亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 19-08.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Public-Key Algorithms</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=19//-->
<!--PAGES=477-479//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="19-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="19-09.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>The solution is <I>b</I> = 3, and the signature is the pair: <I>a</I> = 6 and <I>b</I> = 3.</P>
<TABLE WIDTH="75%"><TH CAPTION COLSPAN="2" ALIGN="CENTER">Table 19.5<BR>ElGamal Signatures
<TR>
<TD COLSPAN="2"><HR>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT">
<TD ALIGN="LEFT"><B><I>Public Key:</I></B>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>p</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM">prime (can be shared among a group of users)
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>g</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM">&lt<I>p</I> (can be shared among a group of users)
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>y</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM">= <I>g<SUP>x</I></SUP> mod <I>p</I>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT">
<TD ALING="LEFT"><B><I>Private Key:</I></B>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>x</I>
<TD VALIGN="BOTTOM" ALIGN="LEFT">&lt<I>p</I>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT">
<TD ALIGN="LEFT"><B><I>Signing:</I></B>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>k</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM">choose at random, relatively prime to <I>p</I> - 1
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>a</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM">(signature) = <I>g<SUP>k</I></SUP> mod <I>p</I>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>b</I>
<TD VALIGN="BOTTOM" ALIGN="LEFT">(signature) such that <I>M</I> = (<I>xa</I> &#43; <I>kb</I>) mod (<I>p</I> - 1)
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT">
<TD ALIGN="LEFT"><B><I>Verifying:</I></B>
<TR>
<TD COLSPAN="2" ALIGN="LEFT">Accept as valid if <I>y<SUP>a</SUP>a<SUP>b</SUP></I> mod <I>p</I> = <I>g<SUP>M</SUP></I> mod <I>p</I>
<TR>
<TD COLSPAN="2"><HR>
</TABLE>
<P>To verify a signature, confirm that
</P>
<DL>
<DD><I>y<SUP>a</SUP>a<SUP>b</I></SUP> mod <I>p</I> = <I>g<SUP>M</I></SUP> mod <I>p</I>
<DD>3<SUP>6</SUP> 6<SUP>3</SUP> mod 11 = 2<SUP>5</SUP> mod 11
</DL>
<P>A variant of ElGamal for signatures is in [1377]. Thomas Beth invented a variant of the ElGamal scheme suitable for proofs of identity [146]. There are variants for password authentication [312], and for key exchange [773]. And there are thousands more (see Section 20.4).
</P>
<P><FONT SIZE="+1"><B><I>ElGamal Encryption</I></B></FONT></P>
<P>A modification of ElGamal can encrypt messages. To encrypt message <I>M</I>, first choose a random <I>k</I>, such that <I>k</I> is relatively prime to <I>p</I> - 1. Then compute</P>
<DL>
<DD><I>a</I> = <I>g<SUP>k</I></SUP> mod <I>p</I>
<DD><I>b</I> = <I>y<SUP>k</SUP>M</I> mod <I>p</I>
</DL>
<P>The pair, <I>a</I> and <I>b</I>, is the ciphertext. Note that the ciphertext is twice the size of the plaintext.</P>
<P>To decrypt <I>a</I> and <I>b</I>, compute</P>
<DL>
<DD><I>M</I> = <I>b</I>/<I>a<SUP>x</I></SUP> mod <I>p</I>
</DL>
<P>Since <I>a<SUP>x</SUP></I> &#8801; <I>g<SUP>kx</I></SUP> (mod <I>p</I>), and <I>b</I>/<I>a<SUP>x</I></SUP> &#8801; <I>y<SUP>k</SUP>M</I>/<I>a<SUP>x</I></SUP> &#8801; <I>g<SUP>xk</SUP>M/g<SUP>xk</I></SUP> &#8801; <I>M</I> (mod <I>p</I>), this all works (see Table 19.6). This is really the same as Diffie-Hellman key exchange (see Section 22.1), except that <I>y</I> is part of the key, and the encryption is multiplied by <I>y<SUP>k</I></SUP>.</P>
<P><FONT SIZE="+1"><B><I>Speed</I></B></FONT></P>
<P>Table 19.7 gives sample software speeds of ElGamal [918].
