亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 09-03.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Algorithm Types and Modes</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=09//-->
<!--PAGES=194-197//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="09-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="09-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Some messages have a common header: a letterhead, or a &#147;From&#148; line, or whatever. While block replay would still be impossible, this identical beginning might give a cryptanalyst some useful information.
</P>
<P>Prevent this by encrypting random data as the first block. This block of random data is called the <B>initialization vector</B> (<B>IV</B>), initializing variable, or initial chaining value. The IV has no meaning; it&#146;s just there to make each message unique. When the receiver decrypts this block, he just uses it to fill the feedback register and otherwise ignores it. A timestamp often makes a good IV. Otherwise, use some random bits from someplace.</P>
<P>With the addition of IVs, identical plaintext messages encrypt to different ciphertext messages. Thus, it is impossible for an eavesdropper to attempt block replay, and more difficult for him to build a code book. While the IV should be unique for each message encrypted with the same key, it is not an absolute requirement.</P>
<P>The IV need not be secret; it can be transmitted in the clear with the ciphertext. If this seems wrong, consider the following argument. Assume that we have a message of several blocks: <I>B</I><SUB>1,</SUB> <I>B</I><SUB>2</SUB>,..., <I>B</I><SUB>i</SUB>. <I>B</I><SUB>1</SUB> is encrypted with the IV. <I>B</I><SUB>2</SUB> is encrypted using the ciphertext of <I>B</I><SUB>1</SUB> as the IV. <I>B</I><SUB>3</SUB> is encrypted using the ciphertext of <I>B</I><SUB>2</SUB> as the IV, and so on. So, if there are <I>n</I> blocks, there are <I>n-</I>1 exposed &#147;IVs,&#148; even if the original IV is kept secret. So there&#146;s no reason to keep the IV secret; the IV is just a dummy ciphertext block&#151;you can think of it as <I>B</I><SUB>0</SUB> to start the chaining.</P>
<P><FONT SIZE="+1"><B><I>Padding</I></B></FONT></P>
<P>Padding works just like ECB mode, but in some applications the ciphertext has to be exactly the same size as the plaintext. Perhaps a plaintext file has to be encrypted and then replaced in the exact same memory location. In this case, you have to encrypt the last short block differently. Assume the last block has <I>j</I> bits. After encrypting the last full block, encrypt the ciphertext again, select the left-most <I>j</I> bits of the encrypted ciphertext, and XOR that with the short block to generate the ciphertext. Figure 9.4 illustrates this.</P>
<P>The weakness here is that while Mallory cannot recover the last plaintext block, he can change it systematically by changing individual bits in the ciphertext. If the last few bits of the ciphertext contain essential information, this is a weakness. If the last bits simply contain housekeeping information, it isn&#146;t a problem.</P>
