亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 14-08.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Still Other Block Ciphers</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=14//-->
<!--PAGES=347-350//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="14-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="14-09.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Simple Relations</I></B></FONT></P>
<P>DES has the property that if <I>E</I><SUB>K</SUB>(<I>P</I>) = <I>C</I>, then <I>E</I><SUB>K&#146;</SUB>(P&#146;) = <I>C&#146;</I>, where <I>P&#146;</I>, <I>C&#146;</I>, and <I>K&#146;</I> are the bit-wise complements of <I>P, C</I>, and <I>K</I>. This property reduces the complexity of a brute-force attack by a factor of two. LOKI has complementation properties that reduce the complexity of a brute-force attack by a factor of 256.</P>
<P>A <B>simple relation</B> can be defined as [857]:</P>
<DL>
<DD>If <I>E</I><SUB>K</SUB>(<I>P</I>) = <I>C</I>, then <I>E</I><SUB>f(K)</SUB> (<I>g</I>(<I>P,K</I>)) = <I>h</I>(<I>C,K</I>)
</DL>
<P>where <I>f, g</I>, and <I>h</I> are simple functions. By simple I mean that they are easy to compute, much easier than an iteration of the block cipher. In DES, <I>f</I> is the bit-wise complement of <I>K, g</I> is the bit-wise complement of <I>P</I>, and <I>h</I> is the bit-wise complement of <I>C</I>. This is a result of XoRing the key into part of the text.</P>
<P>In a good block cipher, there are no simple relations. Methods for finding some of these weaknesses are in [917].</P>
<P><FONT SIZE="+1"><B><I>Group Structure</I></B></FONT></P>
<P>When discussing an algorithm, the question of whether it is a group arises. The elements of the group are the ciphertext blocks with each possible key, and the group operation is composition. Looking at an algorithmos group structure is an attempt to get a handle on just how much extra scrambling happens under multiple encryption.
</P>
<P>The useful question is, however, not whether an algorithm is actually a group, but just how close to a group it is. If it were only lacking one element, it wouldnot be a group; but double encryption would be&#151;statistically speaking&#151;a waste of time. The work on DES showed that DES is very far away from being a group. There are still some interesting questions about the semigroup that DES encryption generates. Does it contain the identity: That is, does it even generate a group? To put it another way, does some combination of encryption (not decryption) operations eventually generate the identity function? If so, how long is the shortest such combination?</P>
<P>The goal is to estimate the size of the keyspace for a theoretical brute-force attack, and the result is a greatest lower bound on the keyspace entropy.</P>
<P><FONT SIZE="+1"><B><I>Weak Keys</I></B></FONT></P>
<P>In a good block cipher, all keys are equally strong. Algorithms with a small number of weak keys, like DES, are generally no problem. The odds of picking one at random are very small, and it&#146;s easy to test for and discard them. However, these weak keys can sometimes be exploited if the block cipher is used as a one-way hash function (see Section 18.11).
</P>
<P><FONT SIZE="+1"><B><I>Strength against Differential and Linear Cryptanalysis</I></B></FONT></P>
<P>The study of differential and linear cryptanalysis has shed significant light on the theory of good block cipher design. The inventors of IDEA introduced the concept of <B>differentials</B>, a generalization of the basic idea of characteristics [931]. They argued that block ciphers can be designed to resist this attack; IDEA is the result of that work [931]. This concept was further formalized in [1181,1182], when Kaisa Nyberg and Lars Knudsen showed how to make block ciphers provably secure against differential cryptanalysis. This theory has extensions to higher-order differentials [702,161,927,858,860] and partial differentials [860]. Higher-order differentials seem to apply only to ciphers with a small number of rounds, but partial differentials combine nicely with differentials.</P>
<P>Linear cryptanalysis is newer, and is still being improved. Notions of key ranking [1019] and multiple approximations [811,812] have been defined. other work that extends the idea of linear cryptanalysis can be found in [1270]; [938] tries to combine linear and differential cryptanalysis into one attack. It is unclear what design techniques will protect against these sorts of attacks.</P>
<P>Knudsen has made some progress, considering some necessary (but not perhaps sufficient) criteria for what he calls <B>practically secure Feistel networks</B>: ciphers that resist both linear and differential cryptanalysis [857]. Nyberg introduced in linear cryptanalysis an analogy to the concept of differentials from differential cryptanalysis [1180].</P>
<P>Interestingly enough, there seems to be a duality between differential and linear cryptanalysis. This duality becomes apparent both in the design of techniques to construct good differential characteristics and linear approximations [164,1018], and also in the design criteria for making algorithms that are secure against both attacks [307]. Exactly where this line of research will lead is still unknown. As a start, Daemen has developed an algorithm-design strategy based on linear and differential cryptanalysis [402].</P>
<P><FONT SIZE="+1"><B><I>S-Box Design</I></B></FONT></P>
<P>The strength of various Feistel networks&#151;and specifically their resistance to differential and linear cryptanalysis&#151;is tied directly to their S-boxes. This has prompted a spate of research on what constitutes a good S-box.
