亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 07-02.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Key Length</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=07//-->
<!--PAGES=153-155//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="07-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="07-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Of course, it is ludicrous to estimate computing power 35 years in the future. Breakthroughs in some science-fiction technology could make these numbers look like a joke. Conversely, physical limitations unknown at the present time could make them unrealistically optimistic. In cryptography it is wise to be pessimistic. Fielding an algorithm with an 80-bit key seems extremely short-sighted. Insist on at least 112-bit keys.
</P>
<TABLE WIDTH="100%"><TR>
<TH CAPTION ALIGN="CENTER" COLSPAN="7">Table 7.1<BR>Average Time Estimates for a Hardware Brute-Force Attack in 1995
<TR>
<TD COLSPAN="7"><HR>
<TR>
<TH COLSPAN="7" ALIGN="LEFT" VALIGN="BOTTOM">Length of Key in Bits
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">
<TD COLSPAN="6"><HR>
<TR>
<TH ALIGN="LEFT" VALIGN="BOTTOM">Cost
<TH ALIGN="CENTER" VALIGN="BOTTOM">40
<TH ALIGN="CENTER" VALIGN="BOTTOM">56
<TH ALIGN="CENTER" VALIGN="BOTTOM">64
<TH ALIGN="CENTER" VALIGN="BOTTOM">80
<TH ALIGN="CENTER" VALIGN="BOTTOM">112
<TH ALIGN="CENTER" VALIGN="BOTTOM">128
<TR>
<TD COLSPAN="7"><HR>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">$100 K
<TD ALIGN="CENTER" VALIGN="BOTTOM">2 seconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">35 hours
<TD ALIGN="CENTER" VALIGN="BOTTOM">1 year
<TD ALIGN="CENTER" VALIGN="BOTTOM">70,000 years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>14</SUP> years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>19</SUP> years
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">$1 M
<TD ALIGN="CENTER" VALIGN="BOTTOM">.2 seconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">3.5 hours
<TD ALIGN="CENTER" VALIGN="BOTTOM">37 days
<TD ALIGN="CENTER" VALIGN="BOTTOM">7000 years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>13</SUP> years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>18</SUP> years
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">$10 M
<TD ALIGN="CENTER" VALIGN="BOTTOM">.02 seconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">21 minutes
<TD ALIGN="CENTER" VALIGN="BOTTOM">4 days
<TD ALIGN="CENTER" VALIGN="BOTTOM">700 years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>12</SUP> years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>17</SUP> years
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">$100 M
<TD ALIGN="CENTER" VALIGN="BOTTOM">2 milliseconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">2 minutes
<TD ALIGN="CENTER" VALIGN="BOTTOM">9 hours
<TD ALIGN="CENTER" VALIGN="BOTTOM">70 years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>11</SUP> years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>16</SUP> years
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">$1 G
<TD ALIGN="CENTER" VALIGN="BOTTOM">.2 milliseconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">13 seconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">1 hour
<TD ALIGN="CENTER" VALIGN="BOTTOM">7 years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>10</SUP> years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>15</SUP> years
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">$10 G
<TD ALIGN="CENTER" VALIGN="BOTTOM">.02 milliseconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">1 second
<TD ALIGN="CENTER" VALIGN="BOTTOM">5.4 minutes
<TD ALIGN="CENTER" VALIGN="BOTTOM">245 days
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>9</SUP> years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>14</SUP> years
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">$100 G
<TD ALIGN="CENTER" VALIGN="BOTTOM">2 microseconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">.1 second
<TD ALIGN="CENTER" VALIGN="BOTTOM">32 seconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">24 days
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>8</SUP> years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>13</SUP> years
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">$1 T
<TD ALIGN="CENTER" VALIGN="BOTTOM">.2 microseconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">.01 second
<TD ALIGN="CENTER" VALIGN="BOTTOM">3 seconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">2.4 days
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>7</SUP> years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>12</SUP> years
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">$10 T
<TD ALIGN="CENTER" VALIGN="BOTTOM">.02 microseconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">1 millisecond
<TD ALIGN="CENTER" VALIGN="BOTTOM">.3 second
<TD ALIGN="CENTER" VALIGN="BOTTOM">6 hours
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>6</SUP> years
<TD ALIGN="CENTER" VALIGN="BOTTOM">10<SUP>11</SUP> years
<TR>
<TD COLSPAN="7"><HR>
</TABLE>
<P>If an attacker wants to break a key badly enough, all he has to do is spend money. Consequently, it seems prudent to try to estimate the minimum &#147;value&#148; of a key: How much value can be trusted to a single key before it makes economic sense to try to break? To give an extreme example, if an encrypted message is worth $1.39, then it wouldn&#146;t make much financial sense to set a $10-million cracker to the task of recovering the key. On the other hand, if the plaintext message is worth $100 million, then decrypting that single message would justify the cost of building the cracker. Also, the value of some messages decreases rapidly with time.
