亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 14-07.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號(hào):
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Still Other Block Ciphers</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=14//-->
<!--PAGES=345-347//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="14-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="14-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>RC5 is actually a family of algorithms. We just defined RC5 with a 32-bit word size and 64-bit block; there&#146;s no reason why the same algorithm can&#146;t have a 64-bit word size and 128-bit block size. For <I>w</I> = 64, P and Q are 0xb7e151628aed2a6b and 0x9e3779b97f4a7c15, respectively. Rivest designates particular implementations of RC5 as RC5-<I>w/r/b</I>, where <I>w</I> is the word size, <I>r</I> is the number of rounds, and <I>b</I> is the length of the key in bytes.</P>
<P>RC5 is new, but RSA Laboratories has spent considerable time analyzing it with a 64-bit block. After 5 rounds, the statistics look very good. After 8 rounds, every plaintext bit affects at least one rotation. There is a differential attack that requires 2<SUP>24</SUP> chosen plaintexts for 5 rounds, 2<SUP>45</SUP> for 10 rounds, 2<SUP>53</SUP> for 12 rounds, and 2<SUP>68</SUP> for 15 rounds. Of course, there are only 2<SUP>64</SUP> possible chosen plaintexts, so this attack won&#146;t work for 15 or more rounds. Linear cryptanalysis estimates indicate that it is secure after 6 rounds. Rivest recommends at least 12 rounds, and possibly 16 [1325]. This number may change.</P>
<P>RSADSI is in the process of patenting RC5, and the name is trademarked. The company claims that license fees will be very small, but you&#146;d better check with them.</P>
<H3><A NAME="Heading10"></A><FONT COLOR="#000077">14.9 Other Block Algorithms</FONT></H3>
<P>There is an algorithm called CRYPTO-MECCANO in the literature [301]; it is insecure. Four Japanese cryptographers presented an algorithm based on chaotic maps at Eurocrypt &#146;91 [687, 688]; Biham cryptanalyzed the algorithm at the same conference [157]. Another algorithm relies on subsets of a particular set of random codes [693]. There are several algorithms based on the theory of error-correcting codes: a variant of the McEliece algorithm (see Section 19.7) [786,1290], the Rao-Nam algorithm [1292,733,1504,1291,1056,1057,1058,1293], variants of the Rao-Nam algorithm [464,749,1503], and the Li-Wang algorithm [964,1561]&#151;they are all insecure. CALC is insecure [1109]. An algorithm called TEA, for Tiny Encryption Algorithm, is too new to comment on [1592]. Vino is another algorithm [503]. MacGuffin, a block algorithm by Matt Blaze and me, is also insecure [189]; it was broken at the same conference it was proposed. BaseKing, similar in design philosophy as 3-way but with a 192-bit block [402], is too new to comment on.
</P>
<P>There are many more block algorithms outside the cryptology community. Some are used by various government and military organizations. I have no information about any of those. There are also dozens of proprietary commercial algorithms. Some might be good; most are probably not. If companies do not feel that their interests are served by making their algorithms public, it is best to assume they&#146;re right and avoid the algorithm.</P>
<H3><A NAME="Heading11"></A><FONT COLOR="#000077">14.10 Theory of Block Cipher Design</FONT></H3>
<P>In Section 11.1, I described Shannon&#146;s principles of confusion and diffusion. Fifty years after these principles were first written, they remain the cornerstone of good block cipher design.
