亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 07-07.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Key Length</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=07//-->
<!--PAGES=164-166//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="07-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="07-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Quantum Computing</I></B></FONT></P>
<P>Now, it gets even weirder. The underlying principle behind quantum computing involves Einstein&#146;s wave-particle duality. A photon can simultaneously exist in a large number of states. A classic example is that a photon behaves like a wave when it encounters a partially silvered mirror; it is both reflected and transmitted, just as an ocean wave striking a seawall with a small opening in it will both reflect off the wall and pass through it. However, when a photon is measured, it behaves like a particle and only a single state can be detected.
</P>
<P>In [1443], Peter Shor outlines a design for a factoring machine based on quantum mechanical principles. Unlike a classical computer, which can be thought of as having a single, fixed state at a given time, a quantum computer has an internal wave function, which is a superposition of a combination of the possible basis states. Computations transform the wave function, altering the entire set of states in a single operation. In this way, a quantum computer is an improvement over classical finite-state automata: It uses quantum properties to allow it to factor in polynomial time, theoretically allowing one to break cryptosystems based on factoring or the discrete logarithm problem.</P>
<P>The consensus is that quantum computers are compatible with the fundamental laws of quantum mechanics. However, it is unlikely that a quantum factoring machine will be built in the foreseeable future...if ever. One major obstacle is the problem of decoherence, which causes superimposed waveforms to lose their distinctness and makes the computer fail. Decoherence will make a quantum computer running at 1&#176; Kelvin fail after just one nanosecond. Additionally, an enormous number of gates would be required to build a quantum factoring device; this may render the machine impossible to build. Shor&#146;s design requires a complete modular exponentiator. No internal clock can be used, so millions or possibly billions of individual gates would be required to factor cryptographically significant numbers. If <I>n</I> quantum gates have some minimum probability <I>p</I> of failure, the average number of trials required per successful run is (1/(1 &#150; <I>p</I>))<SUP><I>n</I></SUP>. The number of gates required presumably grows polynomially with the length (in bits) of the number, so the number of trials required would be superexponential with the length of the numbers used&#151;worse than factoring by trial division!</P>
<P>So, while quantum factorization is an area of great academic excitement, it is extremely unlikely that it will be practical in the foreseeable future. But don&#146;t say I didn&#146;t warn you.</P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">7.3 Comparing Symmetric and Public-Key Key Length</FONT></H3>
