亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 08-02.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Key Management</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=08//-->
<!--PAGES=171-174//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="08-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="08-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>And remember, computing power doubles every 18 months. If you expect your keys to stand up against brute-force attacks for 10 years, you&#146;d better plan accordingly.
</P>
<P><FONT SIZE="+1"><B><I>Poor Key Choices</I></B></FONT></P>
<P>When people choose their own keys, they generally choose poor ones. They&#146;re far more likely to choose &#147;Barney&#148; than &#147;*9 (hH/A.&#148; This is not always due to poor security practices; &#147;Barney&#148; is easier to remember than &#147;*9 (hH/A.&#148; The world&#146;s most secure algorithm won&#146;t help much if the users habitually choose their spouse&#146;s names for keys or write their keys on little pieces of paper in their wallets. A smart brute-force attack doesn&#146;t try all possible keys in numerical order; it tries the obvious keys first.
</P>
<P>This is called a <B>dictionary attack</B>, because the attacker uses a dictionary of common keys. Daniel Klein was able to crack 40 percent of the passwords on the average computer using this system [847,848]. No, he didn&#146;t try one password after another, trying to login. He copied the encrypted password file and mounted the attack offline. Here&#146;s what he tried:</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;The user&#146;s name, initials, account name, and other relevant personal information as a possible password. All in all, up to 130 different passwords were tried based on this information. For an account name <B>klone</B> with a user named &#147;Daniel V. Klein,&#148; some of the passwords that would be tried were: klone, klone0, klone1, klone123, dvk, dvkdvk, dklein, DKlein leinad, nielk, dvklein, danielk, DvkkvD, DANIEL-KLEIN, (klone), KleinD, and so on.
<DD><B>2.</B>&nbsp;&nbsp;Words from various databases. These included lists of men&#146;s and women&#146;s names (some 16,000 in all); places (including variations so that &#147;spain,&#148; &#147;spanish,&#148; and &#147;spaniard&#148; would all be considered); names of famous people; cartoons and cartoon characters; titles, characters, and locations from films and science fiction stories; mythical creatures (garnered from <I>Bullfinch&#146;s Mythology</I> and dictionaries of mythical beasts); sports (including team names, nicknames, and specialized terms); numbers (both as numerals&#151;&#147;2001,&#148; and written out&#151;&#147;twelve&#148;); strings of letters and numbers (&#147;a,&#148; &#147;aa,&#148; &#147;aaa,&#148; &#147;aaaa,&#148; etc.); Chinese syllables (from the Pinyin Romanization of Chinese, an international standard system of writing Chinese on an English keyboard); the King James Bible; biological terms; colloquial and vulgar phrases (such as &#147;fuckyou,&#148; &#147;ibmsux,&#148; and &#147;deadhead&#148;); keyboard patterns (such as &#147;qwerty,&#148; &#147;asdf,&#148; and &#147;zxcvbn&#148;); abbreviations (such as &#147;roygbiv&#148;&#151;the colors in the rainbow, and &#147;ooottafagvah&#148;&#151;a mnemonic for remembering the 12 cranial nerves); machine names (acquired from /<I>etc/hosts</I>); characters, plays, and locations from Shakespeare; common Yiddish words; the names of asteroids; and a collection of words from various technical papers Klein previously published. All told, more than 60,000 separate words were considered per user (with any inter- and intra-dictionary duplicates being discarded).
