亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 10-01.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Using Algorithms</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=10//-->
<!--PAGES=213-215//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch09/09-09.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="10-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Chapter 10<BR>Using Algorithms
</FONT></H2>
<P>Think of security&#151;data security, communications security, information security, whatever&#151;as a chain. The security of the entire system is only as strong as the weakest link. Everything has to be secure: cryptographic algorithms, protocols, key management, and more. If your algorithms are great but your random-number generator stinks, any smart cryptanalyst is going to attack your system through the random-number generation. If you patch that hole but forget to securely erase a memory location that contains the key, a cryptanalyst will break your system via that route. If you do everything right and accidentally e-mail a copy of your secure files to <I>The Wall Street Journal</I>, you might as well not have bothered.</P>
<P>It&#146;s not fair. As the designer of a secure system, you have to think of every possible means of attack and protect against them all, but a cryptanalyst only has to find one hole in your security and exploit it.</P>
<P>Cryptography is only a part of security, and often a very small part. It is the mathematics of making a system secure, which is different from actually making a system secure. Cryptography has its &#147;size queens&#148;: people who spend so much time arguing about how long a key should be that they forget about everything else. If the secret police want to know what is on your computer, it is far easier for them to break into your house and install a camera that can record what is on your computer screen than it is for them to cryptanalze your hard drive.</P>
<P>Additionally, the traditional view of computer cryptography as &#147;spy versus spy&#148; technology is becoming increasingly inappropriate. Over 99 percent of the cryptography used in the world is not protecting military secrets; it&#146;s in applications such as bank cards, pay-TV, road tolls, office building and computer access tokens, lottery terminals, and prepayment electricity meters [43,44]. In these applications, the role of cryptography is to make petty crime slightly more difficult; the paradigm of the well-funded adversary with a rabbit warren of cryptanalysts and roomsful of computers just doesn&#146;t apply.</P>
<P>Most of those applications have used lousy cryptography, but successful attacks against them had nothing to do with cryptanalysis. They involved crooked employees, clever sting operations, stupid implementations, integration blunders, and random idiocies. (I strongly recommend Ross Anderson&#146;s paper, &#147;Why Cryptosytems Fail&#148; [44]; it should be required reading for anyone involved in this field.) Even the NSA has admitted that most security failures in its area of interest are due to failures in implementation, and not failures in algorithms or protocols [1119]. In these instances it didn&#146;t matter how good the cryptography was; the successful attacks bypassed it completely.</P>
<H3><A NAME="Heading2"></A><FONT COLOR="#000077">10.1 Choosing an Algorithm</FONT></H3>
<P>When it comes to evaluating and choosing algorithms, people have several alternatives:
</P>
<DL>
<DD><B>&#151;</B>&nbsp;&nbsp;They can choose a published algorithm, based on the belief that a published algorithm has been scrutinized by many cryptographers; if no one has broken the algorithm yet, then it must be pretty good.
<DD><B>&#151;</B>&nbsp;&nbsp;They can trust a manufacturer, based on the belief that a well-known manufacturer has a reputation to uphold and is unlikely to risk that reputation by selling equipment or programs with inferior algorithms.
<DD><B>&#151;</B>&nbsp;&nbsp;They can trust a private consultant, based on the belief that an impartial consultant is best equipped to make a reliable evaluation of different algorithms.
<DD><B>&#151;</B>&nbsp;&nbsp;They can trust the government, based on the belief that the government is trustworthy and wouldn&#146;t steer its citizens wrong.
<DD><B>&#151;</B>&nbsp;&nbsp;They can write their own algorithms, based on the belief that their cryptographic ability is second-to-none and that they should trust nobody but themselves.
</DL>
<P>Any of these alternatives is problematic, but the first seems to be the most sensible. Putting your trust in a single manufacturer, consultant, or government is asking for trouble. Most people who call themselves security consultants (even those from big-name firms) usually don&#146;t know anything about encryption. Most security product manufacturers are no better. The NSA has some of the world&#146;s best cryptographers working for it, but they&#146;re not telling all they know. They have their own interests to further which are not congruent with those of their citizens. And even if you&#146;re a genius, writing your own algorithm and then using it without any peer review is just plain foolish.
