亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 07-05.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Key Length</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=07//-->
<!--PAGES=159-162//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="07-04.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="07-06.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>The picture gets even worse. A new factoring algorithm has taken over from the quadratic sieve: the general number field sieve. In 1989 mathematicians would have told you that the general number field sieve would never be practical. In 1992 they would have told you that it was practical, but only faster than the quadratic sieve for numbers greater than 130 to 150 digits or so. Today it is known to be faster than the quadratic sieve for numbers well below 116 digits [472,635]. The general number field sieve can factor a 512-bit number over 10 times faster than the quadratic sieve. The algorithm would require less than a year to run on an 1800-node Intel Paragon. Table 7.4 gives the number of mips-years required to factor numbers of different sizes, given current implementations of the general number field sieve [1190].
</P>
<TABLE WIDTH="100%"><TR>
<TH CAPTION ALIGN="CENTER" COLSPAN="3">Table 7.3<BR>Factoring Using the Quadratic Sieve
<TR>
<TD COLSPAN="3"><HR>
<TR>
<TH ALIGN="LEFT" VALIGN="BOTTOM">Year
<TH ALIGN="CENTER" VALIGN="BOTTOM"># of decimal<BR>digits factored
<TH ALIGN="CENTER" VALIGN="BOTTOM">How many times harder to<BR>factor a 512-bit number
<TR>
<TD COLSPAN="3"><HR>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">1983
<TD ALIGN="CENTER" VALIGN="BOTTOM">71
<TD ALIGN="CENTER" VALIGN="BOTTOM">&gt20 million
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">1985
<TD ALIGN="CENTER" VALIGN="BOTTOM">80
<TD ALIGN="CENTER" VALIGN="BOTTOM">&gt2 million
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">1988
<TD ALIGN="CENTER" VALIGN="BOTTOM">90
<TD ALIGN="CENTER" VALIGN="BOTTOM">250,000
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">1989
<TD ALIGN="CENTER" VALIGN="BOTTOM">100
<TD ALIGN="CENTER" VALIGN="BOTTOM">30,000
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">1993
<TD ALIGN="CENTER" VALIGN="BOTTOM">120
<TD ALIGN="CENTER" VALIGN="BOTTOM">500
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">1994
<TD ALIGN="CENTER" VALIGN="BOTTOM">129
<TD ALIGN="CENTER" VALIGN="BOTTOM">100
<TR>
<TD COLSPAN="3"><HR>
</TABLE>
<P>And the general number field sieve is still getting faster. Mathematicians keep coming up with new tricks, new optimizations, new techniques. There&#146;s no reason to think this trend won&#146;t continue. A related algorithm, the special number field sieve, can already factor numbers of a certain specialized form&#151;numbers not generally used for cryptography&#151;much faster than the general number field sieve can factor general numbers of the same size. It is not unreasonable to assume that the general number field sieve can be optimized to run this fast [1190]; it is possible that the NSA already knows how to do this. Table 7.5 gives the number of mips-years required for the special number field sieve to factor numbers of different lengths [1190].