</P>
<P><FONT SIZE="+1"><B><I>Software Crackers</I></B></FONT></P>
<P>Without special-purpose hardware and massively parallel machines, brute-force attacks are significantly harder. A software attack is about a thousand times slower than a hardware attack.
</P>
<P>The real threat of a software-based brute-force attack is not that it is certain, but that it is &#147;free.&#148; It costs nothing to set up a microcomputer to test possible keys whenever it is idle. If it finds the correct key&#151;great. If it doesn&#146;t, then nothing is lost. It costs nothing to set up an entire microcomputer network to do that. A recent experiment with DES used the collective idle time of 40 workstations to test 2<SUP>34</SUP> keys in a single day [603]. At this speed, it will take four million days to test all keys, but if enough people try attacks like this, then someone somewhere will get lucky. As was said in [603]:</P>
<BLOCKQUOTE><P>The crux of the software threat is sheer bad luck. Imagine a university computer network of 512 workstations, networked together. On some campuses this would be a medium-sized network. They could even be spread around the world, coordinating their activity through electronic mail. Assume each workstation is capable of running [the algorithm] at a rate of 15,000 encryptions per second.... Allowing for the overhead of testing and changing keys, this comes down to...8192 tests per second per machine. To exhaust [a 56-bit] keyspace with this setup would take 545 years (assuming the network was dedicated to the task twenty-four hours per day). Notice, however, that the same calculations give our hypothetical student hackers one chance in 200,000 of cracking a key in one day. Over a long weekend their odds increase to one chance in sixty-six thousand. The faster their hardware, or the more machines involved, the better their chance becomes. These are not good odds for earning a living from horse racing, but they&#146;re not the stuff of good press releases either. They are much better odds than the Government gives on its lotteries, for instance. &#147;One-in-a-million&#148;? &#147;Couldn&#146;t happen again in a thousand years&#148;? It is no longer possible to say such things honestly. Is this an acceptable ongoing risk?
</P>
</BLOCKQUOTE><P>Using an algorithm with a 64-bit key instead of a 56-bit key makes this attack 256 times more difficult. With a 40-bit key, the picture is far more bleak. A network of 400 computers, each capable of performing 32,000 encryptions per second, can complete a brute-force attack against a 40-bit key in a single day. (In 1992, the RC2 and RC4 algorithms were approved for export with a 40-bit key&#151;see Section 13.8.)
</P>
<P>A 128-bit key makes a brute-force attack ridiculous even to contemplate. Industry experts estimate that by 1996 there will be 200 million computers in use worldwide. This estimate includes everything from giant Cray mainframes to subnotebooks. If every one of those computers worked together on this brute-force attack, and each computer performed a million encryptions per second every second, it would still take a million times the age of the universe to recover the key.</P>
<P><FONT SIZE="+1"><B><I>Neural Networks</I></B></FONT></P>