<P>A system is going to be attacked at its weakest point. If you are designing a system that uses both symmetric and public-key cryptography, the key lengths for each type of cryptography should be chosen so that it is equally difficult to attack the system via each mechanism. It makes no sense to use a symmetric algorithm with a 128-bit key together with a public-key algorithm with a 386-bit key, just as it makes no sense to use a symmetric algorithm with a 56-bit key together with a public-key algorithm with a 1024-bit key.
</P>
<P>Table 7.9 lists public-key modulus lengths whose factoring difficulty roughly equals the difficulty of a brute-force attack for popular symmetric key lengths.</P>
<P>This table says that if you are concerned enough about security to choose a symmetric algorithm with a 112-bit key, you should choose a modulus length for your public-key algorithm of about 1792 bits. In general, though, you should choose a public-key length that is more secure than your symmetric-key length. Public keys generally stay around longer, and are used to protect more information.</P>
<H3><A NAME="Heading5"></A><FONT COLOR="#000077">7.4 Birthday Attacks against One-Way Hash Functions</FONT></H3>
<P>There are two brute-force attacks against a one-way hash function. The first is the most obvious: Given the hash of message, <I>H</I>(<I>M</I>), an adversary would like to be able to create another document, <I>M&#180;,</I> such that <I>H</I>(<I>M</I>) = <I>H</I>(<I>M&#180;</I>). The second attack is more subtle: An adversary would like to find two random messages, <I>M,</I> and <I>M&#180;,</I> such that <I>H</I>(<I>M</I>) = <I>H</I>(<I>M&#180;</I>). This is called a <B>collision,</B> and it is a far easier attack than the first one.</P>
<TABLE WIDTH="50%"><TR>
<TH CAPTION ALIGN="CENTER" COLSPAN="3">Table 7.9<BR>Symmetric and Public-key Key Lengths with Similar Resistances to Brute-Force Attacks
<TR>
<TD COLSPAN="3"><HR>
<TR>
<TH WIDTH="10%">
<TH ALIGN="CENTER" VALIGN="BOTTOM">Symmetric<BR>Key Length
<TH ALIGN="CENTER" VALIGN="BOTTOM">Public-key<BR>Key Length
<TR>
<TD COLSPAN="3"><HR>
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">
<TD ALIGN="CENTER" VALIGN="BOTTOM">56 bits
<TD ALIGN="CENTER" VALIGN="BOTTOM">384 bits
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">
<TD ALIGN="CENTER" VALIGN="BOTTOM">64 bits
<TD ALIGN="CENTER" VALIGN="BOTTOM">512 bits
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">
<TD ALIGN="CENTER" VALIGN="BOTTOM">80 bits
<TD ALIGN="CENTER" VALIGN="BOTTOM">768 bits
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">
<TD ALIGN="CENTER" VALIGN="BOTTOM">112 bits
<TD ALIGN="CENTER" VALIGN="BOTTOM">1792 bits
<TR>
<TD VALIGN="BOTTOM" ALIGN="LEFT" VALIGN="BOTTOM">
<TD ALIGN="CENTER" VALIGN="BOTTOM">128 bits
<TD ALIGN="CENTER" VALIGN="BOTTOM">2304 bits
<TR>
<TD COLSPAN="3"><HR>
<TR>
</TABLE>