</P>
<P>At a European Institute for System Security workshop in 1991, the participants agreed that a 1024-bit modulus should be sufficient for long-term secrets through 2002 [150]. However, they warned: &#147;Although the participants of this workshop feel best qualified in their respective areas, this statement [with respect to lasting security] should be taken with caution.&#148; This is good advice.</P>
<P>The wise cryptographer is ultra-conservative when choosing public-key key lengths. To determine how long a key you need requires you to look at both the intended security and lifetime of the key, and the current state-of-the-art of factoring. Today you need a 1024-bit number to get the level of security you got from a 512-bit number in the early 1980s. If you want your keys to remain secure for 20 years, 1024 bits is likely too short.</P>
<P>Even if your particular secrets aren&#146;t worth the effort required to factor your modulus, you may be at risk. Imagine an automatic banking system that uses RSA for security. Mallory can stand up in court and say: &#147;Did you read in the newspaper in 1994 that RSA-129 was broken, and that 512-bit numbers can be factored by any organization willing to spend a few million dollars and wait a few months? My bank uses 512-bit numbers for security and, by the way, I didn&#146;t make these seven withdrawals.&#148; Even if Mallory is lying, the judge will probably put the onus on the bank to prove it.</P>
<TABLE WIDTH="50%"><TR>
<TH CAPTION ALIGN="CENTER" COLSPAN="2">Table 7.4<BR>Factoring Using the General Number Field Sieve
<TR>
<TD COLSPAN="2"><HR>
<TR>
<TH ALIGN="LEFT" VALIGN="BOTTOM"># of bits
<TH ALIGN="CENTER" VALIGN="BOTTOM">Mips-years required to factor
<TR>
<TD COLSPAN="2"><HR>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">512
<TD ALIGN="CENTER" VALIGN="BOTTOM">30,000
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">768
<TD ALIGN="CENTER" VALIGN="BOTTOM">2*10<SUP>8</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">1024
<TD ALIGN="CENTER" VALIGN="BOTTOM">3*10<SUP>11</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">1280
<TD ALIGN="CENTER" VALIGN="BOTTOM">1*10<SUP>14</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">1536
<TD ALIGN="CENTER" VALIGN="BOTTOM">3*10<SUP>16</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">2048
<TD ALIGN="CENTER" VALIGN="BOTTOM">3*10<SUP>20</SUP>
<TR>
<TD COLSPAN="2"><HR>
</TABLE>
<P>
</P>
<TABLE WIDTH="50%"><TR>
<TH CAPTION ALIGN="CENTER" COLSPAN="2">Table 7.5<BR>Factoring Using the Special Number Field Sieve
<TR>
<TD COLSPAN="2"><HR>
<TR>
<TH ALIGN="LEFT" VALIGN="BOTTOM"># of bits
<TH ALIGN="CENTER" VALIGN="BOTTOM">Mips-years required to factor
<TR>
<TD COLSPAN="2"><HR>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">512
<TD ALIGN="CENTER" VALIGN="BOTTOM">&lt200
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">768
<TD ALIGN="CENTER" VALIGN="BOTTOM">100,000
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">1024
<TD ALIGN="CENTER" VALIGN="BOTTOM">3*10<SUP>7</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">1280
<TD ALIGN="CENTER" VALIGN="BOTTOM">3*10<SUP>9</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">1536
<TD ALIGN="CENTER" VALIGN="BOTTOM">2*10<SUP>11</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">2048
<TD ALIGN="CENTER" VALIGN="BOTTOM">4*10<SUP>14</SUP>
<TR>
<TD COLSPAN="2"><HR>
</TABLE>
<P>Why not use 10,000-bit keys? You can, but remember that you pay a price in computation time as your keys get longer. You want a key long enough to be secure, but short enough to be computationally usable.
</P>
<P>Earlier in this section I called making predictions foolish. Now I am about to make some. Table 7.6 gives my recommendations for public-key lengths, depending on how long you require the key to be secure. There are three key lengths for each year, one secure against an individual, one secure against a major corporation, and the third secure against a major government.</P>
<P>Here are some assumptions from [66]:</P>
<BLOCKQUOTE><P>We believe that we could acquire 100 thousand machines without superhuman or unethical efforts. That is, we would <I>not</I> set free an Internet worm or virus to find resources for us. Many organizations have several thousand machines each on the net. Making use of their facilities would require skillful diplomacy, but should not be impossible. Assuming the 5 mips average power, and one year elapsed time, it is not too unreasonable to embark on a project which would require half a million mips years.</P>
</BLOCKQUOTE><P>The project to factor the 129-digit number harnessed an estimated 0.03 percent of the total computing power of the Internet [1190], and they didn&#146;t even try very hard. It isn&#146;t unreasonable to assume that a well-publicized project can harness 2 percent of the world&#146;s computing power for a year.