</P>
<TABLE WIDTH="75%"><TH CAPTION COLSPAN="2" ALIGN="CENTER">Table 19.6<BR>ElGamal Encryption
<TR>
<TD COLSPAN="2"><HR>
<TR>
<TD ALIGN="LEFT">
<TD ALIGN="LEFT"><B><I>Public Key:</I></B>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>p</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM">prime (can be shared among a group of users)
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>g</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM">&lt <I>p</I> (can be shared among a group of users)
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>y</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM"> = <I>g<SUP>x</I></SUP> mod <I>p</I>
<TR>
<TD ALIGN="LEFT">
<TD ALIGN="LEFT"><B><I>Private Key:</I></B>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>x</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM">&lt <I>p</I>
<TR>
<TD ALIGN="LEFT">
<TD ALIGN="LEFT"><B><I>Encrypting:</I></B>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>k</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM">choose at random, relatively prime to <I>p</I> - 1.
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>a</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM">(ciphertext) = <I>g<SUP>k</SUP></I> mod <I>p</I>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT"><I>b</I>
<TD ALIGN="LEFT" VALIGN="BOTTOM">(ciphertext) = <I>y<SUP>k</SUP>M</I> mod <I>p</I>
<TR>
<TD ALIGN="LEFT">
<TD ALIGN="LEFT"><B><I>Decrypting:</I></B>
<TR>
<TD COLSPAN="2" ALIGN="LEFT"><I>M</I> (plaintext) = <I>b</I>/<I>a<SUP>x</I></SUP> mod <I>p</I>
<TR>
<TD COLSPAN="2"><HR>
</TABLE>
<P><FONT SIZE="+1"><B><I>Patents</I></B></FONT></P>
<P>ElGamal is unpatented. But, before you go ahead and implement the algorithm, realize that PKP feels that this algorithm is covered under the Diffie-Hellman patent [718]. However, the Diffie-Hellman patent will expire on April 29, 1997, making ElGamal the first public-key cryptography algorithm suitable for encryption and digital signatures unencumbered by patents in the United States. I can hardly wait.
</P>
<H3><A NAME="Heading8"></A><FONT COLOR="#000077">19.7 McEliece</FONT></H3>
<P>In 1978 Robert McEliece developed a public-key cryptosystem based on algebraic coding theory [1041]. The algorithm makes use of the existence of a class of error-correcting codes, known as <B>Goppa codes</B>. His idea was to construct a Goppa code and disguise it as a general linear code. There is a fast algorithm for decoding Goppa codes, but the general problem of finding a code word of a given weight in a linear binary code is <B>NP-complete</B>. A good description of this algorithm can be found in [1233]; see also [1562]. Following is just a quick summary.</P>
