亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 15-04.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Combining Block Ciphers</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=15//-->
<!--PAGES=363-366//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="15-03.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="15-05.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading5"></A><FONT COLOR="#000077">15.4 Other Multiple Encryption Schemes</FONT></H3>
<P>The problem with two-key triple encryption is that it only doubles the size of the keyspace, but it requires three encryptions per block of plaintext. Wouldn&#146;t it be nice to find some clever way of combining two encryptions that would double the size of the keyspace?
</P>
<P><FONT SIZE="+1"><B><I>Double OFB/Counter</I></B></FONT></P>
<P>This method uses a block algorithm to generate two keystreams, which are then used to encrypt the plaintext.
</P>
<DL>
<DD><I>S</I><SUB>i</SUB> = <I>E</I><SUB>K1</SUB>(<I>S</I><SUB>i - 1</SUB> &#8853; <I>I</I><SUB>1</SUB>); <I>I</I><SUB>1</SUB> = <I>I</I><SUB>1</SUB> &#43; 1
<DD><I>T</I><SUB>i</SUB> = <I>E</I><SUB>K2</SUB>(<I>T</I><SUB>i - 1</SUB> &#8853; <I>I</I><SUB>2</SUB>); <I>I</I><SUB>2</SUB> = <I>I</I><SUB>2</SUB> &#43; 1
<DD><I>C</I><SUB>i</SUB> = <I>P</I><SUB>i</SUB> &#8853; <I>S</I><SUB>i</SUB> &#8853; <I>T</I><SUB>i</SUB>
</DL>
<I><P><A NAME="Fig3"></A><A HREF="javascript:displayWindow('images/15-03.jpg',269,212 )"><IMG SRC="images/15-03t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/15-03.jpg',269,212)"><FONT COLOR="#000077"><B>Figure 15.3</B></FONT></A>&nbsp;&nbsp;Doubling the block length.</I>
</P>
<P><I>S</I><SUB>i</SUB> and <I>T</I><SUB>i</SUB> are internal variables, and <I>I</I><SUB>1</SUB> and <I>I</I><SUB>2</SUB> are counters. Two copies of the block algorithm run in a kind of hybrid OFB/counter mode, and the plaintext, <I>S</I><SUB>i</SUB>, and <I>T</I><SUB>i</SUB> are XORed together. The two keys, <I>K</I><SUB>1</SUB> and <I>K</I><SUB>2</SUB>, are independent. I know of no cryptanalysis of this variant.</P>
<P><FONT SIZE="+1"><B><I>ECB &#43; OFB</I></B></FONT></P>
<P>This method was designed for encrypting multiple messages of a fixed length, for example, disk blocks [186,188]. Use two keys: <I>K</I><SUB>1</SUB> and <I>K</I><SUB>2</SUB>. First, use the algorithm and <I>K</I><SUB>1</SUB> to generate a mask of the required block length. This mask will be used repeatedly to encrypt messages with the same keys. Then, XOR the plaintext message with the mask. Finally, encrypt the XORed plaintext with the algorithm and K2 in ECB mode.</P>
<P>This mode has not been analyzed outside the paper in which it was proposed. Clearly it is at least as strong as a single ECB encryption and may be as strong as two passes with the algorithm. Possibly, a cryptanalyst could search for the two keys independently, if several known plaintext files are encrypted with the same key.</P>
<P>To thwart analysis of identical blocks in the same positions of different messages, you can add an IV. Unlike an IV in any other mode, here the IV is XORed with every block of the message before ECB encryption.</P>
<P>Matt Blaze designed this mode for his UNIX Cryptographic File System (CFS). It is a nice mode because the latency is only one encryption in ECB mode; the mask can be generated once and stored. In CFS, DES is the block algorithm.</P>
<P><FONT SIZE="+1"><B><I>xDESi</I></B></FONT></P>
<P>In [1644,1645], DES is used as a building block for a series of block algorithms with both larger key sizes and larger block sizes. These constructions do not depend on DES in any way and can be used with any block algorithm.
</P>
<P>The first, xDES<SUP>1</SUP>, is simply a Luby-Rackoff construction with the block cipher as the underlying function (see Section 14.11). The block size is twice the size of the underlying block cipher and the key size is three times the size of the underlying block cipher. In each of 3 rounds, encrypt the right half with the block algorithm and one of the keys, XOR the result with the left half, and swap the two halves.</P>
<P>This is faster than conventional triple encryption, since three encryptions encrypt a block twice as large as the underlying algorithm. But there is also a simple meet-in-the-middle attack that finds the key with a table the size of 2<SUP><I>k</I></SUP>, where k is the key size of the underlying algorithm. Encrypt the right half of a plaintext block with all possible values of <I>K</I><SUB>1</SUB>, XOR the left half of the plaintext, and store these values in a table. Then, encrypt the right half of the ciphertext with all possible values of <I>K</I><SUB>3</SUB> and look for a match in the table. If you find one, the key pair <I>K</I><SUB>1</SUB> and <I>K</I><SUB>3</SUB> are possible candidates for the right key. Repeat the attack a few times, and only one candidate will remain. This shows that xDES<SUP>1</SUP> is not an ideal solution. Even worse, there is a chosen plaintext attack that proves xDES<SUP>1</SUP> is not much stronger than the underlying block cipher [858].</P>
<P>xDES<SUP>2</SUP> extends this idea to a 5-round algorithm with a block size 4 times that of the underlying block cipher and a key size 10 times that of the underlying block cipher. Figure 15.4 is one round of xDES<SUP>2</SUP>; each of the four sub-blocks are the size of the underlying block ciphers and all 10 keys are independent.</P>
<P>This scheme is also faster than triple encryption: Ten encryptions are used to encrypt a block four times the size of the underlying block cipher. However, it is vulnerable to differential cryptanalysis [858] and should not be used. The scheme is even vulnerable if DES with independent round keys is used.</P>
<I><P><A NAME="Fig4"></A><A HREF="javascript:displayWindow('images/15-04.jpg',223,119 )"><IMG SRC="images/15-04t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/15-04.jpg',223,119)"><FONT COLOR="#000077"><B>Figure 15.4</B></FONT></A>&nbsp;&nbsp;One round of xDES<SUP>2</SUP>.</I>
</P>
<P>For <I>i</I> &#8805; 3, xDES<SUP><I>i</I></SUP> is probably too big to be useful as a block algorithm. For example, the block size for xDES<SUP>3</SUP> is 6 times that of the underlying cipher, the key size is 21 times, and 21 encryptions are required to encrypt a block 6 times that of the underlying block cipher. Triple encryption is faster.</P>
<P><FONT SIZE="+1"><B><I>Quintuple Encryption</I></B></FONT></P>
<P>If triple encryption isn&#146;t secure enough&#151;perhaps you need to encrypt triple-encryption keys using an even stronger algorithm&#151;then higher multiples might be in order. Quintuple encryption is very strong against meet-in-the-middle attacks. (Similar arguments to the ones used with double encryption can show that quadruple encryption provides minimal security improvements over triple encryption.)