</P>
<P>Confusion serves to hide any relationship between the plaintext, the ciphertext, and the key. Remember how linear and differential cryptanalysis can exploit even a slight relationship between these three things? Good confusion makes the relationship statistics so complicated that even these powerful cryptanalytic tools won&#146;t work.</P>
<P>Diffusion spreads the influence of individual plaintext or key bits over as much of the ciphertext as possible. This also hides statistical relationships and makes cryptanalysis more difficult.</P>
<P>Confusion alone is enough for security. An algorithm consisting of a single key-dependent lookup table of 64 bits of plaintext to 64 bits of ciphertext would be plenty strong. The problem is that large lookup tables require lots of memory to implement: 10<SUP>20</SUP> bytes of memory for the table just mentioned. The whole point of block cipher design is to create something that looks like a large lookup table, but with much smaller memory requirements.</P>
<P>The trick is to repeatedly mix confusion (with much smaller tables) and diffusion in a single cipher in different combinations. This is called a <B>product cipher</B>. Sometimes a block cipher that incorporates layers of substitution and permutation is called a <B>substitution-permutation network</B>, or even an <B>SP network</B>.</P>
<P>Look back at function f of DES. The expansion permutation and P-box perform diffusion; the S-boxes perform confusion. The expansion permutation and P-box are linear; the S-boxes are nonlinear. Each operation is pretty simple on its own; together they work pretty well.</P>
<P>DES also illustrates a few more principles of block cipher design. The first is the idea of an <B>iterated block cipher</B>. This simply means taking a simple round function and iterating it multiple times. Two-round DES isn&#146;t very strong; it takes 5 rounds before all of the output bits are dependent on all of the input bits and all of the key bits [1078,1080]. Sixteen-round DES is strong; 32-round DES is even stronger.</P>
<P><FONT SIZE="+1"><B><I>Feistel Networks</I></B></FONT></P>
<P>Most block algorithms are <B>Feistel networks</B>. This idea dates from the early 1970s [552,553]. Take a block of length <I>n</I> and divide it into two halves of length <I>n</I>/2: <I>L</I> and <I>R</I>. Of course, <I>n</I> must be even. You can define an iterated block cipher where the output of the <I>i</I>th round is determined from the output of the previous round:</P>
<DL>
<DD><I>L</I><SUB>i</SUB> = <I>R</I><SUB>i - 1</SUB>
<DD><I>R</I><SUB>i</SUB> = <I>L</I><SUB>i - 1</SUB> &#8853; <I>f</I>(<I>R</I><SUB>i - 1</SUB>,<I>K</I><SUB>i</SUB>)
</DL>
<P><I>K</I><SUB>i</SUB> is the subkey used in the <I>i</I>th round and <I>f</I> is an arbitrary round function.</P>
<P>You&#146;ve seen this concept in DES, Lucifer, FEAL, Khufu, Khafre, LOKI, GOST, CAST, Blowfish, and others. Why is it such a big deal? The function is guaranteed to be reversible. Because XOR is used to combine the left half with the output of the round function, it is necessarily true that</P>
<DL>