</P>
<P>An S-box is simply a substitution: a mapping of <I>m-</I>bit inputs to <I>n-</I>bit outputs. Previously I talked about one large lookup table of 64-bit inputs to 64-bit outputs; that would be a 64*64-bit S-box. An S-box with an <I>m-</I>bit input and an <I>n-</I>bit output is called a <B><I>m*n</I>-bit S-box</B>. S-boxes are generally the only nonlinear step in an algorithm; they are what give a block cipher its security. In general, the bigger they are, the better.</P>
<P>DES has eight different 6*4-bit S-boxes. Khufu and Khafre have a single 8*32-bit S-box, LoKI has a 12*8-bit S-box, and both Blowfish and CAST have 8*32-bit S-boxes. In IDEA the modular multiplication step is effectively the S-box; it is a 16*16-bit S-box. The larger this S-box, the harder it is to find useful statistics to attack using either differential or linear cryptanalysis [653,729,1626]. Also, while random S-boxes are usually not optimal to protect against differential and linear attacks, it is easier to find strong S-boxes if the S-boxes are larger. Most random S-boxes are nonlinear, nondegenerate, and have strong resistance to linear cryptanalysis&#151;and the fraction that does not goes down rapidly as the number of input bits decreases [1185,1186,1187].</P>
<P>The size of <I>m</I> is more important than the size of <I>n</I>. Increasing the size of <I>n</I> reduces the effectiveness of differential cryptanalysis, but greatly increases the effectiveness of linear cryptanalysis. In fact, if <I>n</I> &#8804; 2<SUP>m</SUP> &#150; <I>m</I>, then there is definitely a linear relation of the input and output bits of the S-box. And if <I>n</I> &#8804; 2<SUP>m</SUP>, then there is a linear relation of only the output bits [164].</P>
<P>Much of this work involves the study of <B>Boolean functions</B> [94,1098,1262,1408]. In order to be secure, the Boolean functions used in S-boxes must satisfy specific conditions. They should not be linear or affine, nor even close to linear or affine [9,1177,1178,1188]. There should be a balance of zeros and ones, and no correlations between different combinations of bits. The output bits should behave independently when any single input bit is complemented. These design criteria are also related to the study of <B>bent functions</B>: functions which can be shown to be optimally nonlinear. Although their definition is simple and natural, their study is very complicated [1344,1216,947,905,1176,1271,295,296,297,149,349,471,298].</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="14-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="14-09.