<P>The birthday paradox is a standard statistics problem. How many people must be in a room for the chance to be greater than even that one of them shares your birthday? The answer is 253. Now, how many people must there be for the chance to be greater than even that at least two of them will share the same birthday? The answer is surprisingly low: 23. With only 23 people in the room, there are still 253 different <I>pairs</I> of people in the room.</P>
<P>Finding someone with a specific birthday is analogous to the first attack; finding two people with the same random birthday is analogous to the second attack. The second attack is commonly known as a <B>birthday attack</B>.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="07-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="07-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久久久国产一区二区三区四区| 亚洲综合在线电影| 18涩涩午夜精品.www| 日本成人在线电影网| 91丝袜呻吟高潮美腿白嫩在线观看| 欧美性大战久久久久久久蜜臀 | 国产日产亚洲精品系列| 亚洲综合男人的天堂| 韩国三级电影一区二区| 欧美日韩一二三| 亚洲欧美日韩国产一区二区三区 | 亚洲精品第1页| 国产精品一区免费视频| 欧美一级黄色录像| 亚洲乱码中文字幕| 成人深夜视频在线观看| 久久久亚洲高清| 韩国一区二区视频| 欧美一区二区三区小说| 亚洲一区二区av在线| av在线播放成人| 国产亚洲精品aa午夜观看| 免费观看在线综合| 欧美精品在欧美一区二区少妇| 亚洲人成精品久久久久| 国产91综合网| 国产三级欧美三级日产三级99| 久久精品国产亚洲aⅴ| 欧美另类z0zxhd电影| 亚洲在线免费播放| 91福利视频网站| 一区二区欧美在线观看| 色综合天天做天天爱| 国产精品国产自产拍高清av| 国产精品一区二区久激情瑜伽| 日韩你懂的电影在线观看| 蜜桃视频在线观看一区二区| 91精品国产色综合久久不卡蜜臀 | 欧美一级欧美一级在线播放| 日韩高清不卡一区二区| 日韩一区二区视频在线观看| 日韩不卡一区二区| 欧美电影免费观看高清完整版在线 | 久久久久久久久97黄色工厂| 国产精品一区二区在线观看网站| 久久久久久综合| 成人午夜短视频| 一区二区三区加勒比av| 欧美人妇做爰xxxⅹ性高电影| 亚洲国产日韩a在线播放性色| 在线成人免费观看| 国内欧美视频一区二区| 久久久久久99久久久精品网站| 懂色av一区二区三区免费看| 亚洲欧美综合色| 欧美三级资源在线| 免费xxxx性欧美18vr| 欧美精品一区二区三区久久久 | 美国毛片一区二区| 欧美经典一区二区三区| 91啪九色porn原创视频在线观看| 一区二区三区美女| 91麻豆精品久久久久蜜臀| 国产一区二区女| 亚洲精品中文在线观看| 日韩亚洲电影在线| 丁香婷婷综合网| 一区二区三区电影在线播| 日韩女优电影在线观看| 91蜜桃免费观看视频| 日韩一区精品视频| 国产精品久久777777| 这里是久久伊人| eeuss鲁片一区二区三区| 亚洲午夜久久久久| 国产欧美一区二区三区鸳鸯浴| 色爱区综合激月婷婷| 国产真实乱偷精品视频免| 一区二区三区欧美久久| 久久久久免费观看| 91精选在线观看| 91影院在线观看| 激情综合一区二区三区| 亚洲国产日韩综合久久精品| 亚洲国产精品99久久久久久久久| 欧美久久免费观看| 99久久99久久精品免费观看| 日韩国产精品久久久| 中文字幕精品三区| 欧美成人乱码一区二区三区| 色婷婷av一区| 成人手机电影网| 国产精品一区在线| 狂野欧美性猛交blacked| 亚洲成人激情自拍| 亚洲欧美乱综合| 亚洲欧洲精品一区二区三区| 精品国产乱码久久久久久久| 欧美军同video69gay| 91在线码无精品| 东方欧美亚洲色图在线| 国产综合色视频| 九九视频精品免费| 青青草精品视频| 亚洲444eee在线观看| 亚洲美女免费在线| 中文字幕一区二区日韩精品绯色| 久久久久久麻豆| 久久―日本道色综合久久| 欧美男女性生活在线直播观看| www.日本不卡| caoporm超碰国产精品| 高清视频一区二区| 成人午夜视频在线观看| 懂色中文一区二区在线播放| 国产一区二区三区日韩| 久久99精品久久久久久| 精品系列免费在线观看| 美女视频一区在线观看| 久久精品国产免费| 国产综合色产在线精品| 国产麻豆欧美日韩一区| 国产成人免费在线视频| 成年人国产精品| 91啪在线观看| 欧美视频一区二区| 欧美日韩免费一区二区三区视频| 欧美日韩国产一二三| 91精品久久久久久久久99蜜臂| 日韩一区二区三区四区五区六区| 精品国内二区三区| 中文字幕一区二区在线观看| 亚洲欧美一区二区三区极速播放| 一区二区在线观看免费| 亚洲一区二区在线免费观看视频| 亚洲午夜成aⅴ人片| 蜜臀a∨国产成人精品| 国产成人免费视频| 91麻豆精品一区二区三区| 在线免费观看视频一区| 欧美日韩一本到| 国产亚洲欧洲一区高清在线观看| 国产精品三级视频| 亚洲成人777| 狠狠色丁香久久婷婷综合丁香| 成人黄页在线观看| 欧美日韩黄色一区二区| 欧美精品一区二区三区在线播放| 国产精品久久久久影视| 一区二区免费视频| 国产一区二区三区久久悠悠色av| 成人爱爱电影网址| 91麻豆精品国产91久久久久| 精品粉嫩超白一线天av| 亚洲黄色性网站| 加勒比av一区二区| 91国内精品野花午夜精品| 精品日韩成人av| 一区二区在线看| 国产综合一区二区| 欧美日本韩国一区| 1000精品久久久久久久久| 免费精品99久久国产综合精品| 91性感美女视频| 精品欧美一区二区三区精品久久| ...xxx性欧美| 国产一区二区三区久久久| 欧美久久高跟鞋激| 亚洲色图欧美偷拍| 国产麻豆精品一区二区| 欧美美女直播网站| 最新国产の精品合集bt伙计| 精品影视av免费| 欧美丰满美乳xxx高潮www| 日韩毛片在线免费观看| 国产精品99久久久久久似苏梦涵 | 成人av第一页| 欧美一区二区三区免费观看视频| 国产精品福利一区| 国产一区二区福利视频| 欧美日韩高清在线| 亚洲理论在线观看| 93久久精品日日躁夜夜躁欧美| wwwwww.欧美系列| 日韩精品欧美精品| 欧美色偷偷大香| 夜夜嗨av一区二区三区| www.视频一区| 久久精品在线免费观看| 久久69国产一区二区蜜臀| 91麻豆精品国产91久久久资源速度| 国产精品另类一区| 国产不卡视频一区| 久久婷婷色综合| 国产另类ts人妖一区二区| 久久久久久综合| 国产成a人无v码亚洲福利| 久久久久一区二区三区四区| 国产在线不卡一区| 久久综合色鬼综合色|