亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 14-01.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Still Other Block Ciphers</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=14//-->
<!--PAGES=331-333//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch13/13-08.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="14-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Chapter 14<BR>Still Other Block Ciphers
</FONT></H2>
<H3><A NAME="Heading2"></A><FONT COLOR="#000077">14.1 GOST</FONT></H3>
<P>GOST is a block algorithm from the former Soviet Union [655,1393]. &#147;GOST&#148; is an acronym for &#147;Gosudarstvennyi Standard,&#148; or Government Standard, sort of similar to a FIPS, except that it can (and does) refer to just about any kind of standard. (Actually, the full name is Gosudarstvennyi Standard Soyuza SSR, or Government Standard of the Union of Soviet Socialist Republics.) This standard is number 28147-89. The Government Committee for Standards of the USSR authorized the standard, whoever they were.
</P>
<P>I don&#146;t know whether GOST 28147-89 was used for classified traffic or just for civilian encryption. A remark at its beginning states that the algorithm &#147;satisfies all cryptographic requirements and not limits the grade of information to be protected.&#148; I have heard claims that it was initially used for very high-grade communications, including classified military communications, but I have no confirmation.</P>
<P><FONT SIZE="+1"><B><I>Description of GOST</I></B></FONT></P>
<P>GOST is a 64-bit block algorithm with a 256-bit key. GOST also has some additional key material that will be discussed later. The algorithm iterates a simple encryption algorithm for 32 rounds.
</P>
<P>To encrypt, first break the text up into a left half, <I>L</I>. and a right half, <I>R</I>. The subkey for round <I>i</I> is <I>K</I><SUB>i</SUB>. A round, <I>i</I>, of GOST is:</P>
<DL>
<DD><I>L</I><SUB>i</SUB> = <I>R</I><SUB>i - 1</SUB>
<DD><I>R</I><SUB>i</SUB> = <I>L</I><SUB>i -1</SUB> &#8853; f(<I>R</I><SUB>i - 1</SUB>, <I>K</I><SUB>i</SUB>)
</DL>
<P>Figure 14.1 is a single round of GOST. Function f is straightforward. First, the right half and the <I>i</I>th subkey are added modulo 2<SUP>32</SUP>. The result is broken into eight 4-bit chunks, and each chunk becomes the input to a different S-box. There are eight different S-boxes in GOST; the first 4 bits go into the first S-box, the second 4 bits go into the second S-box, and so on. Each S-box is a permutation of the numbers 0 through 15. For example, an S-box might be:</P>
<I><P><A NAME="Fig1"></A><A HREF="javascript:displayWindow('images/14-01.jpg',283,213 )"><IMG SRC="images/14-01t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/14-01.jpg',283,213)"><FONT COLOR="#000077"><B>Figure 14.1</B></FONT></A>&nbsp;&nbsp;One round of GOST.</I>
</P>
<DL>
<DD>7, 10, 2, 4, 15, 9, 0, 3, 6, 12, 5, 13, 1, 8, 11
</DL>
<P>In this case, if the input to the S-box is 0, the output is 7. If the input is 1, the output is 10, and so on. All eight S-boxes are different; these are considered additional key material. The S-boxes are to be kept secret.
