区二区| 色婷婷av一区二区三区软件| 成人欧美一区二区三区小说| 成人综合在线观看| 久久久国产一区二区三区四区小说| 久久se精品一区二区| 日韩欧美亚洲国产另类| 久久福利资源站| 精品国产成人系列| 国内精品国产成人国产三级粉色 | 日本一区二区三区在线不卡| 国产在线播放一区三区四| 日韩欧美亚洲另类制服综合在线| 久久精品国产澳门| 精品国产91久久久久久久妲己 | 日韩欧美三级在线| 久久黄色级2电影| 久久综合色综合88| 国产精品资源站在线| 国产嫩草影院久久久久| 成人一级黄色片| 亚洲欧美在线观看| www.亚洲国产| 一区二区三区鲁丝不卡| 欧美性高清videossexo| 视频在线观看91| 精品国产一区二区在线观看| 国产麻豆成人传媒免费观看| 欧美激情一区二区三区四区| 不卡在线观看av| 一区二区在线免费| 欧美日韩一区成人| 激情综合色丁香一区二区| 久久久久久久久久久电影| av毛片久久久久**hd| 亚洲成人高清在线| 亚洲精品在线三区| 99vv1com这只有精品| 亚洲不卡一区二区三区| 日韩欧美国产一二三区| 成人免费毛片嘿嘿连载视频| 一区二区高清在线| 日韩一区二区在线看| 国产成人av福利| 一区二区三区 在线观看视频| 91 com成人网| 国产福利一区二区三区视频| 亚洲欧美日韩系列| 日韩一区二区在线免费观看| 成人免费黄色大片| 五月天网站亚洲| 久久精品一区二区| 欧美三级日韩在线| 国产成人免费在线观看不卡| 亚洲激情中文1区| 欧美成人video| 99久精品国产| 麻豆精品精品国产自在97香蕉| 欧美极品少妇xxxxⅹ高跟鞋| 欧美色综合网站| 国产东北露脸精品视频| 亚洲福利视频三区| 国产日产欧美一区二区三区| 欧美视频完全免费看| 国产精品综合视频| 日一区二区三区| 最新中文字幕一区二区三区| 91精品国产综合久久久久久久| 国产成人在线免费| 亚洲3atv精品一区二区三区| 欧美国产成人在线| 日韩精品一区二区三区四区| 91亚洲午夜精品久久久久久| 久久99国产精品麻豆| 樱花草国产18久久久久| 欧美—级在线免费片| 日韩一区二区三区三四区视频在线观看| 不卡视频在线看| 九九精品一区二区| 亚洲一区二区三区四区在线观看| 国产日韩成人精品| 欧美电影免费观看高清完整版在线| 日本大香伊一区二区三区| 国产成人鲁色资源国产91色综 | 91精品国产综合久久婷婷香蕉 | 亚洲综合一二区| 国产精品久久久久久久久快鸭| 日韩亚洲欧美高清| 欧美视频一区二区| 一本大道久久a久久精二百 | 国产精品不卡一区二区三区| 精品久久久久一区| 制服丝袜成人动漫| 在线观看亚洲a| 99在线热播精品免费| 国产美女一区二区| 免费的国产精品| 午夜精品久久久久久久| 一区二区三区色| 亚洲色图丝袜美腿| 国产欧美综合在线观看第十页| 日韩一区二区三区av| 欧美日韩精品一二三区| 在线观看日韩精品| 92国产精品观看| 成人免费高清视频| 成人性生交大片免费看中文 | 国产日产欧美一区二区三区 | 成人免费毛片aaaaa**| 国产精品1024久久| 国产一区二区影院| 久久99国产精品免费网站| 久久国产免费看| 精品一区二区在线播放| 久久av老司机精品网站导航| 久久超碰97中文字幕| 久久精品国产亚洲5555| 免费看欧美美女黄的网站| 日产精品久久久久久久性色| 偷拍一区二区三区| 青青草91视频| 久久99精品国产麻豆婷婷| 久久99精品久久久久婷婷| 精品亚洲欧美一区| 国产呦萝稀缺另类资源| 国产乱人伦精品一区二区在线观看| 精品在线免费视频| 国产精品影音先锋| 成人免费黄色大片| 91视频你懂的| 欧美午夜不卡在线观看免费| 欧美日韩aaaaa| 日韩美女在线视频 | 波多野结衣中文字幕一区| caoporn国产一区二区| 色老综合老女人久久久|