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲一区二三区| gogogo免费视频观看亚洲一| 国产一区二区三区免费观看| 一本大道av伊人久久综合| 欧美一级午夜免费电影| 亚洲天堂精品在线观看| 国产麻豆视频一区| 日韩一级片网址| 亚洲图片欧美综合| 91小视频免费看| 国产精品全国免费观看高清| 激情另类小说区图片区视频区| 欧美综合一区二区三区| 国产精品免费久久| 国产大陆亚洲精品国产| 日韩三级电影网址| 青青草国产成人av片免费| 在线视频欧美区| 亚洲欧洲综合另类| 91在线观看下载| 中文字幕亚洲一区二区va在线| 国产精品996| 国产亚洲欧美中文| 国产精品久久久久久久裸模| 国产自产视频一区二区三区| 日韩欧美色综合网站| 日日摸夜夜添夜夜添国产精品 | 天堂va蜜桃一区二区三区漫画版| 97成人超碰视| 亚洲欧洲精品一区二区精品久久久 | 欧美亚洲国产一区二区三区va | 国产亚洲一区字幕| 国产伦精一区二区三区| 久久影院视频免费| 国产麻豆欧美日韩一区| 久久久国产午夜精品| 国产精品亚洲一区二区三区在线| 欧美成人精品3d动漫h| 久久电影网站中文字幕| 日韩女优制服丝袜电影| 九九视频精品免费| 久久久精品人体av艺术| 成人免费黄色大片| 亚洲视频电影在线| 欧美日韩国产成人在线91| 日韩国产精品久久久久久亚洲| 欧美一区二区三区啪啪| 国产麻豆91精品| 亚洲欧美综合另类在线卡通| 欧洲精品中文字幕| 午夜精品福利久久久| 欧美mv日韩mv国产网站| 国产999精品久久久久久绿帽| 国产精品不卡在线观看| 91丝袜呻吟高潮美腿白嫩在线观看| 一区二区欧美国产| 日韩一区二区三区在线视频| 国产成人精品一区二区三区四区| 亚洲免费av观看| 日韩午夜激情电影| 成人午夜在线免费| 婷婷久久综合九色综合绿巨人| 欧美精品一区二区三区久久久| 不卡电影免费在线播放一区| 亚洲成av人片一区二区| 欧美成人午夜电影| 91免费看`日韩一区二区| 免费在线视频一区| 成人欧美一区二区三区视频网页| 亚洲三级免费观看| 美国毛片一区二区三区| 中文字幕第一区综合| 欧美蜜桃一区二区三区| 粉嫩av亚洲一区二区图片| 亚洲线精品一区二区三区八戒| 欧美精品一区男女天堂| 在线观看www91| 国产成人午夜99999| 日韩在线一区二区| 亚洲人成精品久久久久久| 久久蜜臀中文字幕| 欧美久久高跟鞋激| 91网站黄www| 国产精品一区二区视频| 图片区日韩欧美亚洲| 亚洲丝袜自拍清纯另类| 2024国产精品| 在线不卡免费欧美| 91女厕偷拍女厕偷拍高清| 国产福利一区二区三区| 老司机免费视频一区二区| 亚洲综合精品久久| 中文欧美字幕免费| 国产日产欧产精品推荐色| 欧美一区二区三区免费视频| 欧美日韩在线播放三区四区| 99久久精品情趣| 国产不卡高清在线观看视频| 久久精品国产免费看久久精品| 亚洲成人激情自拍| 亚洲精品水蜜桃| 亚洲欧美日韩国产综合| 国产精品传媒入口麻豆| 国产精品美女一区二区三区 | 五月婷婷欧美视频| 一区二区在线看| 中文字幕在线一区| 国产精品网站在线观看| 国产精品天美传媒沈樵| 久久久一区二区三区| 日韩精品一区二区三区老鸭窝| 91精品视频网| 日韩欧美美女一区二区三区| 56国语精品自产拍在线观看| 在线不卡一区二区| 欧美成人国产一区二区| 欧美成人猛片aaaaaaa| 精品区一区二区| 26uuu精品一区二区在线观看| 精品国产一区a| 国产色产综合产在线视频| 国产欧美日韩另类视频免费观看| 国产午夜精品久久久久久免费视| 欧美激情一区不卡| 亚洲日穴在线视频| 亚洲国产aⅴ成人精品无吗| 亚洲国产精品久久一线不卡| 五月激情综合色| 国产在线精品免费av| 粉嫩aⅴ一区二区三区四区 | 91精品久久久久久久久99蜜臂| 欧美巨大另类极品videosbest | 久久久国际精品| 国产精品入口麻豆原神| 国产精品久久久久久久久果冻传媒| 中文字幕一区av| 午夜久久久久久久久久一区二区| 日本va欧美va精品| 国产乱码精品1区2区3区| 99视频有精品| 欧美一区二区在线视频| 久久欧美一区二区| 日韩美女啊v在线免费观看| 亚洲高清免费观看高清完整版在线观看| 午夜精品久久久久久久久| 国模无码大尺度一区二区三区| av在线不卡网| 日韩一级完整毛片| 国产精品久久久久毛片软件| 亚洲高清一区二区三区| 国产精品资源在线观看| 91九色最新地址| 久久久久久99精品| 亚洲综合丝袜美腿| 国产精品一二二区| 欧美三级视频在线观看| 中文字幕不卡三区| 久久99最新地址| 欧美在线观看你懂的| 精品国产凹凸成av人导航| 亚洲男人的天堂av| 国产综合久久久久久久久久久久| 91国产福利在线| 国产欧美日韩综合精品一区二区 | 国产在线一区观看| 欧美日韩在线一区二区| 国产精品久久久久毛片软件| 伦理电影国产精品| 欧美在线999| 国产视频一区不卡| 麻豆免费看一区二区三区| 日本精品一区二区三区高清 | 日韩欧美一二三区| 亚洲一区二区三区爽爽爽爽爽| 国产不卡视频在线观看| 日韩精品一区二区在线观看| 亚洲一区二区欧美日韩| 成人av在线资源| 久久日韩精品一区二区五区| 日韩激情视频在线观看| 在线区一区二视频| 成人欧美一区二区三区小说 | 欧美三级视频在线观看| 综合亚洲深深色噜噜狠狠网站| 国产黑丝在线一区二区三区| 日韩一级大片在线| 午夜视频一区二区| 欧美中文一区二区三区| 一区二区三区四区在线免费观看 | 国产一区中文字幕| 日韩一区二区免费电影| 亚洲成人资源在线| 欧美又粗又大又爽| 亚洲国产视频a| 欧美高清视频在线高清观看mv色露露十八| 亚洲欧洲av一区二区三区久久| 波多野结衣一区二区三区| 国产精品美女一区二区| 99国产精品视频免费观看| 国产精品成人一区二区艾草|