亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 07-03.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Key Length</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=07//-->
<!--PAGES=155-157//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="07-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="07-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Viruses</I></B></FONT></P>
<P>The greatest difficulty in getting millions of computers to work on a brute-force attack is convincing millions of computer owners to participate. You could ask politely, but that&#146;s time-consuming and they might say no. You could try breaking into their machines, but that&#146;s even more time-consuming and you might get arrested. You could also use a computer virus to spread the cracking program more efficiently over as many computers as possible.
</P>
<P>This is a particularly insidious idea, first presented in [1593]. The attacker writes and lets loose a computer virus. This virus doesn&#146;t reformat the hard drive or delete files; it works on a brute-force cryptanalysis problem whenever the computer is idle. Various studies have shown that microcomputers are idle between 70 percent and 90 percent of the time, so the virus shouldn&#146;t have any trouble finding time to work on its task. If it is otherwise benign, it might even escape notice while it does its work.</P>
<P>Eventually, one machine will stumble on the correct key. At this point there are two ways of proceeding. First, the virus could spawn a different virus. It wouldn&#146;t do anything but reproduce and delete any copies of the cracking virus it finds but would contain the information about the correct key. This new virus would simply propagate through the computer world until it lands on the computer of the person who wrote the original virus.</P>
<P>A second, sneakier approach would be for the virus to display this message on the screen:</P>
<!-- CODE SNIP //-->
<PRE>
    There is a serious bug in this computer.
    Please call 1-800-123-4567 and read the
    following 64-bit number to the operator:

    xxxx xxxx xxxx xxxx

    There is a $100 reward for the first
    person to report this bug.
</PRE>
<!-- END CODE SNIP //-->
<P>How efficient is this attack? Assume the typical infected computer tries a thousand keys per second. This rate is far less than the computer&#146;s maximum potential, because we assume it will be doing other things occasionally. Also assume that the typical virus infects 10 million machines. This virus can break a 56-bit key in 83 days and a 64-bit key in 58 years. You might have to bribe the antiviral software makers, but that&#146;s your problem. Any increase in computer speeds or the virus infection rate would, of course, make this attack more efficient.
</P>
<P><FONT SIZE="+1"><B><I>The Chinese Lottery</I></B></FONT></P>
<P>The Chinese Lottery is an eclectic, but possible, suggestion for a massively parallel cryptanalysis machine [1278]. Imagine that a brute-force, million-test-per-second cracking chip was built into every radio and television sold. Each chip is programmed to test a different set of keys automatically upon receiving a plaintext/ciphertext pair over the airwaves. Every time the Chinese government wants to break a key, it broadcasts the data. All the radios and televisions in the country start chugging away. Eventually, the correct key will appear on someone&#146;s display, somewhere in the country. The Chinese government pays a prize to that person; this makes sure that the result is reported promptly and properly, and also helps the sale of radios and televisions with the cracking chips.
</P>
<P>If every man, woman, and child in China owns a radio or television, then the correct key to a 56-bit algorithm will appear in 61 seconds. If only 1 in 10 Chinese owns a radio or television&#151;closer to reality&#151;the correct key will appear in 10 minutes. The correct key for a 64-bit algorithm will appear in 4.3 hours&#151;43 hours if only 1 in 10 owns a radio or television.</P>
<P>Some modifications are required to make this attack practical. First, it would be easier to have each chip try random keys instead of a unique set of keys. This would make the attack about 39 percent slower&#151;not much in light of the numbers we&#146;re working with. Also, the Chinese Communist party would have to mandate that every person listen to or watch a certain show at a certain time, just to make sure that all of the radios and televisions are operating when the plaintext/ciphertext pair is broadcast. Finally, everyone would have to be instructed to call a Central-Party-Whatever-It&#146;s-Called if a key ever shows up on their screen, and then to read off the string of numbers appearing there.</P>
<P>Table 7.2 shows the effectiveness of the Chinese Lottery for different countries and different key lengths. China would clearly be in the best position to launch such an attack if they have to outfit every man, woman, and child with their own television or radio. The United States has fewer people but a lot more equipment per capita. The state of Wyoming could break a 56-bit key all by itself in less than a day.</P>
<P><FONT SIZE="+1"><B><I>Biotechnology</I></B></FONT></P>
<P>If biochips are possible, then it would be foolish not to use them as a distributed brute-force cryptanalysis tool. Consider a hypothetical animal, unfortunately called a &#147;DESosaur&#148; [1278]. It consists of biological cells capable of testing possible keys. The plaintext/ciphertext pair is broadcast to the cells via some optical channel (these cells are transparent, you see). Solutions are carried to the DESosaur&#146;s speech organ via special cells that travel through the animal&#146;s circulatory system.
