亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 09-06.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Algorithm Types and Modes</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=09//-->
<!--PAGES=202-205//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="09-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="09-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Synchronous stream ciphers also protect against any insertions and deletions in the ciphertext, because these cause a loss of synchronization and will be immediately detected. They do not, however, fully protect against bit toggling. Like block ciphers in CFB mode, Mallory can toggle individual bits in the stream. If he knows the plaintext, he can make those bits decrypt to whatever he wants. Subsequent bits will decrypt correctly, so in certain applications Mallory can still do considerable damage.
</P>
<P><FONT SIZE="+1"><B><I>Insertion Attack</I></B></FONT></P>
<P>Synchronous stream ciphers are vulnerable to an <B>insertion attack</B> [93]. Mallory has recorded a ciphertext stream, but does not know the plaintext or the keystream used to encrypt the plaintext.</P>
<!-- CODE SNIP //-->
<PRE>
     Original plaintext:    <I>p</I><SUB>1</SUB> <I>p</I><SUB>2</SUB> <I>p</I><SUB>3</SUB> <I>p</I><SUB>4</SUB> ...
     Original keystream:    <I>k</I><SUB>1</SUB> <I>k</I><SUB>2</SUB> <I>k</I><SUB>3</SUB> <I>k</I><SUB>4</SUB> ...
     Original ciphertext:   <I>c</I><SUB>1</SUB> <I>c</I><SUB>2</SUB> <I>c</I><SUB>3</SUB> <I>c</I><SUB>4</SUB> ...
</PRE>
<!-- END CODE SNIP //-->
<P>Mallory inserts a single known bit, <I>p&#146;</I>, into the plaintext after p1 and then manages to get the modified plaintext encrypted with the same keystream. He records the resultant new ciphertext:</P>
<!-- CODE SNIP //-->
<PRE>
New plaintext:           <I>p</I><SUB>1</SUB>    <I>p</I>&#146;   <I>p</I><SUB>2</SUB>    <I>p</I><SUB>3</SUB>    <I>p</I><SUB>4</SUB>    ...
Original keystream:      <I>k</I><SUB>1</SUB>    <I>k</I><SUB>2</SUB>    <I>k</I><SUB>3</SUB>    <I>k</I><SUB>4</SUB>    <I>k</I><SUB>5</SUB>    ...
Updated ciphertext:      <I>c</I><SUB>1</SUB>    <I>c</I>&#146;<SUB>2</SUB>   <I>c</I>&#146;<SUB>3</SUB>   <I>c</I>&#146;<SUB>4</SUB>   <I>c</I>&#146;<SUB>5</SUB>      ...
</PRE>
<!-- END CODE SNIP //-->
<P>Assuming he knows the value of <I>p&#146;</I>, he can determine the entire plaintext after that bit from the original ciphertext and new ciphertext:</P>
<!-- CODE SNIP //-->
<PRE>
<I>k</I><SUB>2</SUB> = <I>c</I>&#146;<SUB>2</SUB> &#8853; <I>p</I>&#146;, and then <I>p</I><SUB>2</SUB> = <I>c</I><SUB>2</SUB> &#8853; <I>k</I><SUB>2</SUB>
<I>k</I><SUB>3</SUB> = <I>c</I>&#146;<SUB>3</SUB> &#8853; <I>p</I><SUB>2</SUB>, and then <I>p</I><SUB>3</SUB> = <I>c</I><SUB>3</SUB> &#8853; <I>k</I><SUB>3</SUB>
<I>k</I><SUB>4</SUB> = <I>c</I>&#146;<SUB>4</SUB> &#8853; <I>p</I><SUB>3</SUB>, and then <I>p</I><SUB>4</SUB> = <I>c</I><SUB>4</SUB> &#8853; <I>k</I><SUB>4</SUB>
</PRE>
<!-- END CODE SNIP //-->
<P>Mallory doesn&#146;t even have to know the exact position in which the bit was inserted; he can just compare the original and updated ciphertexts to see where they begin to differ. To protect against this attack, never use the same keystream to encrypt two different messages.
