亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 14-05.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Still Other Block Ciphers</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=14//-->
<!--PAGES=340-342//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="14-04.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="14-06.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>These are operations in the finite field GF(257), and 45 is a primitive element in that field. In practical implementations of SAFER K-64, it is quicker to implement this in a lookup table than to calculate new results all the time.
</P>
<P>Then, sub-blocks are either XORed or added with bytes of subkey <I>K</I><SUB>2r</SUB>. The results of this operation are fed through three layers of linear operations designed to increase the avalanche effect. Each operation is called a Pseudo-Hadamard Transform (PHT). If the inputs to a PHT are <I>a</I><SUB>1</SUB> and <I>a</I><SUB>2</SUB>, then the outputs are:</P>
<DL>
<DD><I>b</I><SUB>1</SUB> = (2<I>a</I><SUB>1</SUB> &#43; <I>a</I><SUB>2</SUB>) mod 256
<DD><I>b</I><SUB>2</SUB> = (<I>a</I><SUB>1</SUB> &#43; <I>a</I><SUB>2</SUB>) mod 256
</DL>
<P>After <I>r</I> rounds, there is a final output transformation. This is the same as the first step of each round. <I>B</I><SUB>1</SUB>, <I>B</I><SUB>4</SUB>, <I>B</I><SUB>5</SUB>, and <I>B</I><SUB>8</SUB> are XORed with the corresponding bytes of the last subkey, and <I>B</I><SUB>2</SUB>, <I>B</I><SUB>3</SUB>, <I>B</I><SUB>6</SUB>, and <I>B</I><SUB>7</SUB> are added to the corresponding bytes of the last subkey. The result is the ciphertext.</P>
<I><P><A NAME="Fig4"></A><A HREF="javascript:displayWindow('images/14-04.jpg',351,319 )"><IMG SRC="images/14-04t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/14-04.jpg',351,319)"><FONT COLOR="#000077"><B>Figure 14.4</B></FONT></A>&nbsp;&nbsp;One round of SAFER.</I>
</P>
<P>Decryption is the reverse process: the output transformation (with subtraction instead of addition), then <I>r</I> reverse rounds. The Inverse PHT (IPHT) is:</P>
<DL>
<DD><I>a</I><SUB>1</SUB> = (<I>b</I><SUB>1</SUB> &#150; <I>b</I><SUB>2</SUB>) mod 256
<DD><I>a</I><SUB>2</SUB> = (&#150;<I>b</I><SUB>1</SUB> &#43; 2<I>b</I><SUB>2</SUB>) mod 256
</DL>
<P>Massey recommends 6 rounds, but you can increase that if you want greater security.
</P>
<P>Generating subkeys is easy. The first subkey, <I>K</I><SUB>1</SUB>, is simply the user key. Subsequent subkeys are generated by the following procedure:</P>
<DL>
<DD><I>K</I><SUB>i&#43;1</SUB> = (<I>K</I><SUB>1</SUB> &lt&lt&lt 3<I>i</I>) &#43; <I>c</I><SUB>i</SUB>
</DL>
<P>The symbol &#147;&lt&lt&lt&#148; is a left circular shift or a left rotation. The rotation is byte by byte, and <I>c</I><SUB>i</SUB> is a round constant. If <I>c</I><SUB>ij</SUB> is the <I>j</I>th byte of the <I>i</I>th round constant, then you can calculate all of the round constants by the formula</P>
<DL>
<DD><I>c</I><SUB>ij</SUB> = 45<SUP>45^((9<I>i &#43; j</I>) mod 256) mod 257</SUP> mod 257
</DL>
<P>Generally, these values are stored in a table.