<DD><I>L</I><SUB>i - 1</SUB> &#8853; <I>f</I>(<I>R</I><SUB>i - 1</SUB>,<I>K</I><SUB>i</SUB>) &#8853; <I>f</I>(<I>R</I><SUB>i - 1</SUB>,<I>K</I><SUB>i</SUB>) = <I>L</I><SUB>i - 1</SUB>
</DL>
<P>A cipher that uses this construction is guaranteed to be invertible as long as the inputs to <I>f</I> in each round can be reconstructed. It doesn&#146;t matter what <I>f</I> is; <I>f</I> need not be invertible. We can design <I>f</I> to be as complicated as we please, and we don&#146;t have to implement two different algorithms&#151;one for encryption and another for decryption. The structure of a Feistel network takes care of all this automatically.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="14-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="14-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美激情一区二区三区全黄| 欧美三级三级三级| 欧美激情在线免费观看| 国产精品1区2区3区| 国产女人18毛片水真多成人如厕 | 国产99精品视频| 国产精品毛片久久久久久| 亚洲欧洲韩国日本视频| 亚洲欧美日韩国产手机在线| 欧美国产国产综合| 久久久久成人黄色影片| 亚洲品质自拍视频| 色综合天天综合网天天看片| 亚洲午夜久久久久久久久久久| 欧美三级韩国三级日本一级| 免费观看成人av| 国产女主播一区| 色偷偷88欧美精品久久久| 婷婷国产在线综合| 久久久久久亚洲综合影院红桃| 成人午夜伦理影院| 亚洲国产日韩a在线播放 | 欧美电视剧在线看免费| 亚洲6080在线| 精品粉嫩超白一线天av| a亚洲天堂av| 亚洲第一狼人社区| 久久婷婷一区二区三区| 91在线观看美女| 奇米影视7777精品一区二区| 国产欧美日韩视频一区二区| 色婷婷综合久久久中文一区二区 | 国产精品羞羞答答xxdd| 亚洲精品视频一区| 制服丝袜一区二区三区| 国产suv一区二区三区88区| 一个色妞综合视频在线观看| 欧美电影免费观看高清完整版在线观看 | 精品日韩欧美在线| 99久久国产综合色|国产精品| 三级不卡在线观看| 国产精品午夜电影| 日韩午夜在线影院| 91在线精品一区二区| 蜜臀av在线播放一区二区三区| 国产精品伦理在线| 日韩欧美国产午夜精品| 91在线视频免费观看| 精品一区二区免费视频| 一区二区在线观看不卡| 久久久高清一区二区三区| 欧美系列一区二区| 国产在线视频一区二区三区| 亚洲影院久久精品| 中文字幕第一页久久| 欧美一区二区三区白人| 色综合咪咪久久| 国产老肥熟一区二区三区| 亚洲v日本v欧美v久久精品| 国产精品全国免费观看高清| 日韩视频一区二区三区| 在线亚洲一区二区| 国产成人免费视频 | 视频一区二区三区在线| 一区在线中文字幕| 久久亚洲综合色一区二区三区| 欧美日韩国产美| 色综合网站在线| 国产成人久久精品77777最新版本| 天天免费综合色| 一区二区三区在线影院| 中文无字幕一区二区三区| 欧美r级在线观看| 欧美日韩成人激情| 色婷婷综合久久久久中文| 高清视频一区二区| 国产在线精品一区二区夜色| 婷婷综合另类小说色区| 尤物视频一区二区| 亚洲欧洲精品一区二区精品久久久| 久久网这里都是精品| 日韩美女视频在线| 91精品国产日韩91久久久久久| 欧美亚洲一区二区在线观看| 色婷婷综合久久久中文字幕| av亚洲产国偷v产偷v自拍| 国产精品资源网| 国内精品免费在线观看| 久久99久久99小草精品免视看| 日韩电影在线免费看| 亚洲成人av免费| 亚洲一区二区三区小说| 亚洲精品五月天| 亚洲精品视频自拍| 一区二区三区精品久久久| 专区另类欧美日韩| 亚洲免费大片在线观看| 中文字幕综合网| 亚洲丝袜自拍清纯另类| 亚洲欧美综合另类在线卡通| 国产精品福利在线播放| 亚洲欧洲日韩一区二区三区| 亚洲欧洲99久久| 亚洲精选在线视频| 一区二区在线观看视频| 一级特黄大欧美久久久| 亚洲成人三级小说| 午夜精彩视频在线观看不卡| 天堂成人免费av电影一区| 日韩中文字幕亚洲一区二区va在线| 亚洲妇熟xx妇色黄| 天使萌一区二区三区免费观看| 天堂av在线一区| 美女高潮久久久| 国内精品伊人久久久久影院对白| 国产一区二区毛片| 国产成人8x视频一区二区| 国产91丝袜在线播放0| 成人黄色电影在线| 91女厕偷拍女厕偷拍高清| 色狠狠色噜噜噜综合网| 在线欧美日韩国产| 欧美日韩亚洲不卡| 91麻豆精品国产综合久久久久久| 欧美一区二区三区成人| www国产成人| 国产精品久久久久永久免费观看 | 久久综合一区二区| 国产日韩欧美电影| ...中文天堂在线一区| 亚洲男人的天堂网| 婷婷久久综合九色国产成人| 麻豆成人综合网| 成人一区二区三区在线观看 | 日韩一级免费观看| 久久久综合视频| 最新中文字幕一区二区三区 | 亚洲主播在线播放| 日韩不卡一区二区三区 | 麻豆成人在线观看| 成人激情免费视频| 欧美日韩在线播放一区| 337p粉嫩大胆噜噜噜噜噜91av| 中文字幕不卡在线播放| 一区二区三区小说| 久久99久久99精品免视看婷婷| 成人国产精品视频| 欧美精品少妇一区二区三区 | 久久综合久久久久88| 国产精品免费视频一区| 亚洲一区二区三区四区在线 | 成人免费毛片app| 欧美影院午夜播放| 精品国产精品一区二区夜夜嗨| 中文字幕的久久| 三级成人在线视频| 成人午夜视频免费看| 欧美日韩国产小视频| 久久久久97国产精华液好用吗| 亚洲免费观看高清在线观看| 日韩av高清在线观看| 成人一区二区三区在线观看| 欧美日韩高清一区二区不卡| 欧美激情一区二区三区| 香蕉乱码成人久久天堂爱免费| 国产曰批免费观看久久久| 91美女精品福利| 欧美成人精品1314www| 亚洲女子a中天字幕| 免费成人结看片| 色综合久久久网| 亚洲精品一区在线观看| 亚洲精品欧美激情| 国产在线视视频有精品| 欧美三级乱人伦电影| 国产精品你懂的在线| 日韩精品高清不卡| 91免费看`日韩一区二区| 精品蜜桃在线看| 夜夜揉揉日日人人青青一国产精品| 国产自产v一区二区三区c| 欧美在线观看禁18| 欧美高清在线一区二区| 日韩中文字幕亚洲一区二区va在线| av一区二区不卡| 欧美精品一区二区三区高清aⅴ| 一区二区三区免费看视频| 国产盗摄女厕一区二区三区| 欧美久久高跟鞋激| 亚洲欧美在线高清| 国产一区二区伦理片| 欧美日韩精品高清| 亚洲图片激情小说| 国产寡妇亲子伦一区二区| 欧美一区三区四区| 亚洲综合激情另类小说区| 成人开心网精品视频| 精品欧美一区二区三区精品久久| 夜夜精品浪潮av一区二区三区| av电影一区二区|