</P>
<H3><A NAME="Heading9"></A><FONT COLOR="#000077">9.8 Output-Feedback Mode</FONT></H3>
<P><B>Output-feedback (OFB)</B> mode is a method of running a block cipher as a synchronous stream cipher. It is similar to CFB mode, except that <I>n</I> bits of the previous output block are moved into the right-most positions of the queue (see Figure 9.11). Decryption is the reverse of this process. This is called <I>n-</I>bit OFB. On both the encryption and the decryption sides, the block algorithm is used in its encryption mode. This is sometimes called <B>internal feedback</B>, because the feedback mechanism is independent of both the plaintext and the ciphertext streams [291].</P>
<P>If <I>n</I> is the block size of the algorithm, then <I>n-</I>bit OFB looks like (see Figure 9.12):</P>
<DL>
<DD><I>C</I><SUB>i</SUB> = <I>P</I><SUB>i</SUB> &#8853; <I>S</I><SUB>i</SUB>; <I>S</I><SUB>i</SUB> = <I>E</I><SUB>K</SUB>(<I>S</I><SUB>i-1</SUB>)
<DD><I>P</I><SUB>i</SUB> = <I>C</I><SUB>i</SUB> &#8853; <I>S</I><SUB>1</SUB>; <I>S</I><SUB>i</SUB> = <I>E</I><SUB>K</SUB>(<I>S</I><SUB>i-1</SUB>)
</DL>
<I><P><A NAME="Fig11"></A><A HREF="javascript:displayWindow('images/09-11.jpg',309,155 )"><IMG SRC="images/09-11t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/09-11.jpg',309,155)"><FONT COLOR="#000077"><B>Figure 9.11</B></FONT></A>&nbsp;&nbsp;8-bit output-feedback mode.</I>
</P>
<P><I>S</I><SUB>i</SUB> is the state, which is independent of either the plaintext or the ciphertext.</P>
<P>One nice feature of OFB mode is that most of the work can occur offline, before the plaintext message even exists. When the message finally arrives, it can be XORed with the output of the algorithm to produce the ciphertext.</P>
<P><FONT SIZE="+1"><B><I>Initialization Vector</I></B></FONT></P>
<P>The OFB shift register must also be initially loaded with an IV. It should be unique but does not have to be secret.
</P>
<P><FONT SIZE="+1"><B><I>Error Propagation</I></B></FONT></P>
<P>OFB mode has no error extension. A single-bit error in the ciphertext causes a single-bit error in the recovered plaintext. This can be useful in some digitized analog transmissions, like digitized voice or video, where the occasional single-bit error can be tolerated but error extension cannot.
</P>
<P>On the other hand, a loss of synchronization is fatal. If the shift registers on the encryption end and the decryption end are not identical, then the recovered plaintext will be gibberish. Any system that uses OFB mode must have a mechanism for detecting a synchronization loss and a mechanism to fill both shift registers with a new (or the same) IV to regain synchronization.</P>
<I><P><A NAME="Fig12"></A><A HREF="javascript:displayWindow('images/09-12.jpg',178,102 )"><IMG SRC="images/09-12t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/09-12.jpg',178,102)"><FONT COLOR="#000077"><B>Figure 9.12</B></FONT></A>&nbsp;&nbsp;</I>n-<I>bit OFB with an</I> n-<I>bit algorithm.</I>
</P>
<P><FONT SIZE="+1"><B><I>Security Problems with OFB</I></B></FONT></P>
<P>An analysis of OFB mode [588,430,431,789] demonstrates that OFB should be used only when the feedback size is the same as the block size. For example, you should only use a 64-bit algorithm in 64-bit OFB mode. Even though the U.S. government authorizes other feedback sizes for DES [1143], avoid them.