<P>Let <I>d</I><SUB>H</SUB>(<I>x,y</I>) denote the Hamming distance between <I>x</I> and <I>y</I>. The numbers <I>n, k</I>, and <I>t</I> are system parameters.</P>
<P>The private key has three parts: <I>G&#146;</I> is a <I>k</I> * <I>n</I> generator matrix for a Goppa code that can correct <I>t</I> errors. <I>P</I> is an <I>n</I> * <I>n</I> permutation matrix. <I>S</I> is a <I>k</I> * <I>k</I> nonsingular matrix.</P>
<P>The public key is a <I>k</I> * <I>n</I> matrix <I>G: G</I> = <I>SG&#146;P</I>.</P>
<P>Plaintext messages are strings of <I>k</I> bits, in the form of <I>k</I>-element vectors over GF(2).</P>
<P>To encrypt a message, choose a random <I>n</I>-element vector over GF(2), <I>z</I>, with Hamming distance less than or equal to <I>t</I>.</P>
<DL>
<DD><I>c</I> = <I>mG</I> &#43; <I>z</I>
</DL>
<P>To decrypt the ciphertext, first compute <I>c&#146;</I> = <I>cP<SUP>-1</I></SUP>. Then, using the decoding algorithm for the Goppa code, find <I>m&#146;</I> such that <I>d</I><SUB>H</SUB>(<I>m&#146; G, c&#146;</I>) is less than or equal to <I>t</I>. Finally, compute <I>m</I> = <I>m&#146;S</I><SUP>-1</SUP>.</P>
<P>In his original paper, McEliece suggested that <I>n</I> = 1024, <I>t</I> = 50, and <I>k</I> = 524. These are the minimum values required for security.</P>
<TABLE WIDTH="75%"><TH CAPTION COLSPAN="4" ALIGN="CENTER">Table 19.7<BR>ElGamal Speeds for Different<BR>Modulus Lengths with a 160-bit<BR>Exponent (on a SPARC II)
<TR>
<TD COLSPAN="4"><HR>
<TR>
<TH WIDTH="25%" VALIGN="BOTTOM" ALIGN="LEFT">
<TH WIDTH="25%" VALIGN="BOTTOM" ALIGN="LEFT">512 bits
<TH WIDTH="25%" VALIGN="BOTTOM" ALIGN="LEFT">768 bits
<TH VALIGN="BOTTOM" ALIGN="LEFT">1024 bits
<TR>
<TD COLSPAN="4"><HR>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT">Encrypt
<TD VALIGN="BOTTOM" ALIGN="LEFT">0.33 sec
<TD VALIGN="BOTTOM" ALIGN="LEFT">0.80 sec
<TD VALIGN="BOTTOM" ALIGN="LEFT">1.09 sec
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT">Decrypt
<TD VALIGN="BOTTOM" ALIGN="LEFT">0.24 sec
<TD VALIGN="BOTTOM" ALIGN="LEFT">0.58 sec
<TD VALIGN="BOTTOM" ALIGN="LEFT">0.77 sec
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT">Sign
<TD VALIGN="BOTTOM" ALIGN="LEFT">0.25 sec
<TD VALIGN="BOTTOM" ALIGN="LEFT">0.47 sec
<TD VALIGN="BOTTOM" ALIGN="LEFT">0.63 sec
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT">Verify
<TD VALIGN="BOTTOM" ALIGN="LEFT">1.37 sec
<TD VALIGN="BOTTOM" ALIGN="LEFT">5.12 sec
<TD VALIGN="BOTTOM" ALIGN="LEFT">9.30 sec
<TR>
<TD COLSPAN="4"><HR>