<DD><B>3.</B>&nbsp;&nbsp;Variations on the words from step 2. This included making the first letter uppercase or a control character, making the entire word uppercase, reversing the word (with and without the aforementioned capitalization), changing the letter &#145;o&#146; to the digit &#145;0&#146; (so that the word &#147;scholar&#148; would also be checked as &#147;sch0lar&#148;), changing the letter &#145;l&#146; to the digit &#145;1&#146; (so that the word &#147;scholar&#148; would also be checked as &#147;scho1ar&#148;), and performing similar manipulation to change the letter &#145;z&#146; into the digit &#145;2&#146;, and the letter &#145;s&#146; into the digit &#145;5&#146;. Another test was to make the word into a plural (irrespective of whether the word was actually a noun), with enough intelligence built in so that &#147;dress&#148; became &#147;dresses,&#148; &#147;house&#148; became &#147;houses,&#148; and &#147;daisy&#148; became &#147;daisies.&#148; Klein did not consider pluralization rules exclusively, though, so that &#147;datum&#148; forgivably became &#147;datums&#148; (not &#147;data&#148;), while &#147;sphynx&#148; became &#147;sphynxs&#148; (and not &#147;sphynges&#148;). Similarly, the suffixes &#147;-ed,&#148; &#147;-er,&#148; and &#147;-ing&#148; were added to transform words like &#147;phase&#148; into &#147;phased,&#148; &#147;phaser,&#148; and &#147;phasing.&#148; These additional tests added another 1,000,000 words to the list of possible passwords that were tested for each user.
<DD><B>4.</B>&nbsp;&nbsp;Various capitalization variations on the words from step 2 that were not considered in step 3. This included all single-letter capitalization variations (so that &#147;michael&#148; would also be checked as &#147;mIchael,&#148; &#147;miChael,&#148; &#147;micHael,&#148; &#147;michAel,&#148; etc.), double-letter capitalization variations (&#147;MIchael,&#148; &#147;MiChael,&#148; &#147;MicHael,&#148;..., &#147;mIChael,&#148; &#147;mIcHael,&#148; etc.), triple-letter variations, etc. The single-letter variations added roughly another 400,000 words to be checked per user, while the double-letter variations added another 1,500,000 words. Three-letter variations would have added at least another 3,000,000 words per user had there been enough time to complete the tests. Tests of four-, five-, and six-letter variations were deemed to be impracticable without much more computational horsepower to carry them out.
<DD><B>5.</B>&nbsp;&nbsp;Foreign language words on foreign users. The specific test that was performed was to try Chinese language passwords on users with Chinese names. The Pinyin Romanization of Chinese syllables was used, combining syllables together into one-, two-, and three-syllable words. Because no tests were done to determine whether the words actually made sense, an exhaustive search was initiated. Since there are 298 Chinese syllables in the Pinyin system, there are 158,404 two-syllable words, and slightly more than 16,000,000 three-syllable words. A similar mode of attack could as easily be used with English, using rules for building pronounceable nonsense words.
<DD><B>6.</B>&nbsp;&nbsp;Word pairs. The magnitude of an exhaustive test of this nature is staggering. To simplify the test, only words of three or four characters in length from <I>/usr/dict/words</I> were used. Even so, the number of word pairs is about ten million.
</DL>
<P>A dictionary attack is much more powerful when it is used against a file of keys and not a single key. A single user may be smart enough to choose good keys. If a thousand people each choose their own key as a password to a computer system, the odds are excellent that at least one person will choose a key in the attacker&#146;s dictionary.
</P>
<P><FONT SIZE="+1"><B><I>Random Keys</I></B></FONT></P>
<P>Good keys are random-bit strings generated by some automatic process. If the key is 64 bits long, every possible 64-bit key must be equally likely. Generate the key bits from either a reliably random source (see Section 17.14) or a cryptographically secure pseudo-random-bit generator (see Chapters 16 and 17.) If these automatic processes are unavailable, flip a coin or roll a die.