</P>
<P>OFB mode XORs a keystream with the text. This keystream will eventually repeat. It is important that it does not repeat with the same key; otherwise, there is no security. When the feedback size equals the block size, the block cipher acts as a permutation of <I>m</I>-bit values (where <I>m</I> is the block length) and the average cycle length is 2<SUP><I>m</I></SUP>- 1. For a 64-bit block length, this is a very long number. When the feedback size <I>n</I> is less than the block length, the average cycle length drops to around 2<SUP><I>m</I>/2</SUP>. For a 64-bit block cipher, this is only 2<SUP>32</SUP>&#151;not long enough.</P>
<P><FONT SIZE="+1"><B><I>Stream Ciphers in OFB</I></B></FONT></P>
<P>A stream cipher can also run in OFB mode. In this case, the key affects the next-state function (see Figure 9.13). The output function does not depend on the key; very often it is something simple like a single bit of the internal state or the XOR of multiple bits of the internal state. The cryptographic complexity is in the next-state function; this function is key-dependent. This method is also called internal feedback [291], because the feedback mechanism is internal to the key generation algorithm.
</P>
<P>In a variant of this mode, the key determines just the initial state of the keystream generator. After the key sets the internal state of the generator, the generator runs undisturbed from then on.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="09-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="09-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲色欲色欲www| 午夜精品福利久久久| 亚洲欧美一区二区视频| 亚洲欧美日韩国产综合| 久久综合色8888| 中文字幕免费不卡在线| 亚洲伦在线观看| 日本女优在线视频一区二区| aaa亚洲精品| 91精品综合久久久久久| 国产精品久久毛片| 亚洲精品第一国产综合野| 日本亚洲一区二区| 久久99精品国产.