</P>
<P>The algorithms in this book are public. Most have appeared in the open literature and many have been cryptanalyzed by experts in the field. I list all published results, both positive and negative. I don&#146;t have access to the cryptanalysis done by any of the myriad military security organizations in the world (which are probably better than the academic institutions&#151;they&#146;ve been doing it longer and are better funded), so it is possible that these algorithms are easier to break than it appears. Even so, it is far more likely that they are more secure than an algorithm designed and implemented in secret in some corporate basement.</P>
<P>The hole in all this reasoning is that we don&#146;t know the abilities of the various military cryptanalysis organizations.</P>
<P>What algorithms can the NSA break? For the majority of us, there&#146;s really no way of knowing. If you are arrested with a DES-encrypted computer hard drive, the FBI is unlikely to introduce the decrypted plaintext at your trial; the fact that they can break an algorithm is often a bigger secret than any information that is recovered. During WWII, the Allies were forbidden from using decrypted German Ultra traffic unless they could have plausibly gotten the information elsewhere. The only way to get the NSA to admit to the ability to break a given algorithm is to encrypt something so valuable that its public dissemination is worth the admission. Or, better yet, create a really funny joke and send it via encrypted e-mail to shady characters in shadowy countries. NSA employees are people, too; I doubt even they can keep a good joke secret.</P>
<P>A good working assumption is that the NSA can read any message that it chooses, but that it cannot read all messages that it chooses. The NSA is limited by resources, and has to pick and choose among its various targets. Another good assumption is that they prefer breaking knuckles to breaking codes; this preference is so strong that they will only resort to breaking codes when they wish to preserve the secret that they have read the message.</P>