</P>
<P>The outputs of the eight S-boxes are recombined into a 32-bit word, then the entire word undergoes an 11-bit left circular shift. Finally, the result XORed to the left half to become the new right half, and the right half becomes the new left half. Do this 32 times and you&#146;re done.</P>
<P>The subkeys are generated simply. The 256-bit key is divided into eight 32-bit blocks: <I>k</I><SUB>1</SUB>, <I>k</I><SUB>2</SUB>,..., <I>k</I><SUB>8</SUB>. Each round uses a different subkey, as shown in Table 14.1. Decryption is the same as encryption with the order of the <I>k</I><SUB>i</SUB>s reversed.</P>
<P>The GOST standard does not discuss how to generate the S-boxes, only that they are somehow supplied [655]. This has led to speculation that some Soviet organization would supply good S-boxes to those organizations it liked and bad S-boxes to those organizations it wished to eavesdrop on. This may very well be true, but further conversations with a GOST chip manufacturer within Russia offered another alternative. He generated the S-box permutations himself, using a random-number generator.</P>
<TABLE WIDTH="100%"><TH CAPTION ALIGN="CENTER" COLSPAN="17">Table 14.1<BR>Use of GOST Subkeys in Different Rounds
<TR>
<TD COLSPAN="17"><HR>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT" "20%">Round:
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">1
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">2
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">3
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">4
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">5
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">6
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">7
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">8
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">9
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">10
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">11
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">12
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">13
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">14
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">15
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">16
<TR>
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="20%">Subkey:
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">1
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">2
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">3
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">4
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">5
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">6
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">7
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">8
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">1
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">2
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">3
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">4
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">5
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">6
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">7
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">8
<TR>
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="20%">Round:
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">17
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">18
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">19
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">20
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">21
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">22
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">23
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">24
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">25
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">26
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">27
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">28
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">29