</P>
<P>This is important, but don&#146;t get too caught up in arguing about whether random noise from audio sources is more random than random noise from radioactive decay. None of these random-noise sources will be perfect, but they will probably be good enough. It is important to use a good random-number generator for key generation, but it is far more important to use good encryption algorithms and key management procedures. If you are worried about the randomness of your keys, use the key-crunching technique described below.</P>
<P>Some encryption algorithms have weak keys: specific keys that are less secure than the other keys. I advise testing for these weak keys and generating a new one if you discover one. DES has only 16 weak keys out of 2<SUP>56</SUP>, so the odds of generating any of these keys are incredibly small. It has been argued that a cryptanalyst would have no idea that a weak key is being used and therefore gains no advantage from their accidental use. It has also been argued that not using weak keys gives a cryptanalyst information. However, testing for the few weak keys is so easy that it seems imprudent not to do so.</P>
<P>Generating keys for public-key cryptography systems is harder, because often the keys must have certain mathematical properties (they may have to be prime, be a quadratic residue, etc.). Techniques for generating large random prime numbers are discussed in Section 11.5. The important thing to remember from a key management point of view is that the random seeds for those generators must be just that: random.</P>
<P>Generating a random key isn&#146;t always possible. Sometimes you need to remember your key. (See how long it takes you to remember 25e8 56f2 e8ba c820). If you have to generate an easy-to-remember key, make it obscure. The ideal would be something easy to remember, but difficult to guess. Here are some suggestions:</P>
<DL>
<DD>&#151; Word pairs separated by a punctuation character, for example &#147;turtle*moose&#148; or &#147;zorch!splat&#148;
<DD>&#151; Strings of letters that are an acronym of a longer phrase; for example, &#147;Mein Luftkissenfahrzeug ist voller Aale!&#148; generates the key &#147;MLivA!&#148;
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="08-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="08-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