</P>
<P>The typical dinosaur had about 10<SUP>14</SUP> cells (excluding bacteria). If each of them can perform a million encryptions per second (granted, this is a big if), breaking a 56-bit key would take seven ten-thousandths of a second. Breaking a 64-bit key would take less than two tenths of a second. Breaking a 128-bit key would still take 10<SUP>11</SUP> years, though.</P>
<TABLE WIDTH="100%"><TR>
<TH CAPTION ALIGN="CENTER" COLSPAN="5">Table 7.2<BR>Brute-Force Cracking Estimates for Chinese Lottery
<TR>
<TD COLSPAN="5"><HR>
<TR>
<TH WIDTH="25%" ALIGN="CENTER" VALIGN="BOTTOM">
<TH WIDTH="20%" ALIGN="CENTER" VALIGN="BOTTOM">
<TH WIDTH="20%" ALIGN="CENTER" VALIGN="BOTTOM">
<TH WIDTH="20%" ALIGN="CENTER" VALIGN="BOTTOM">
<TH WIDTH="15%" ALIGN="CENTER" VALIGN="BOTTOM">
<TR>
<TH ALIGN="LEFT" VALIGN="BOTTOM">
<TH ALIGN="CENTER" VALIGN="BOTTOM">
<TH ALIGN="CENTER" VALIGN="BOTTOM">
<TH COLSPAN="2" ALIGN="CENTER" VALIGN="BOTTOM">Time to Break
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">
<TD ALIGN="CENTER" VALIGN="BOTTOM">
<TD ALIGN="CENTER" VALIGN="BOTTOM">
<TD COLSPAN="2"><HR>
<TR>
<TH ALIGN="LEFT" VALIGN="BOTTOM">Country
<TH ALIGN="CENTER" VALIGN="BOTTOM">Population
<TH ALIGN="CENTER" VALIGN="BOTTOM"># of Televisions/Radios
<TH ALIGN="CENTER" VALIGN="BOTTOM">56-bit
<TH ALIGN="CENTER" VALIGN="BOTTOM">64-bit
<TR>
<TD COLSPAN="5"><HR>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">China
<TD ALIGN="CENTER" VALIGN="BOTTOM">1,190,431,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">257,000,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">280 seconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">20 hours
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">U.S.
<TD ALIGN="CENTER" VALIGN="BOTTOM">260,714,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">739,000,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">97 seconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">6.9 hours
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">Iraq
<TD ALIGN="CENTER" VALIGN="BOTTOM">19,890,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">4,730,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">4.2 hours
<TD ALIGN="CENTER" VALIGN="BOTTOM">44 days
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">Israel
<TD ALIGN="CENTER" VALIGN="BOTTOM">5,051,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">3,640,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">5.5 hours
<TD ALIGN="CENTER" VALIGN="BOTTOM">58 days
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">Wyoming
<TD ALIGN="CENTER" VALIGN="BOTTOM">470,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">1,330,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">15 hours
<TD ALIGN="CENTER" VALIGN="BOTTOM">160 days
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">Winnemucca, NV
<TD ALIGN="CENTER" VALIGN="BOTTOM">6,100
<TD ALIGN="CENTER" VALIGN="BOTTOM">17,300
<TD ALIGN="CENTER" VALIGN="BOTTOM">48 days
<TD ALIGN="CENTER" VALIGN="BOTTOM">34 years
<TR>
<TD COLSPAN="5"><HR>
<TR>
<TD COLSPAN="3" ALIGN="LEFT" VALIGN="BOTTOM">(All data is from the <I>1995 World Almanac and Book of Facts.</I>)