</P>
<P>Assume a dedicated cryptanalyst can get his hands on 10,000 mips-years, a large corporation can get 10<SUP>7</SUP> mips-years, and that a large government can get 10<SUP>9</SUP> mips-years. Also assume that computing power will increase by a factor of 10 every five years. And finally, assume that advances in factoring mathematics allow us to factor general numbers at the speeds of the special number field sieve. (This isn&#146;t possible yet, but the breakthrough could occur at any time.) Table 7.6 recommends different key lengths for security during different years.</P>
<TABLE WIDTH="80%"><TR>
<TH CAPTION ALIGN="CENTER" COLSPAN="4">Table 7.6<BR>Recommended Public-key Key Lengths (in bits)
<TR>
<TD COLSPAN="4"><HR>
<TR>
<TH ALIGN="LEFT" VALIGN="BOTTOM">Year
<TH ALIGN="CENTER" VALIGN="BOTTOM">vs. Individual
<TH ALIGN="CENTER" VALIGN="BOTTOM">vs. Corporation
<TH ALIGN="CENTER" VALIGN="BOTTOM">vs. Government
<TR>
<TD COLSPAN="4"><HR>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">1995
<TD ALIGN="CENTER" VALIGN="BOTTOM">768
<TD ALIGN="CENTER" VALIGN="BOTTOM">1280
<TD ALIGN="CENTER" VALIGN="BOTTOM">1536
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">2000
<TD ALIGN="CENTER" VALIGN="BOTTOM">1024
<TD ALIGN="CENTER" VALIGN="BOTTOM">1280
<TD ALIGN="CENTER" VALIGN="BOTTOM">1536
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">2005
<TD ALIGN="CENTER" VALIGN="BOTTOM">1280
<TD ALIGN="CENTER" VALIGN="BOTTOM">1536
<TD ALIGN="CENTER" VALIGN="BOTTOM">2048
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">2010
<TD ALIGN="CENTER" VALIGN="BOTTOM">1280
<TD ALIGN="CENTER" VALIGN="BOTTOM">1536
<TD ALIGN="CENTER" VALIGN="BOTTOM">2048
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">2015
<TD ALIGN="CENTER" VALIGN="BOTTOM">1536
<TD ALIGN="CENTER" VALIGN="BOTTOM">2048
<TD ALIGN="CENTER" VALIGN="BOTTOM">2048
<TR>
<TD COLSPAN="4"><HR>
</TABLE>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="07-04.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="07-06.