免费成人你懂的| 九九久久精品视频| 91农村精品一区二区在线| 亚洲国产成人porn| ●精品国产综合乱码久久久久| 精品在线视频一区| 欧美日韩国产另类不卡| 99亚偷拍自图区亚洲| 制服丝袜激情欧洲亚洲| 欧美揉bbbbb揉bbbbb| 日本不卡1234视频| 色综合久久中文综合久久97| 欧美不卡123| 视频一区二区国产| 色综合久久久网| 国产精品天干天干在线综合| 国产麻豆午夜三级精品| 精品久久久久久无| 日韩电影在线看| 6080午夜不卡| 午夜久久久久久电影| 欧美特级限制片免费在线观看| 综合欧美亚洲日本| 99热在这里有精品免费| 国产亚洲视频系列| 国产高清不卡一区| 久久久国产精华| 国产电影一区在线| 国产三级三级三级精品8ⅰ区| 精品无人码麻豆乱码1区2区 | 岛国一区二区在线观看| 久久亚洲精品小早川怜子| 久久精品久久综合| 精品三级在线看| 激情综合色播激情啊| 2020国产精品久久精品美国| 国产综合久久久久影院| 久久精品亚洲麻豆av一区二区 | 7777精品伊人久久久大香线蕉超级流畅 | 波多野结衣精品在线| 国产精品久久二区二区| voyeur盗摄精品| 亚洲中国最大av网站| 欧美人与禽zozo性伦| 另类调教123区| 欧美激情一区二区在线| 色综合天天综合网国产成人综合天 | 欧美性生交片4| 日韩在线a电影| 久久亚洲一级片| 99久久99久久精品国产片果冻| 亚洲免费三区一区二区| 3751色影院一区二区三区| 久久精品国产秦先生| 国产精品家庭影院| 欧美三级电影一区| 激情综合色播五月| 国产精品福利电影一区二区三区四区| 91丨porny丨首页| 日本欧美一区二区| 国产精品二区一区二区aⅴ污介绍| 欧美无砖砖区免费| 国产乱对白刺激视频不卡| 亚洲视频每日更新| 欧美人伦禁忌dvd放荡欲情| 国产一区二区不卡| 亚洲成人动漫一区| 国产视频在线观看一区二区三区 | 亚洲一区二区成人在线观看| 欧美一级免费大片| 91视频.com| 国产麻豆精品在线观看| 亚洲电影在线免费观看| 国产欧美日韩激情| 日韩一级视频免费观看在线| 色天天综合色天天久久| 国产精品中文字幕日韩精品| 亚洲成a人v欧美综合天堂| 欧美国产精品v| 欧美不卡在线视频| 欧美三级视频在线| www.成人网.com| 国产精品一区二区三区四区| 亚洲chinese男男1069| 综合久久给合久久狠狠狠97色| 欧美一二三四区在线| 在线国产亚洲欧美| av毛片久久久久**hd| 国产精品99久久久久久有的能看| 亚洲成av人片在线| 亚洲三级久久久| 国产精品久久夜| www欧美成人18+| 日韩欧美一二三区| 欧美高清视频不卡网| 在线视频综合导航| 成人黄色在线视频| 国产成人av一区二区三区在线观看| 日韩av中文在线观看| 午夜影院在线观看欧美| 亚洲精品高清视频在线观看| 国产精品拍天天在线| 中文字幕免费观看一区| 国产日本亚洲高清| 久久久久久免费网| 久久久久久电影| 久久精品人人做| 久久影院午夜片一区| 久久久久久麻豆| 久久精品视频在线看| 国产人妖乱国产精品人妖| 国产欧美精品一区aⅴ影院 | 91精品中文字幕一区二区三区| 欧美系列亚洲系列| 欧美疯狂性受xxxxx喷水图片| 欧美伦理电影网| 欧美一区二区三区在线视频| 91精品国产入口在线| 欧美v国产在线一区二区三区| 日韩欧美综合一区| 国产亚洲精品aa午夜观看| 久久久99精品久久| 国产精品久久久久精k8| 一区二区三区在线播放| 亚洲国产综合在线| 人人精品人人爱| 国产精品自拍网站| 成人国产一区二区三区精品| 一本久久a久久精品亚洲| 欧美日韩一区三区| 精品国产乱码久久久久久久| 国产午夜精品在线观看| 亚洲免费在线电影| 奇米888四色在线精品| 精品一区二区三区欧美| 粉嫩嫩av羞羞动漫久久久| 色综合久久综合网| 日韩一级片在线观看| 国产日本欧美一区二区| 亚洲国产日韩a在线播放性色| 日av在线不卡| aaa欧美日韩| 7777精品伊人久久久大香线蕉的| 久久久精品国产99久久精品芒果| 亚洲欧洲日韩在线| 日韩福利电影在线| 岛国一区二区在线观看| 在线成人小视频| 亚洲国产精品ⅴa在线观看| 一区二区三区不卡视频在线观看| 日韩国产一二三区| 99久久精品国产一区二区三区 | 国产美女久久久久| 色嗨嗨av一区二区三区| 亚洲精品在线观看视频| 夜夜揉揉日日人人青青一国产精品 | 9人人澡人人爽人人精品| 在线成人高清不卡| 亚洲人成人一区二区在线观看| 免费久久99精品国产| 91色视频在线| 久久精品视频免费观看| 五月激情六月综合| 成人精品鲁一区一区二区| 日韩视频一区在线观看| 一区二区在线观看不卡| 国产精品77777| 91麻豆精品久久久久蜜臀| ㊣最新国产の精品bt伙计久久| 久久精品久久综合| 911精品国产一区二区在线| 亚洲同性gay激情无套| 国产伦精一区二区三区| 欧美一区二区三区性视频| 亚洲男人天堂av网| 成人做爰69片免费看网站| 精品日韩一区二区三区免费视频| 亚洲综合男人的天堂| 99久久777色| 国产精品久久久久久久久搜平片 | 高清shemale亚洲人妖| 欧美xxxxx裸体时装秀| 肉丝袜脚交视频一区二区| 91久久精品国产91性色tv | 色哟哟在线观看一区二区三区| 久久久99精品久久| 国产在线不卡视频| 精品区一区二区| 久久国产精品一区二区| 91精品婷婷国产综合久久性色| 午夜精品久久久久久久99水蜜桃| 色噜噜狠狠成人中文综合| 亚洲黄网站在线观看| 欧美自拍偷拍一区| 亚洲欧美日韩国产中文在线| 91原创在线视频| 亚洲区小说区图片区qvod| 91美女精品福利| 亚洲一区二区中文在线| 欧美精三区欧美精三区|