</TABLE>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="19-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="19-09.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
天天综合日日夜夜精品| 国产精品成人免费在线| 国产精品资源在线看| 一区二区中文字幕在线| 欧美一区二区三区精品| 99精品久久99久久久久| 九一久久久久久| 亚洲成人在线免费| 中文字幕中文字幕一区二区| 精品日韩一区二区三区| 欧美日韩色一区| av一区二区久久| 国产精选一区二区三区| 亚洲第一福利一区| 亚洲色大成网站www久久九九| 欧美精品一区二区三区久久久| 欧美系列一区二区| 99国产欧美另类久久久精品| 国产精品一区二区黑丝| 蜜桃视频免费观看一区| 亚洲高清久久久| 一区二区三区视频在线观看| 国产精品毛片a∨一区二区三区| 精品国产一区二区三区不卡| 欧美另类videos死尸| 一本到三区不卡视频| 成人app下载| 成人美女在线视频| 国产91精品入口| 成人高清在线视频| 国产成人av一区| 国产成人免费在线观看| 国产麻豆精品theporn| 久久99热狠狠色一区二区| 免费精品视频在线| 蜜桃av噜噜一区| 麻豆免费看一区二区三区| 蜜臀久久99精品久久久画质超高清 | 国产精品一级二级三级| 免费欧美日韩国产三级电影| 蜜臀av性久久久久av蜜臀妖精| 青青草国产成人99久久| 免费观看91视频大全| 美日韩一区二区| 久草中文综合在线| 国产主播一区二区| 国产精品一区二区三区四区 | 欧美三级蜜桃2在线观看| 色婷婷综合久久久中文一区二区 | 精品国产在天天线2019| 精品噜噜噜噜久久久久久久久试看| 日韩欧美国产一区在线观看| 亚洲精品一线二线三线| 日韩av网站在线观看| 琪琪久久久久日韩精品| 蜜臀久久99精品久久久画质超高清 | 中文字幕第一页久久| 国产精品久久久久三级| 亚洲欧美aⅴ...| 午夜精品久久久久久久| 免费久久99精品国产| 国产高清在线精品| av在线一区二区三区| 91成人网在线| 日韩欧美国产一区二区三区 | 日韩一区二区在线播放| 亚洲精品一区二区三区影院| 国产欧美一区二区精品忘忧草 | 精品视频在线免费看| 91精品国产一区二区三区| 精品国产91久久久久久久妲己| 欧美激情一区二区三区全黄| 亚洲精品亚洲人成人网在线播放| 婷婷成人综合网| 国产一区二区免费看| 一本色道久久综合狠狠躁的推荐| 欧美福利视频一区| 久久久久高清精品| 亚洲夂夂婷婷色拍ww47| 蜜臀91精品一区二区三区| 成人毛片视频在线观看| 欧美在线免费视屏| 久久久久久影视| 一区二区欧美国产| 国产资源在线一区| 欧美综合一区二区三区| 日韩国产欧美在线视频| 懂色av一区二区三区免费观看| 欧美日本一区二区在线观看| 欧美国产日产图区| 视频一区欧美日韩| av电影一区二区| 欧美变态tickle挠乳网站| 亚洲黄色在线视频| 国产精品自拍三区| 欧美一区二区三区视频在线观看| 国产精品全国免费观看高清| 日本不卡视频在线观看| av亚洲产国偷v产偷v自拍| 欧美大片在线观看| 亚洲一二三四在线| 成人动漫一区二区| 精品日韩在线观看| 亚洲gay无套男同| 99国产精品国产精品久久| 亚洲精品在线网站| 免费在线观看日韩欧美| 欧美特级限制片免费在线观看| 国产蜜臀av在线一区二区三区| 日本不卡一二三| 欧美日韩五月天| 亚洲精品大片www| 不卡av在线免费观看| 久久香蕉国产线看观看99| 日本美女一区二区三区| 欧美午夜片在线观看| 亚洲天堂网中文字| 成人性生交大片免费看中文 | 亚洲精品成人精品456| 国产白丝精品91爽爽久久| 久久亚洲免费视频| 久久精品国产成人一区二区三区| 欧美日韩国产小视频在线观看| 亚洲男人的天堂网| 91一区二区三区在线观看| 日本一区二区免费在线| 国产精一区二区三区| 国产三级三级三级精品8ⅰ区| 国模一区二区三区白浆| 日韩视频免费观看高清完整版在线观看 | 欧美一区午夜精品| 亚洲成人你懂的| 欧美精品在欧美一区二区少妇| 一区二区免费视频| 欧美日韩一区二区在线视频| 亚洲自拍偷拍欧美| 欧美日韩你懂的| 日韩高清不卡一区二区三区| 欧美夫妻性生活| 精品在线视频一区| 久久精品水蜜桃av综合天堂| 国产老女人精品毛片久久| 国产清纯白嫩初高生在线观看91 | 色婷婷精品久久二区二区蜜臂av| 国产精品电影一区二区| 99这里只有精品| 亚洲精品伦理在线| 欧美私人免费视频| 秋霞成人午夜伦在线观看| 日韩欧美国产一区二区在线播放| 精品午夜久久福利影院| 国产女人水真多18毛片18精品视频| 成人av在线看| 一个色综合网站| 91精品国产综合久久精品性色| 奇米四色…亚洲| 久久精品亚洲一区二区三区浴池| 成人午夜激情在线| 亚洲精品国产第一综合99久久| 欧美日韩国产高清一区二区| 蜜桃精品视频在线观看| 久久综合国产精品| 成a人片亚洲日本久久| 一区二区三区高清在线| 91精品欧美综合在线观看最新| 九九精品视频在线看| 中文字幕av一区二区三区高| 色视频欧美一区二区三区| 天天综合网 天天综合色| 精品精品国产高清a毛片牛牛| 成人手机在线视频| 亚洲国产成人高清精品| 日韩精品一区二区三区视频| www.日韩在线| 日本美女视频一区二区| 国产欧美日韩中文久久| 欧亚一区二区三区| 国产精品1024| 亚洲国产wwwccc36天堂| 久久综合九色综合久久久精品综合| 91丝袜国产在线播放| 理论片日本一区| 亚洲色图另类专区| 精品sm在线观看| 一本大道久久a久久精品综合| 久久精品国产99久久6| 一区二区三区欧美激情| 亚洲精品一区二区三区在线观看 | 国产综合色精品一区二区三区| 亚洲精品国产一区二区精华液| 欧美本精品男人aⅴ天堂| 欧洲色大大久久| 国产99久久久久| 日韩成人一区二区| 亚洲视频一二区| 久久精品在线观看| 777欧美精品| 日本高清不卡视频| 国产一区二区三区日韩| 亚洲午夜av在线|