</P>
<P><FONT SIZE="+1"><B><I>SAFER K-128</I></B></FONT></P>
<P>This alternate key schedule was developed by the Ministry of Home Affairs in Singapore, and then incorporated into SAFER by Massey [1010]. It uses two keys, <I>K</I><SUB>a</SUB> and <I>K</I><SUB>b</SUB>, each 64-bits long. The trick is to generate two subkey sequences in parallel, and then alternate subkeys from each sequence. This means that if you choose <I>K</I><SUB>a</SUB> = <I>K</I><SUB>b</SUB>, then the 128-bit key is compatible with the 64-bit key <I>K</I><SUB>a</SUB>.</P>
<P><FONT SIZE="+1"><B><I>Security of SAFER K-64</I></B></FONT></P>
<P>Massey showed that SAFER K-64 is immune to differential cryptanalysis after 8 rounds and is adequately secure against the attack after 6 rounds. After only 3 rounds linear cryptanalysis is ineffective against this algorithm [1010].
</P>
<P>Knudsen found a weakness in the key schedule: For virtually every key, there exists at least one (and sometimes as many as nine) other key that encrypts some different plaintext to identical ciphertexts [862]. The number of different plaintexts that encrypt to identical ciphertexts after 6 rounds is anywhere from 2<SUP>22</SUP> to 2<SUP>28</SUP>. While this attack may not impact SAFER&#146;s security when used as an encryption algorithm, it greatly reduces its security when used as a one-way hash function. In any case, Knudsen recommends at least 8 rounds.</P>
<P>SAFER was designed for Cylink, and Cylink is tainted by the NSA [80]. I recommend years of intense cryptanalysis before using SAFER in any form.</P>
<H3><A NAME="Heading6"></A><FONT COLOR="#000077">14.5 3-Way</FONT></H3>
<P>3-Way is a block cipher designed by Joan Daemen [402,410]. It has a 96-bit block length and key length, and is designed to be very efficient in hardware.
</P>
<P>3-Way is not a Feistel network, but it is an iterated block cipher. 3-Way can have <I>n</I> rounds; Daemen recommends 11.</P>
<P><FONT SIZE="+1"><B><I>Description of 3-Way</I></B></FONT></P>
<P>The algorithm is simple to describe. To encrypt a plaintext block, <I>x:</I></P>
<DL>
<DD>For <I>i</I> = 0 to <I>n</I> &#150; 1
<DL>
<DD><I>x</I> = <I>x</I> XOR <I>K</I><SUB>i</SUB>
<DD><I>x</I> = theta (<I>x</I>)
<DD><I>x</I> = pi &#150; 1 (<I>x</I>)
<DD><I>x</I> = gamma (<I>x</I>)
<DD><I>x</I> = pi &#150; 2 (x)
</DL>
<DD><I>x</I> = <I>x</I> &#8853; <I>K</I><SUB>n</SUB>
<DD><I>x</I> = theta (<I>x</I>)
</DL>
<P>The functions are:
</P>
<DL>
<DD><B>&#151;</B>&nbsp;&nbsp;theta(<I>x</I>) is a linear substitution function&#151;basically a bunch of circular shifts and XORs.
<DD><B>&#151;</B>&nbsp;&nbsp;pi&#150;1(<I>x</I>) and pi&#150;2(<I>x</I>) are simple permutations.
<DD><B>&#151;</B>&nbsp;&nbsp;gamma(<I>x</I>) is a nonlinear substitution function. This is the step that gives 3-Way its name; it is the parallel execution of the substitution step on 3-bit blocks of the input.
</DL>
<P>Decryption is similar to encryption, except that the bits of the input have to be reversed and the bits of the output have to be reversed. Code to implement 3-Way can be found in the back of this book.
</P>
<P>So far, there has been no successful cryptanalysis of 3-Way. The algorithm is unpatented.</P>
<H3><A NAME="Heading7"></A><FONT COLOR="#000077">14.6 Crab</FONT></H3>
<P>This algorithm was developed by Burt Kaliski and Matt Robshaw of RSA Laboratories [810]. The idea behind Crab is to use techniques from one-way hash functions to make a fast encryption algorithm. Hence, Crab is very similar to MD5, and this section assumes you are familiar with Section 18.5.