<P>In any case, the best most of us can do is to choose among public algorithms that have withstood a reasonable amount of public scrutiny and cryptanalysis.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch09/09-09.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="10-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美一区二区在线不卡| 欧美日韩国产天堂| 日本伊人午夜精品| 国产精品色在线| 亚洲午夜电影在线观看| 久久色在线观看| 欧美高清视频一二三区| 波波电影院一区二区三区| 日韩精品1区2区3区| 中文字幕日韩欧美一区二区三区| 欧美一区日韩一区| 欧洲精品在线观看| 国产成人亚洲精品狼色在线| 日本在线播放一区二区三区| 亚洲人精品午夜| 国产精品无码永久免费888| 日韩一区二区三区四区五区六区| 日本韩国欧美国产| 99re亚洲国产精品| 国产69精品久久99不卡| 久久精品国产精品亚洲红杏 | 国产精品久久久久久久久果冻传媒| 欧美日韩在线一区二区| 99re这里都是精品| 成人国产一区二区三区精品| 国产在线一区观看| 九九国产精品视频| 日本午夜精品视频在线观看 | 亚洲一区影音先锋| 亚洲欧洲精品一区二区精品久久久| 久久在线观看免费| 日韩小视频在线观看专区| 欧美日韩高清一区二区| 91黄色在线观看| 91成人网在线| 欧美影视一区在线| 欧美无砖专区一中文字| 欧美视频精品在线| 一区二区三区在线视频观看58| 国产精品久久久久一区 | 日韩欧美精品在线| 欧美一区二区三区视频免费播放| 欧美日韩免费观看一区二区三区| 欧美午夜片在线看| 欧美日本在线视频| 欧美一区二区性放荡片| 欧美xxxxxxxxx| 欧美电视剧在线看免费| 欧美电影免费观看高清完整版在线| 欧美一级日韩不卡播放免费| 51午夜精品国产| 精品国产伦一区二区三区观看体验| 欧美一区二区三区喷汁尤物| 91精品国产一区二区三区| 日韩欧美精品在线| 国产目拍亚洲精品99久久精品| 国产亚洲精品精华液| 中日韩av电影| 亚洲乱码国产乱码精品精可以看| 色老汉一区二区三区| 在线观看日韩一区| 91精品麻豆日日躁夜夜躁| 精品国产麻豆免费人成网站| 欧美高清在线一区二区| 亚洲精品一卡二卡| 天使萌一区二区三区免费观看| 日韩国产精品久久久久久亚洲| 久久超级碰视频| 成人晚上爱看视频| 欧美日韩一区中文字幕| 日韩精品一区二区三区视频在线观看| 久久午夜国产精品| 亚洲欧洲av另类| 日日骚欧美日韩| 国产精品911| 欧洲视频一区二区| 欧美成人午夜电影| 中文字幕一区二区在线观看| 午夜视频一区二区| 国产成人精品免费在线| 欧美日韩中字一区| 国产日产精品一区| 天堂成人国产精品一区| 成人性生交大合| 69av一区二区三区| 成人欧美一区二区三区1314| 五月婷婷激情综合| 成人av网站在线观看免费| 欧美日本不卡视频| 国产精品国产三级国产aⅴ原创| 午夜电影一区二区| 成人在线一区二区三区| 在线不卡中文字幕| ...av二区三区久久精品| 秋霞影院一区二区| 91福利视频网站| 国产一区二区在线看| 色悠悠亚洲一区二区| 欧美大片在线观看一区二区| 日韩久久一区二区| 国产激情91久久精品导航| 欧美精品第1页| 亚洲久本草在线中文字幕| 国产精品99久久久| 日韩视频在线观看一区二区| 亚洲精品成人在线| 成人一区二区三区在线观看| 日韩欧美一区在线| 亚洲国产精品久久久久婷婷884| 国产经典欧美精品| 亚洲精品在线一区二区| 日韩主播视频在线| 欧美怡红院视频| 亚洲图片你懂的| 成人精品一区二区三区四区| 久久综合色婷婷| 老汉av免费一区二区三区| 欧美精选一区二区| 亚洲小说欧美激情另类| 99re这里只有精品视频首页| 国产亚洲精久久久久久| 黑人精品欧美一区二区蜜桃| 日韩视频一区在线观看| 日韩国产精品大片| 91精品国产手机| 五月婷婷欧美视频| 欧美精品在线视频| 三级久久三级久久久| 欧美日韩国产综合一区二区| 亚洲伊人伊色伊影伊综合网| 91福利精品视频| 亚洲欧美一区二区三区孕妇| www.亚洲激情.com| 中文字幕在线不卡一区二区三区| 成人少妇影院yyyy| 中文字幕av在线一区二区三区| 懂色av一区二区三区免费看| 国产欧美日韩在线视频| 成人福利在线看| 1区2区3区国产精品| a级精品国产片在线观看| 中文字幕在线观看一区| 色综合天天综合网天天看片| 亚洲精选免费视频| 欧美婷婷六月丁香综合色| 亚洲国产欧美另类丝袜| 91精品蜜臀在线一区尤物| 老司机精品视频导航| 久久精品夜夜夜夜久久| jiyouzz国产精品久久| 一区二区三区在线观看视频 | 欧美日韩久久一区| 日日夜夜免费精品| 2020国产成人综合网| 成人性生交大片免费看中文| 亚洲男人天堂一区| 欧美日韩国产在线观看| 日韩影院精彩在线| 久久综合丝袜日本网| av一区二区三区四区| 亚洲一二三四在线| 日韩免费高清av| 成人精品视频一区二区三区 | 日韩成人精品在线观看| 精品成a人在线观看| 99国产精品久久久久久久久久久| 亚洲午夜久久久久久久久电影网| 五月天中文字幕一区二区| 欧美成人性战久久| 93久久精品日日躁夜夜躁欧美| 亚洲午夜电影在线观看| 久久影院电视剧免费观看| 91在线一区二区| 免费在线观看一区| 日本一区二区三区电影| 欧美日韩高清一区| 成人一区二区三区在线观看| 亚洲一线二线三线视频| 精品国产三级电影在线观看| 91麻豆精东视频| 麻豆一区二区99久久久久| 一色屋精品亚洲香蕉网站| 欧美一区二区在线观看| 本田岬高潮一区二区三区| 日韩avvvv在线播放| 国产精品三级久久久久三级| 91精品国产综合久久国产大片 | 国产乱人伦偷精品视频免下载| 亚洲天堂福利av| 亚洲精品一区二区在线观看| 在线这里只有精品| 国产ts人妖一区二区| 免费在线欧美视频| 亚洲女同一区二区| 欧美精品一区二区精品网| 欧美最猛黑人xxxxx猛交| 粗大黑人巨茎大战欧美成人| 日本在线不卡一区| 亚洲一二三四久久| 国产精品乱人伦|