久久久久久 | 精品系列免费在线观看| 日本午夜精品视频在线观看| youjizz久久| 日韩一级成人av| 亚洲线精品一区二区三区| 国产精品69毛片高清亚洲| 在线中文字幕一区| 国产午夜精品久久久久久久| 亚洲精品日韩专区silk| 国产成人综合精品三级| 欧洲亚洲精品在线| 中文字幕精品一区二区三区精品 | 日韩精品一区在线| 亚洲一区二区欧美激情| 不卡一区二区三区四区| 久久久亚洲精华液精华液精华液| 五月婷婷综合网| 国产精品88av| 久久综合色8888| 免费成人在线播放| 色94色欧美sute亚洲线路一久 | 亚洲午夜免费福利视频| 97精品久久久久中文字幕| 亚洲成人7777| 欧美大胆人体bbbb| 久久天天做天天爱综合色| 欧美日韩高清在线播放| 日韩欧美色综合网站| 亚洲国产你懂的| 99久久精品国产麻豆演员表| 久久精品人人爽人人爽| 国内精品在线播放| 精品国产一区二区三区四区四| 欧美激情一区二区三区蜜桃视频| 国内不卡的二区三区中文字幕 | 久久午夜免费电影| 五月天一区二区| 欧美三级蜜桃2在线观看| 亚洲福利一二三区| 91在线一区二区三区| 欧美极品少妇xxxxⅹ高跟鞋| 91在线观看污| 国产麻豆精品95视频| 麻豆国产91在线播放| 日av在线不卡| 国产精品资源站在线| 成人久久18免费网站麻豆| 国产成人免费av在线| 丁香婷婷综合色啪| 欧美色图免费看| 精品日韩在线观看| 国产精品色呦呦| 午夜激情综合网| 91在线一区二区三区| 日韩亚洲欧美一区| 亚洲精品五月天| 波多野结衣一区二区三区| 3d成人动漫网站| 精品国产91乱码一区二区三区| 尤物在线观看一区| 国产成人在线免费| 精品国产91洋老外米糕| 午夜精品一区二区三区免费视频| 精品在线一区二区三区| 欧美日韩在线三级| 国产欧美日韩精品一区| 麻豆精品一区二区av白丝在线| 91极品美女在线| 国产欧美日韩三级| 成人午夜精品一区二区三区| 精品久久国产字幕高潮| 久久精品99国产精品| 欧美一卡二卡三卡| 亚洲美女屁股眼交| 欧美探花视频资源| 性做久久久久久免费观看| 欧美影视一区在线| 免费成人在线视频观看| 国产精品护士白丝一区av| aaa亚洲精品| 国产电影一区在线| 久久国产三级精品| 国产精品天干天干在观线| 欧美在线free| 91黄色小视频| 欧美亚洲愉拍一区二区| 91蜜桃在线免费视频| 成人av电影在线观看| 亚洲第一久久影院| 国产老肥熟一区二区三区| 综合av第一页| 欧美理论片在线| 成熟亚洲日本毛茸茸凸凹| 亚洲成av人在线观看| 久久综合国产精品| 欧美日韩和欧美的一区二区| 国产酒店精品激情| 久久国产精品72免费观看| 亚洲亚洲精品在线观看| 国产精品久久看| 欧美精品少妇一区二区三区| 国产91丝袜在线18| 麻豆精品新av中文字幕| 亚洲成人资源在线| 亚洲一区二区不卡免费| 国产片一区二区| 国产欧美日韩在线| 精品99一区二区三区| 欧美v日韩v国产v| 91麻豆精品国产91久久久使用方法| 亚洲三级免费观看| 亚洲小少妇裸体bbw| 日本aⅴ亚洲精品中文乱码| 国产精品一区二区在线看| 国产又黄又大久久| 欧美亚洲免费在线一区| 91麻豆精品国产91久久久久久久久 | 欧美视频你懂的| 国产成人亚洲综合a∨猫咪| 亚洲精品欧美激情| 丝瓜av网站精品一区二区| 久久成人精品无人区| 丁香亚洲综合激情啪啪综合| fc2成人免费人成在线观看播放| 色综合久久综合网欧美综合网| 欧美一级黄色录像| 亚洲欧洲成人精品av97| 日本特黄久久久高潮| 91免费版在线看| 国产日本亚洲高清| 日本不卡中文字幕| 在线欧美一区二区| 亚洲欧洲在线观看av| 国产精品12区| 337p日本欧洲亚洲大胆精品| 亚洲成人资源在线| 欧美在线短视频| 一区二区三区丝袜| 91福利小视频| 亚洲精品免费在线| 色综合久久久久久久| 亚洲视频一二区| jizzjizzjizz欧美| 日本一区二区三区四区在线视频 | 国产不卡视频一区二区三区| 日韩一本二本av| 奇米777欧美一区二区| 欧美精品乱码久久久久久按摩| 亚洲成人一区二区| 日韩午夜在线影院| 国产xxx精品视频大全| 国产精品久久久久一区二区三区| 国产一区二区h| 中文字幕一区二区在线观看| 91久久精品网| 久久99精品久久久| 亚洲色图第一区| 在线观看91精品国产麻豆| 美女久久久精品| 国产精品久久久久久久午夜片| 99re在线视频这里只有精品| 亚洲综合色自拍一区| www国产成人免费观看视频 深夜成人网| 免费不卡在线视频| 亚洲欧美视频在线观看视频| 在线播放91灌醉迷j高跟美女| 国产在线一区二区综合免费视频| 国产免费成人在线视频| 欧美在线免费视屏| 国产成人综合亚洲91猫咪| 一区二区三区在线观看欧美| 欧美mv日韩mv| 欧美日韩一区二区在线视频| 国产精品影音先锋| 日本vs亚洲vs韩国一区三区| 中文字幕一区二区三区不卡| 久久人人97超碰com| 欧美一级夜夜爽| 宅男在线国产精品| 欧美网站大全在线观看| av午夜一区麻豆| 成人免费福利片| 丰满少妇在线播放bd日韩电影| 麻豆国产欧美一区二区三区| 午夜国产精品一区| 日一区二区三区|