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色综合咪咪久久| 欧美中文一区二区三区| 一区二区激情视频| 欧美精品一区二区三区蜜桃视频| 婷婷丁香久久五月婷婷| 国产精品免费丝袜| 欧美不卡123| 欧美日本韩国一区| 99久久婷婷国产| 国产在线视频不卡二| 亚洲成av人片一区二区| 国产精品久久久久影院| 日韩视频一区二区| 欧美性猛交一区二区三区精品 | 国产一区二区视频在线播放| 一区二区三区在线免费观看| 中文字幕精品三区| 精品国产一区二区三区忘忧草| 欧美性色欧美a在线播放| 成人精品国产福利| 国产成人在线网站| 九一九一国产精品| 视频在线观看一区| 午夜精品一区二区三区免费视频| 国产精品色在线观看| 欧美videos中文字幕| 91精品国产综合久久久久久漫画| 色综合久久中文字幕| 成人午夜激情影院| 成人性色生活片| 国产剧情在线观看一区二区| 国内外成人在线视频| 免播放器亚洲一区| 日韩1区2区日韩1区2区| 日韩av电影免费观看高清完整版| 性欧美疯狂xxxxbbbb| 五月激情综合网| 五月激情综合婷婷| 蜜桃久久av一区| 精品亚洲成av人在线观看| 久久99精品国产91久久来源| 免费成人在线观看| 狠狠色丁香久久婷婷综合丁香| 日韩电影免费在线看| 视频在线观看一区二区三区| 日韩中文字幕1| 麻豆精品精品国产自在97香蕉| 青椒成人免费视频| 九九**精品视频免费播放| 国产综合久久久久久鬼色| 精品亚洲国产成人av制服丝袜| 狠狠色丁香久久婷婷综合_中| 国产一区二区剧情av在线| 国产乱码精品一区二区三区忘忧草| 国产毛片精品国产一区二区三区| 国产精品99久久久久久有的能看| 粉嫩一区二区三区性色av| 丁香婷婷综合激情五月色| 99热国产精品| 欧美日韩www| 国产视频在线观看一区二区三区| 国产精品国产三级国产| 亚洲与欧洲av电影| 日本女人一区二区三区| 国产一区二区三区精品欧美日韩一区二区三区 | 欧美日韩一区二区三区四区五区 | 国产精品乱人伦一区二区| 亚洲欧美视频一区| 五月综合激情婷婷六月色窝| 日韩高清不卡一区二区三区| 久久www免费人成看片高清| 国产一区二区按摩在线观看| 成人美女在线视频| 色婷婷久久久综合中文字幕| 欧美二区在线观看| 国产欧美精品一区二区色综合朱莉 | 欧美日韩国产乱码电影| 日韩一区二区电影在线| 国产日产欧产精品推荐色| 一区二区三区美女视频| 免费人成网站在线观看欧美高清| 国产盗摄视频一区二区三区| 欧洲亚洲国产日韩| 精品日韩在线观看| 综合久久给合久久狠狠狠97色 | 蓝色福利精品导航| 成人综合婷婷国产精品久久蜜臀| 色婷婷av一区| 欧美变态tickle挠乳网站| 亚洲女性喷水在线观看一区| 美女在线视频一区| 91亚洲男人天堂| 欧美xxx久久| 一区二区三区av电影 | 秋霞电影一区二区| 99re视频这里只有精品| 日韩欧美国产综合| 综合婷婷亚洲小说| 国产乱码字幕精品高清av | 欧美经典一区二区| 亚洲国产成人va在线观看天堂| 国产精品99久久久久久有的能看| 在线观看成人免费视频| 国产欧美日韩视频一区二区| 日韩福利电影在线观看| av电影在线观看一区| 精品国产一区二区三区忘忧草| 亚洲精品高清在线| 风间由美一区二区三区在线观看 | 久久精品亚洲乱码伦伦中文| 亚洲aⅴ怡春院| 99久久精品国产精品久久| 欧美成人艳星乳罩| 亚洲成人av福利| 91视频在线观看免费| 久久亚洲精精品中文字幕早川悠里| 一区二区三区四区乱视频| 懂色av中文一区二区三区| 精品噜噜噜噜久久久久久久久试看| 一区二区三区在线观看动漫| 国产福利精品导航| 日韩色在线观看| 视频精品一区二区| 欧美伊人久久久久久午夜久久久久| 国产精品久久久久一区二区三区共| 国产一区免费电影| ww亚洲ww在线观看国产| 美女视频一区在线观看| 欧美一区二区三区的| 亚洲成人av中文| 欧美日韩中字一区| 亚洲午夜精品网| 欧美色老头old∨ideo| 一区二区三区日韩| 欧美性xxxxxx少妇| 午夜精品免费在线| 6080日韩午夜伦伦午夜伦| 婷婷一区二区三区| 日韩一区二区三区视频| 麻豆91在线观看| 日韩免费高清av| 韩国av一区二区三区在线观看| 久久先锋资源网| 成人一二三区视频| 亚洲欧洲日韩av| 在线看日本不卡| 亚洲va中文字幕| 欧美一区二区在线播放| 精品在线免费视频| 精品国产一区二区三区忘忧草 | 最近中文字幕一区二区三区| 99久久免费视频.com| 一区二区免费看| 欧美高清视频不卡网| 国产在线精品免费av| 国产女人18水真多18精品一级做 | 精品一区中文字幕| 久久精品亚洲精品国产欧美kt∨| 不卡一区在线观看| 亚洲综合精品久久| 欧美一级电影网站| 国产91精品欧美| 亚洲一区在线观看免费观看电影高清 | 国产精品丝袜久久久久久app| 93久久精品日日躁夜夜躁欧美| 一区二区三区在线视频免费| 在线电影欧美成精品| 九色porny丨国产精品| 国产日韩欧美亚洲| 色老头久久综合| 久久av资源网| 亚洲欧洲韩国日本视频| 欧美男同性恋视频网站| 狠狠狠色丁香婷婷综合久久五月| 中文字幕国产精品一区二区| 欧美三级韩国三级日本一级| 韩国一区二区在线观看| 亚洲欧美日韩一区二区| 欧美丰满少妇xxxxx高潮对白| 国产精品中文字幕日韩精品| 亚洲日本在线a| 日韩欧美国产三级| 91网站在线观看视频| 美腿丝袜一区二区三区| 亚洲另类色综合网站| 日韩精品一区二区三区老鸭窝| 91亚洲精华国产精华精华液| 日本aⅴ亚洲精品中文乱码| 国产精品毛片高清在线完整版| 欧美日韩国产片| av资源网一区| 精品在线免费视频| 亚洲无人区一区| 久久久国产精华| 欧美丰满一区二区免费视频| 大尺度一区二区| 另类中文字幕网| 一级中文字幕一区二区| 中文字幕欧美激情| 日韩午夜激情电影|