</TABLE>
<P>Another biological approach is to use genetically engineered cryptanalytic algae that are capable of performing brute-force attacks against cryptographic algorithms [1278]. These organisms would make it possible to construct a distributed machine with more processors because they could cover a larger area. The plaintext/ciphertext pair could be broadcast by satellite. If an organism found the result, it could induce the nearby cells to change color to communicate the solution back to the satellite.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="07-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="07-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产亚洲欧美日韩日本| 成人理论电影网| 捆绑调教一区二区三区| 波多野结衣的一区二区三区| 欧美老人xxxx18| 国产精品免费aⅴ片在线观看| 五月婷婷久久丁香| 91免费看`日韩一区二区| 欧美精品一区二| 日本中文字幕一区| 在线观看区一区二| 中文字幕在线不卡| 国产a久久麻豆| 精品欧美乱码久久久久久| 亚洲第四色夜色| 欧美国产精品专区| 91美女片黄在线| 精品三级av在线| 亚洲婷婷在线视频| 亚洲国产精品一区二区久久| 国产毛片精品国产一区二区三区| 5月丁香婷婷综合| 亚洲一区二区三区四区五区黄| 国产xxx精品视频大全| 精品国产免费人成电影在线观看四季| 亚洲影院在线观看| 91视频com| 自拍偷拍国产精品| 91一区在线观看| 日韩一区日韩二区| 99国产精品国产精品久久| 国产精品女主播在线观看| 国产精品一级二级三级| 久久久久97国产精华液好用吗| 国产一区二区美女诱惑| 亚洲精品一区二区三区蜜桃下载 | 精品伦理精品一区| 精品久久久久久久久久久久久久久 | 亚洲欧美电影院| 成人午夜视频免费看| 久久婷婷综合激情| 国产91露脸合集magnet| 国产免费久久精品| 成人爽a毛片一区二区免费| 久久免费的精品国产v∧| 精一区二区三区| 久久久久久久网| 成人高清在线视频| 一区二区三区中文免费| 欧美性xxxxxx少妇| 理论电影国产精品| 国产欧美一区二区在线| 亚洲色图第一区| 欧美国产一区在线| 在线影院国内精品| 久久综合久久综合亚洲| 国产剧情一区二区| 亚洲品质自拍视频网站| 欧美日韩亚洲综合在线 | 色中色一区二区| 亚洲成av人片在线观看| 久久精品水蜜桃av综合天堂| 不卡av电影在线播放| 亚洲成人手机在线| 国产亚洲精久久久久久| 日本高清免费不卡视频| 美女国产一区二区三区| 中文字幕中文字幕中文字幕亚洲无线 | 欧美精品aⅴ在线视频| 色呦呦国产精品| 男人的天堂久久精品| 中文欧美字幕免费| 欧美二区乱c少妇| 国产成人精品一区二区三区网站观看| 亚洲卡通动漫在线| 久久人人超碰精品| 欧美日本一道本| 成人亚洲一区二区一| 日本不卡视频在线观看| 亚洲免费av高清| 精品毛片乱码1区2区3区| 欧美又粗又大又爽| 粉嫩13p一区二区三区| 美女一区二区视频| 亚洲一区二区精品视频| 国产欧美日韩精品在线| 911精品国产一区二区在线| 99精品国产91久久久久久 | 亚洲国产日韩精品| 国产欧美日韩精品一区| 91精品国产aⅴ一区二区| 色哟哟一区二区| 成人午夜大片免费观看| 韩国欧美国产1区| 蜜臀久久久99精品久久久久久| 亚洲精品视频一区| 欧美国产国产综合| 久久久精品综合| 久久看人人爽人人| 2020国产精品自拍| 欧美大片在线观看| 欧美一区二区精品久久911| 欧美少妇一区二区| 欧美在线观看一二区| 色哟哟一区二区| 色哟哟精品一区| 色婷婷久久久综合中文字幕| jizzjizzjizz欧美| www.综合网.com| av在线综合网| 91色porny| 91福利社在线观看| 欧美日韩久久不卡| 欧美福利电影网| 欧美一三区三区四区免费在线看| 欧美人牲a欧美精品| 欧美日韩国产一二三| 欧美日韩一区二区电影| 在线观看91av| 日韩视频免费直播| 久久这里只有精品6| 久久九九久精品国产免费直播| 久久综合狠狠综合久久综合88 | 欧美日韩在线播| 制服丝袜亚洲精品中文字幕| 欧美一区二区啪啪| 久久久www成人免费毛片麻豆| 国产欧美久久久精品影院| 国产精品久线在线观看| 亚洲精品国产无套在线观| 亚洲va中文字幕| 欧美96一区二区免费视频| 国产高清不卡一区| 99国产精品国产精品久久| 欧美亚洲日本一区| 日韩欧美黄色影院| 欧美经典一区二区三区| 亚洲天堂成人在线观看| 无吗不卡中文字幕| 国产一区二区三区久久久| 99riav久久精品riav| 91精品国产美女浴室洗澡无遮挡| 国产视频视频一区| 亚洲午夜视频在线观看| 麻豆91精品视频| 色综合天天综合在线视频| 欧美片在线播放| 欧美激情在线看| 亚洲成a人v欧美综合天堂| 国内精品免费**视频| 91一区二区三区在线播放| 911精品国产一区二区在线| 亚洲国产岛国毛片在线| 亚洲高清视频在线| 国产福利电影一区二区三区| 91激情五月电影| 久久久精品综合| 亚洲成人一区在线| 国产91高潮流白浆在线麻豆| 欧美日韩一本到| 18欧美乱大交hd1984| 久久99久国产精品黄毛片色诱| 成人av免费在线播放| 日韩视频一区二区三区| 一区二区激情小说| 粉嫩在线一区二区三区视频| 在线成人免费视频| 亚洲欧美日韩系列| 国产激情一区二区三区四区| 欧美人与禽zozo性伦| 亚洲欧洲综合另类| 国产成人一区二区精品非洲| 欧美日韩国产成人在线91| 国产精品国产三级国产aⅴ入口 | 欧美成人精品1314www| 亚洲一区二区视频在线| av资源站一区| 国产精品色婷婷久久58| 韩国欧美国产1区| 日韩美女视频在线| 天天影视网天天综合色在线播放| 一本色道久久加勒比精品| 欧美国产日韩一二三区| 久久精品99国产精品| 91麻豆精品91久久久久久清纯| 亚洲激情自拍视频| 色综合天天在线| 国产精品美女久久久久aⅴ| 国产精品综合av一区二区国产馆| 日韩欧美激情四射| 久久精品国产澳门| 精品剧情v国产在线观看在线| 琪琪久久久久日韩精品| 欧美精三区欧美精三区| 亚洲电影你懂得| 欧美日韩在线三级| 日韩av一区二区三区| 91精品欧美一区二区三区综合在| 天天色综合成人网| 7777精品伊人久久久大香线蕉完整版 |