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">30
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">31
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">32
<TR>
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="20%">Subkey:
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">1
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">2
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">3
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">4
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">5
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">6
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">7
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">8
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">8
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">7
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">6
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">5
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">4
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">3
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">2
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="5%">1
<TR>
<TD COLSPAN="17"><HR>
<TR>
</TABLE>
<P>More recently, a set of S-boxes used in an application for the Central Bank of the Russian Federation surfaced. These S-boxes are also used in the GOSTone-way hash function (see section 18.11) [657].They are listed in Table 14.2.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch13/13-08.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="14-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲成人7777| 极品美女销魂一区二区三区| a级精品国产片在线观看| 久久久91精品国产一区二区精品| 久久99精品一区二区三区三区| 日韩女优av电影| 久久99精品久久久久婷婷| 日韩午夜激情电影| 老司机精品视频线观看86| 久久久精品中文字幕麻豆发布| 从欧美一区二区三区| 日韩一区欧美小说| 欧美日韩在线亚洲一区蜜芽| 美女mm1313爽爽久久久蜜臀| 国产色综合久久| 91麻豆文化传媒在线观看| 亚洲图片欧美综合| 欧美成人艳星乳罩| 成人a免费在线看| 亚洲动漫第一页| 日韩欧美激情在线| 不卡的av电影| 日本不卡一区二区三区| 国产欧美视频一区二区| 欧美亚洲图片小说| 免费成人在线播放| 国产精品国产a级| 欧美酷刑日本凌虐凌虐| 国产盗摄女厕一区二区三区| 亚洲精品v日韩精品| 日韩欧美国产麻豆| 91在线视频免费观看| 青青草97国产精品免费观看| 欧美极品另类videosde| 欧美日韩电影一区| 成人综合婷婷国产精品久久蜜臀| 亚州成人在线电影| 国产日韩精品一区| 欧美日本精品一区二区三区| 99综合影院在线| 久久aⅴ国产欧美74aaa| 亚洲精品国产无天堂网2021| 日韩欧美国产一二三区| 色94色欧美sute亚洲线路二| 国产乱对白刺激视频不卡| 亚洲国产人成综合网站| 国产精品天干天干在线综合| 69久久99精品久久久久婷婷| 波多野结衣的一区二区三区| 老司机午夜精品| 香蕉久久一区二区不卡无毒影院| 中文字幕精品综合| 欧美成人艳星乳罩| 欧美福利电影网| 色悠久久久久综合欧美99| 国产一区二区三区观看| 三级影片在线观看欧美日韩一区二区 | 91精品国产福利| 91色porny蝌蚪| 国产精品一区二区在线观看网站| 日韩在线一区二区三区| 一片黄亚洲嫩模| 中文字幕中文乱码欧美一区二区| 精品久久久久av影院| 欧美精品乱码久久久久久| 91免费观看视频在线| 成人黄色av电影| 国产成+人+日韩+欧美+亚洲| 国产一区二区三区免费播放| 久久国产欧美日韩精品| 日韩成人免费电影| 日韩国产欧美三级| 亚洲妇女屁股眼交7| 亚洲一区二区在线免费观看视频| 亚洲青青青在线视频| 国产精品久线观看视频| 国产片一区二区| 国产免费观看久久| 国产免费观看久久| 中文字幕一区二区三区乱码在线| 久久精品一区二区三区四区| 国产午夜一区二区三区| 久久日韩精品一区二区五区| 久久伊99综合婷婷久久伊| 久久久综合视频| 国产视频视频一区| 亚洲丝袜另类动漫二区| 亚洲男同性视频| 日韩国产高清在线| 丝袜美腿亚洲色图| 久久国产成人午夜av影院| 久草精品在线观看| 大尺度一区二区| 91免费版在线| 欧美日韩电影一区| 亚洲精品一区二区三区福利| 国产日韩av一区二区| 中文字幕在线不卡一区| 亚洲激情中文1区| 日韩精品国产精品| 国产综合色产在线精品| 成人久久视频在线观看| 91视频一区二区| 午夜精品视频在线观看| 亚洲综合网站在线观看| 午夜视频一区二区三区| 久久99精品一区二区三区三区| 国产电影一区二区三区| 色久优优欧美色久优优| 欧美二区乱c少妇| 久久久国产一区二区三区四区小说| 国产偷v国产偷v亚洲高清| 亚洲精品国产一区二区精华液| 三级欧美在线一区| 高清beeg欧美| 欧美日韩免费一区二区三区| 精品成人私密视频| 一区二区三区在线观看网站| 免费国产亚洲视频| 91美女福利视频| 精品欧美一区二区久久| 亚洲免费毛片网站| 精品一区二区久久久| 色综合色综合色综合色综合色综合 | 成人av电影在线播放| 欧美三级视频在线观看| 久久久久国色av免费看影院| 一区二区三区日韩在线观看| 久久国内精品自在自线400部| av中文字幕亚洲| 欧美va亚洲va在线观看蝴蝶网| 国产精品成人网| 免费观看久久久4p| 欧美伊人久久久久久午夜久久久久| 欧美成人高清电影在线| 亚洲午夜久久久| jizz一区二区| 精品剧情v国产在线观看在线| 亚洲乱码日产精品bd| 国产在线播放一区二区三区 | 欧洲国内综合视频| 中文字幕免费不卡| 另类小说欧美激情| 欧美日韩精品系列| 亚洲人123区| 成人国产精品免费| 精品粉嫩超白一线天av| 天涯成人国产亚洲精品一区av| 97久久超碰国产精品| 久久久久久久综合狠狠综合| 视频一区二区三区入口| 欧美体内she精视频| 国产精品美女久久久久av爽李琼 | 国产麻豆成人精品| 777午夜精品免费视频| 一区二区三区在线视频观看58| 成人av在线网站| 亚洲国产成人在线| 国产在线一区观看| 亚洲精品一区二区三区蜜桃下载 | 欧美综合色免费| 亚洲欧洲精品一区二区三区不卡| 国产精品99久久久| 久久久久亚洲蜜桃| 看电视剧不卡顿的网站| 日韩一区二区三免费高清| 偷拍一区二区三区四区| 欧美日本在线视频| 天堂蜜桃91精品| 欧美日韩黄色一区二区| 亚洲超碰精品一区二区| 欧美日本乱大交xxxxx| 丝袜亚洲精品中文字幕一区| 91精品国产综合久久久久| 日本欧美一区二区在线观看| 欧美精品欧美精品系列| 日本欧美在线看| 精品国产精品网麻豆系列| 国产精品一线二线三线精华| 国产视频一区二区三区在线观看| 国产v综合v亚洲欧| 最新日韩av在线| 日本韩国一区二区三区| 亚洲国产wwwccc36天堂| 欧美精品乱码久久久久久按摩| 美女精品自拍一二三四| 欧美精品一区二区三区一线天视频| 久久99久久久久| 国产免费成人在线视频| av中文字幕亚洲| 午夜精品久久久久久不卡8050| 日韩一级成人av| 国产乱理伦片在线观看夜一区| 国产精品不卡在线观看| 在线视频欧美区| 蜜臀av一区二区在线观看| 久久久不卡影院| 色综合久久88色综合天天6| 日一区二区三区| 久久先锋资源网|