</P>
<P>Crab has a very large block: 1024 bytes. Since Crab is presented more as a research contribution than a real algorithm, no definitive key-generation routines are presented. The authors suggest a method that could turn an 80-bit key into three requisite subkeys, although the algorithm could easily accept variable-length keys.</P>
<P>Crab uses two sets of large subkeys:</P>
<DL>
<DD><I>A permutation of the numbers 0 through 255: P<SUB>0</SUB>, P<SUB>1</SUB>, P<SUB>2</SUB>,..., P<SUB>255</SUB>.</I>
<DD><I>A 2048-entry array of 32-bit numbers: S<SUB>0</SUB>, S<SUB>1</SUB>, S<SUB>2</SUB>,..., S<SUB>2047</SUB>.</I>
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="14-04.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="14-06.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美一区二区三区影视| 国产91精品一区二区麻豆亚洲| 亚洲成人综合网站| 激情亚洲综合在线| 91福利在线导航| 国产欧美日韩在线看| 亚洲曰韩产成在线| 成人蜜臀av电影| 亚洲精品一区二区在线观看| 一区二区不卡在线播放| 国产精品一二三四区| 91精品国产一区二区三区蜜臀 | 不卡一卡二卡三乱码免费网站| 欧美老年两性高潮| 国产精品久久久久久久久免费樱桃| 男男视频亚洲欧美| 欧美亚洲高清一区| 1区2区3区国产精品| 国产suv精品一区二区三区| 日韩免费成人网| 免费成人你懂的| 91精品在线观看入口| 夜夜嗨av一区二区三区中文字幕| 成人av午夜电影| 亚洲国产精品成人久久综合一区| 精品影院一区二区久久久| 欧美性大战久久久| 免费成人av在线播放| 欧美日韩一区二区三区四区 | 日韩毛片高清在线播放| 九九精品一区二区| 91.成人天堂一区| 亚洲另类在线制服丝袜| 国产一区二区电影| 日韩天堂在线观看| 久久99久久精品| 99亚偷拍自图区亚洲| 欧美一区二区啪啪| 秋霞午夜av一区二区三区| 欧美色网一区二区| 亚洲亚洲人成综合网络| 欧美日本一道本| 免费成人美女在线观看.| 91精品国产综合久久久蜜臀粉嫩| 日本成人在线网站| 精品欧美久久久| 国产精品一卡二卡| 中文字幕av一区二区三区高| 成人一区二区三区| 亚洲乱码国产乱码精品精可以看| 色综合久久中文综合久久牛| 亚洲一区在线观看免费观看电影高清| 欧美日韩亚洲综合| 久久国产免费看| 国产网站一区二区| 色偷偷一区二区三区| 爽好久久久欧美精品| 日韩美女视频一区二区在线观看| 国产精品白丝jk黑袜喷水| 中文字幕一区二区三区四区| 欧美性感一区二区三区| 六月丁香综合在线视频| 国产精品无码永久免费888| 色婷婷国产精品久久包臀| 视频一区二区欧美| 国产欧美精品国产国产专区| 欧美综合色免费| 国产一区二区视频在线| 