<P>Ciphertext stealing is a better way (see Figure 9.5) [402]. <I>P</I><SUB>n-1</SUB> is the last full plaintext block, and <I>P</I><SUB>n</SUB> is the final, short, plaintext block. <I>C</I><SUB>n-1</SUB> is the last full ciphertext block, and <I>C</I><SUB>n</SUB> is the final, short, ciphertext block. <I>C&#146;</I> is just an intermediate result and is not part of the transmitted ciphertext. The benefit of this method is that all the bits of the plaintext message go through the encryption algorithm.</P>
<P><FONT SIZE="+1"><B><I>Error Propagation</I></B></FONT></P>
<P>CBC mode can be characterized as <B>feedback</B> of the ciphertext at the encryption end and <B>feedforward</B> of the ciphertext at the decryption end. This has implications having to do with errors. A single bit error in a plaintext block will affect that ciphertext block and all subsequent ciphertext blocks. This isn&#146;t significant because decryption will reverse that effect, and the recovered plaintext will have the same single error.</P>
<P>Ciphertext errors are more common. They can easily result from a noisy communications path or a malfunction in the storage medium. In CBC mode, a single-bit error in the ciphertext affects one block and one bit of the recovered plaintext. The block containing the error is completely garbled. The subsequent block has a 1-bit error in the same bit position as the error.</P>
<I><P><A NAME="Fig4"></A><A HREF="javascript:displayWindow('images/09-04.jpg',262,132 )"><IMG SRC="images/09-04t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/09-04.jpg',262,132)"><FONT COLOR="#000077"><B>Figure 9.4</B></FONT></A>&nbsp;&nbsp;Encrypting the last short block in CBC mode.</I>
<I></P>
<P><A NAME="Fig5"></A><A HREF="javascript:displayWindow('images/09-05.jpg',271,119 )"><IMG SRC="images/09-05t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/09-05.jpg',271,119)"><FONT COLOR="#000077"><B>Figure 9.5</B></FONT></A>&nbsp;&nbsp;Ciphertext stealing in CBC mode.</I>
</P>
<P>This property of taking a small ciphertext error and converting it into a large plaintext error is called <B>error extension</B>. It is a major annoyance. Blocks after the second are not affected by the error, so CBC mode is <B>self-recovering</B>. Two blocks are affected by an error, but the system recovers and continues to work correctly for all subsequent blocks. CBC is an example of a block cipher being used in a self-synchronizing manner, but only at the block level.</P>
<P>While CBC mode recovers quickly from bit errors, it doesn&#146;t recover at all from synchronization errors. If a bit is added or lost from the ciphertext stream, then all subsequent blocks are shifted one bit out of position and decryption will generate garbage indefinitely. Any cryptosystem that uses CBC mode must ensure that the block structure remains intact, either by framing or by storing data in multiple-block-sized chunks.</P>
<P><FONT SIZE="+1"><B><I>Security Problems</I></B></FONT></P>
<P>Some potential problems are caused by the structure of CBC. First, because a ciphertext block affects the following block in a simple way, Mallory can add blocks to the end of an encrypted message without being detected. Sure, it will probably decrypt to gibberish, but in some situations this is undesirable.
</P>
<P>If you are using CBC, you should structure your plaintext so that you know where the message ends and can detect the addition of extra blocks.</P>