<P>Neural nets aren&#146;t terribly useful for cryptanalysis, primarily because of the shape of the solution space. Neural nets work best with problems that have a continuity of solutions, some better than others. This allows a neural net to learn, proposing better and better solutions as it does. Breaking an algorithm provides for very little in the way of learning opportunities: You either recover the key or you don&#146;t. (At least this is true if the algorithm is any good.) Neural nets work well in structured environments where there is something to learn, but not in the high-entropy, seemingly random world of cryptography.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="07-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="07-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲精品一区二区三区福利| 欧美老人xxxx18| 91视频你懂的| 精品福利视频一区二区三区| 亚洲午夜精品在线| 不卡av在线网| 久久久亚洲国产美女国产盗摄 | 欧美久久久久中文字幕| 久久精品视频免费观看| 日韩精品国产欧美| 99久久99久久精品免费看蜜桃| 日韩视频一区二区在线观看| 亚洲欧洲成人自拍| 丰满白嫩尤物一区二区| 日韩欧美国产一区在线观看| 亚洲h动漫在线| 欧洲精品一区二区三区在线观看| 中文在线一区二区| 国产精品中文字幕日韩精品| 91精品国产综合久久精品图片| 夜夜精品视频一区二区| eeuss影院一区二区三区| 久久久久国产一区二区三区四区| 日本不卡123| 欧美日韩aaaaaa| 一区二区三区中文免费| 91美女在线看| 亚洲天堂中文字幕| 成人av在线观| 亚洲人成亚洲人成在线观看图片| 国产不卡高清在线观看视频| 国产午夜精品一区二区三区四区| 黄页视频在线91| 久久久av毛片精品| 国产精品一色哟哟哟| 久久久久9999亚洲精品| 精品伊人久久久久7777人| 欧美不卡一区二区三区四区| 久久综合综合久久综合| 精品欧美一区二区在线观看| 久国产精品韩国三级视频| 精品国产欧美一区二区| 国产在线视频一区二区三区| 久久久噜噜噜久久中文字幕色伊伊 | 一区二区在线观看视频| 在线观看一区二区精品视频| 亚洲妇熟xx妇色黄| 欧美色爱综合网| 美女在线一区二区| 久久综合色8888| 成人成人成人在线视频| 亚洲日穴在线视频| 欧美日韩国产综合久久| 麻豆91精品91久久久的内涵| 欧美国产欧美综合| 欧洲精品一区二区| 男人操女人的视频在线观看欧美| 国产亚洲人成网站| 色一区在线观看| 青青草精品视频| 欧美高清在线视频| 欧洲av一区二区嗯嗯嗯啊| 免费成人在线网站| 国产精品嫩草影院com| 在线观看亚洲一区| 国产一区二区免费视频| 自拍偷拍欧美激情| 日韩精品在线一区| 色综合天天综合网天天狠天天| 偷拍亚洲欧洲综合| 欧美国产一区在线| 欧美日韩在线播放三区| 国产精品2024| 日本视频在线一区| 国产精品欧美极品| 日韩亚洲欧美一区| 91亚洲国产成人精品一区二区三| 免费看黄色91| 中文字幕亚洲电影| 精品国产一区二区三区av性色| 色天使久久综合网天天| 国产精品1024| 蜜臀va亚洲va欧美va天堂| 亚洲欧美日韩在线不卡| 久久理论电影网| 欧美高清精品3d| 99re视频这里只有精品| 久久国产乱子精品免费女| 一区二区三区美女| 国产精品情趣视频| 日韩欧美一区中文| 欧美调教femdomvk| 成人动漫一区二区在线| 九色综合狠狠综合久久| 亚洲高清久久久| 怡红院av一区二区三区| 综合激情网...| 中文一区在线播放| 久久免费午夜影院| 亚洲精品在线电影| 欧美一级在线视频| 欧美精品在线视频| 91国偷自产一区二区三区观看| 懂色中文一区二区在线播放| 激情av综合网| 蜜桃av一区二区| 麻豆视频一区二区| 奇米一区二区三区| 午夜视黄欧洲亚洲| 日韩精品视频网站| 首页国产丝袜综合| 天天综合网 天天综合色| 一区二区三区产品免费精品久久75| 中文字幕欧美国产| 国产精品麻豆99久久久久久| 国产清纯美女被跳蛋高潮一区二区久久w| 欧美一区二区在线不卡| 欧美年轻男男videosbes| 欧美美女一区二区在线观看| 欧美日精品一区视频| 欧美三级视频在线观看| 欧美人与性动xxxx| 欧美一区二区三区四区视频 | 首页国产欧美日韩丝袜| 午夜精品久久久久影视| 日韩av中文字幕一区二区三区| 天天亚洲美女在线视频| 日本一不卡视频| 免费观看91视频大全| 久久91精品久久久久久秒播| 国模套图日韩精品一区二区| 丁香另类激情小说| 97超碰欧美中文字幕| 欧美在线综合视频| 91精品久久久久久久99蜜桃| 精品三级在线看| 日本一区二区三区在线不卡| 亚洲人亚洲人成电影网站色| 香蕉av福利精品导航| 久久99国产精品久久99| 成人污污视频在线观看| 9l国产精品久久久久麻豆| 欧美三级在线视频| 精品国产一区二区精华| 亚洲欧洲99久久| 日韩国产高清在线| 国产精品一品二品| 欧美主播一区二区三区美女| 日韩欧美国产综合| 国产精品伦理在线| 日本女人一区二区三区| 国产不卡在线一区| 欧美日韩一区二区三区在线看| 精品日韩一区二区三区| 亚洲精品免费看| 久久99精品久久久久婷婷| 99久久精品国产网站| 91精品国产免费| 国产精品久久久久一区二区三区共| 亚洲成人你懂的| 国产精品1区二区.| 欧美精品电影在线播放| 国产精品久久影院| 久久精品av麻豆的观看方式| 93久久精品日日躁夜夜躁欧美| 91精品国产一区二区三区香蕉| 国产精品久久综合| 美女在线一区二区| 欧美日韩综合色| 国产精品久久毛片a| 精品一区二区成人精品| 欧美影视一区在线| 国产精品美女久久久久久 | 精品久久久久一区二区国产| 一区二区三区色| 成+人+亚洲+综合天堂| 日韩欧美亚洲国产精品字幕久久久 | 久久久国产午夜精品| 五月天久久比比资源色| 色综合久久久久久久| 国产欧美一区二区在线| 日韩1区2区3区| 欧美日韩在线播| 亚洲九九爱视频| 成人激情午夜影院| 久久久国际精品| 九九九久久久精品| 在线不卡一区二区| 亚洲香蕉伊在人在线观| 91美女片黄在线观看91美女| 国产精品乱子久久久久| 成人伦理片在线| 国产午夜精品一区二区三区四区| 老司机精品视频线观看86| 欧美日韩二区三区| 亚洲国产另类精品专区| 欧美在线观看你懂的| 亚洲一区二区四区蜜桃| 91久久精品一区二区| 一区二区三区四区不卡视频|