亚洲视频小说图片| 日韩视频中午一区| 99在线视频精品| 免费成人av在线| 中文字幕视频一区| 欧美一区二区三区日韩| jizzjizzjizz欧美| 免费在线观看成人| 亚洲精选在线视频| 久久久亚洲欧洲日产国码αv| 色噜噜狠狠一区二区三区果冻| 老司机一区二区| 亚洲综合激情另类小说区| 精品久久一区二区| 欧美午夜精品理论片a级按摩| 国产精品 日产精品 欧美精品| 午夜成人在线视频| 国产精品久久久久久亚洲毛片| 日韩欧美www| 欧美综合天天夜夜久久| 国产999精品久久久久久绿帽| 亚洲电影第三页| 亚洲乱码国产乱码精品精的特点| 欧美高清激情brazzers| 91视频观看视频| 国产高清在线精品| 美女免费视频一区二区| 亚洲色图欧洲色图婷婷| 欧美激情中文字幕| 日韩欧美精品在线| 国产在线看一区| 亚洲国产中文字幕| 国产精品激情偷乱一区二区∴| 欧美肥妇毛茸茸| 99天天综合性| 国产精品 日产精品 欧美精品| 洋洋成人永久网站入口| 国产日韩欧美在线一区| 欧美一区在线视频| 在线亚洲免费视频| 91蜜桃在线观看| 色综合久久66| 色欧美乱欧美15图片| 成人免费视频网站在线观看| 国产一区二区成人久久免费影院| 久久99久久99| 国模一区二区三区白浆| 精品亚洲porn| 精品亚洲国产成人av制服丝袜| 看电视剧不卡顿的网站| 免费成人在线观看| 麻豆国产欧美一区二区三区| 日韩av中文在线观看| 免费看日韩精品| 奇米一区二区三区av| 美女尤物国产一区| 国产在线精品一区二区三区不卡 | 欧美优质美女网站| 在线亚洲欧美专区二区| 欧美日韩精品一区二区天天拍小说| 欧美中文字幕久久| 欧美日韩高清一区二区不卡| 91麻豆精品国产91久久久使用方法| 3d动漫精品啪啪| 精品乱码亚洲一区二区不卡| 亚洲精品一区二区三区福利| 欧美国产欧美综合| 中文字幕综合网| 亚洲v日本v欧美v久久精品| 五月婷婷色综合| 久久精品噜噜噜成人88aⅴ| 国产精一区二区三区| 成人精品免费网站| 欧美在线一二三| 精品国产凹凸成av人导航| 中文字幕av一区二区三区免费看| 亚洲人成亚洲人成在线观看图片| 一区av在线播放| 免费的成人av| av电影天堂一区二区在线观看| 欧美最猛黑人xxxxx猛交| 日韩午夜电影av| 亚洲欧洲美洲综合色网| 亚洲成人在线免费| 国产精品一区二区免费不卡 | 国产成人午夜高潮毛片| 91蜜桃在线观看| 欧美v国产在线一区二区三区| 国产精品久久久久毛片软件| 日韩激情一二三区| jlzzjlzz亚洲日本少妇| 日韩欧美国产综合在线一区二区三区| 日本一区二区成人在线| 天堂蜜桃91精品| 波多野结衣91| 日韩精品一区二区三区四区视频 | 成人激情免费视频| 欧美一区二区三区在线视频 | 午夜久久电影网| 国产91在线看| 日韩欧美一区二区视频| 亚洲美腿欧美偷拍| 国产一区二区在线影院| 欧美日韩国产在线观看| 中文字幕不卡的av| 久久精品国产99国产精品| 欧美亚洲一区二区三区四区| 国产精品国产三级国产普通话三级| 男女性色大片免费观看一区二区 | 欧美高清www午色夜在线视频| 国产精品色眯眯| 久久精品国产在热久久| 欧美三级韩国三级日本一级| 中文字幕在线不卡视频| 国产精品一区二区你懂的| 日韩一区二区视频在线观看| 亚洲国产视频一区二区| 99视频一区二区| 国产日韩精品一区二区三区在线| 日本中文字幕一区二区有限公司| 91精品办公室少妇高潮对白| 国产精品国产三级国产| 国产精品一区二区在线观看不卡| 在线观看91av| 奇米一区二区三区| 91精品国产综合久久久久久久久久| 伊人色综合久久天天人手人婷| av成人老司机| 国产精品国产三级国产有无不卡| 高清成人免费视频| 国产精品色婷婷| 91网站最新网址|