<P>Second, Mallory can alter a ciphertext block to introduce controlled changes in the following decrypted plaintext block. For example, if Mallory toggles a single ciphertext bit, the entire block will decrypt incorrectly, but the following block will have a 1-bit error in the corresponding bit position. There are situations where this is desirable. The entire plaintext message should include some kind of controlled redundancy or authentication.</P>
<P>Finally, although plaintext patterns are concealed by chaining, very long messages will still have patterns. The birthday paradox predicts that there will be identical blocks after 2<SUP><I>m</I>/2</SUP> blocks, where <I>m</I> is the block size. For a 64-bit block size, that&#146;s about 34 gigabytes. A message has to be pretty long before this is a problem.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="09-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="09-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩国产综合一区二区| 欧美经典三级视频一区二区三区| 精品国产一区二区三区不卡 | 精品欧美一区二区久久| **网站欧美大片在线观看| 美腿丝袜亚洲一区| 91在线精品秘密一区二区| 精品成人免费观看| 亚洲国产中文字幕| 一本色道久久综合精品竹菊| 久久久久久影视| 蜜臀精品一区二区三区在线观看 | 五月激情综合网| 99久久婷婷国产综合精品电影| 精品国产免费人成在线观看| 日韩高清在线电影| 欧美三级蜜桃2在线观看| 亚洲摸摸操操av| 不卡av免费在线观看| 国产亚洲精品bt天堂精选| 麻豆精品视频在线观看视频| 欧美日韩极品在线观看一区| 亚洲成人综合视频| 欧美优质美女网站| 亚洲欧美日韩久久| 9l国产精品久久久久麻豆| 国产精品污网站| 国产99精品视频| 中文一区在线播放| 成人精品国产一区二区4080| 中文字幕不卡的av| 不卡大黄网站免费看| 18涩涩午夜精品.www| av不卡在线观看| 玉足女爽爽91| 欧美精品777| 美女视频黄免费的久久| 欧美精品一区二区高清在线观看| 美女看a上一区| 久久先锋资源网| 99热精品一区二区| 亚洲一区在线观看免费观看电影高清| 日本韩国欧美在线| 日韩电影免费一区| 国产亚洲精品久| 一本一道综合狠狠老| 日日夜夜免费精品| 久久久影院官网| 色老汉一区二区三区| 日本最新不卡在线| 欧美激情一区二区| 色天使色偷偷av一区二区| 天天综合网天天综合色| 久久精品视频一区| 色哟哟日韩精品| 久色婷婷小香蕉久久| 日本一区二区不卡视频| 欧美色爱综合网| 国产精品一区二区你懂的| 亚洲精品乱码久久久久久黑人| 欧美日韩国产a| 国产精品99久久久久久有的能看 | 色av一区二区| 美女视频黄久久| 国产精品成人网| 欧美日韩不卡一区| 成人免费毛片片v| 日本不卡一区二区三区高清视频| 337p粉嫩大胆色噜噜噜噜亚洲| www.爱久久.com| 日韩精彩视频在线观看| 国产精品毛片无遮挡高清| 欧美巨大另类极品videosbest| 成人污视频在线观看| 亚洲福利视频一区二区| 欧美极品xxx| 51午夜精品国产| 91啪亚洲精品| 国产一区二区三区观看| 日韩综合小视频| 亚洲美女少妇撒尿| 国产亚洲精品福利| 日韩欧美国产wwwww| 日本道在线观看一区二区| 国产一本一道久久香蕉| 视频一区二区三区在线| 亚洲另类在线视频| 国产日产欧美一区二区视频| 日韩一区二区精品| 欧美性受xxxx| 91久久久免费一区二区| 成人高清伦理免费影院在线观看| 麻豆精品一区二区综合av| 亚洲1区2区3区4区| 一卡二卡欧美日韩| 自拍偷拍欧美精品| 日本一二三不卡| 欧美经典一区二区| 国产亲近乱来精品视频| 欧美精品一区二区在线观看| 欧美一区二区三区免费大片| 欧美日韩在线播放| 91福利视频在线| 色婷婷综合久久久中文一区二区| 成人免费视频国产在线观看| 粉嫩欧美一区二区三区高清影视| 激情综合五月婷婷| 精品在线一区二区三区| 国产真实乱偷精品视频免| 老司机精品视频一区二区三区| 丝袜诱惑制服诱惑色一区在线观看| 亚洲午夜精品久久久久久久久| 亚洲精品高清视频在线观看| 亚洲欧美另类久久久精品| 亚洲蜜桃精久久久久久久| 一二三区精品福利视频| 亚洲一区二区不卡免费| 亚洲成年人网站在线观看| 亚洲成人自拍偷拍| 日韩精品亚洲一区二区三区免费| 午夜视频一区在线观看| 天堂资源在线中文精品| 蜜桃精品视频在线| 国产资源在线一区| 成人毛片在线观看| 色av成人天堂桃色av| 欧美亚洲国产一区二区三区va | 自拍偷拍欧美精品| 一级日本不卡的影视| 青青国产91久久久久久| 激情国产一区二区| www.日本不卡| 欧美日韩免费观看一区三区| 欧美电影在线免费观看| 欧美成人一区二区三区在线观看| 久久久影视传媒| 一区二区三区美女| 青青草成人在线观看| 国产成人av影院| 色噜噜狠狠成人中文综合| 欧美一级xxx| 国产日韩影视精品| 亚洲图片一区二区| 国产精品影视天天线| 欧美性视频一区二区三区| 精品少妇一区二区三区视频免付费 | 蜜桃av一区二区| 国产.欧美.日韩| 欧美性猛片aaaaaaa做受| 日韩片之四级片| 亚洲男同1069视频| 看片的网站亚洲| 在线观看一区不卡| 26uuu亚洲| 日韩av一级电影| 91蜜桃传媒精品久久久一区二区| 日韩一区二区精品在线观看| 亚洲天堂av老司机| 久久av资源站| 欧美无砖砖区免费| 国产精品视频免费看| 久久精品国产一区二区三区免费看| 一道本成人在线| 欧美国产综合一区二区| 久久精品理论片| 欧美日韩国产美| 一区二区三区蜜桃| av亚洲精华国产精华| 久久视频一区二区| 婷婷亚洲久悠悠色悠在线播放| av电影在线观看不卡| 久久久久亚洲蜜桃| 老色鬼精品视频在线观看播放| 欧美手机在线视频| 亚洲精品国产一区二区精华液| 成人自拍视频在线| 久久久噜噜噜久久中文字幕色伊伊| 一区二区在线电影| av中文字幕在线不卡| 久久九九影视网| 国产精品18久久久| 2021久久国产精品不只是精品| 丝袜美腿一区二区三区| 在线看日本不卡| 一级中文字幕一区二区| 在线观看亚洲精品视频| 亚洲美女视频在线| 日本久久一区二区| 亚洲三级在线看| 99久久精品免费看国产免费软件| 国产色综合一区| 国产成人午夜高潮毛片| 久久久久国产精品人| 国产成人在线色| 国产免费成人在线视频| eeuss鲁一区二区三区| 中国色在线观看另类| kk眼镜猥琐国模调教系列一区二区| 亚洲国产精品成人综合色在线婷婷| 国v精品久久久网|