</P>
<DL>
<DD><I>C</I> = <I>E</I><SUB>K1</SUB>(<I>D</I><SUB>K2</SUB>(<I>E</I><SUB>K3</SUB>(<I>D</I><SUB>K2</SUB>(<I>E</I><SUB>K1</SUB>(<I>P</I>)))))
<DD><I>P</I> = <I>D</I><SUB>K1</SUB>(<I>E</I><SUB>K2</SUB>(<I>D</I><SUB>K3</SUB>(<I>E</I><SUB>K2</SUB>(<I>D</I><SUB>K1</SUB>(<I>C</I>)))))
</DL>
<P>This construction is backwards compatible with triple encryption if <I>K</I><SUB>2</SUB> = <I>K</I><SUB>3</SUB>, and is backwards compatible with single encryption if <I>K</I><SUB>1</SUB> = <I>K</I><SUB>2</SUB> = <I>K</I><SUB>3</SUB>. Of course, it would be even stronger if all five keys were independent.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="15-03.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="15-05.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美亚男人的天堂| 99视频一区二区| 日韩视频中午一区| 另类中文字幕网| 久久精品日产第一区二区三区高清版| 国内成+人亚洲+欧美+综合在线| 欧美第一区第二区| 国产高清精品在线| 日韩美女啊v在线免费观看| 91在线小视频| 亚洲成av人片在www色猫咪| 在线成人午夜影院| 韩国精品主播一区二区在线观看| 久久久精品国产免费观看同学| 成人av免费观看| 亚洲综合丁香婷婷六月香| 7777精品伊人久久久大香线蕉完整版| 极品美女销魂一区二区三区免费| 国产色综合久久| 色综合久久99| 精品一区二区久久久| 中文字幕五月欧美| 777色狠狠一区二区三区| 国产精品小仙女| 一级特黄大欧美久久久| 欧美一区二区三区不卡| 成人激情图片网| 日韩精品电影一区亚洲| 国产日韩三级在线| 在线视频综合导航| 国产精品一区在线观看乱码| 亚洲欧美精品午睡沙发| 91精品国产高清一区二区三区| 国产一区二区三区蝌蚪| 亚洲综合色在线| 国产亚洲一区二区在线观看| 在线观看免费亚洲| 国产成a人无v码亚洲福利| 午夜免费久久看| 中文字幕精品三区| 欧美不卡一区二区三区四区| 91在线视频播放| 狠狠色狠狠色合久久伊人| 亚洲免费在线观看| 2020国产精品| 91精品国产麻豆| 欧洲精品一区二区三区在线观看| 国产美女精品人人做人人爽| 午夜视频在线观看一区二区三区| 国产性做久久久久久| 91麻豆精品91久久久久久清纯| 91香蕉视频污| 国产成人精品免费一区二区| 麻豆传媒一区二区三区| 亚洲永久精品大片| 国产精品麻豆视频| 精品va天堂亚洲国产| 欧美日韩亚洲综合一区二区三区| 成人的网站免费观看| 卡一卡二国产精品 | 精品福利一区二区三区| 欧洲精品视频在线观看| 91在线观看高清| 国产99久久久国产精品潘金网站| 免费看欧美女人艹b| 香蕉成人伊视频在线观看| 自拍av一区二区三区| 中文字幕亚洲成人| 国产精品国产馆在线真实露脸| 国产亚洲午夜高清国产拍精品 | 国产精品蜜臀在线观看| 精品国产乱码久久久久久牛牛| 在线播放国产精品二区一二区四区| 色综合色综合色综合| 91网站在线观看视频| 91日韩一区二区三区| 91在线视频官网| 99天天综合性| 一本色道久久综合亚洲aⅴ蜜桃| 成人免费av网站| 97精品视频在线观看自产线路二| 岛国一区二区在线观看| 成人永久aaa| 成人免费高清在线| 91麻豆国产福利精品| 色视频一区二区| 欧美日韩另类一区| 欧美丰满嫩嫩电影| 日韩一区二区三区精品视频| 欧美一区二区福利在线| 69堂精品视频| 日韩免费一区二区| 国产亚洲欧美色| 成人欧美一区二区三区1314 | 亚洲色图制服丝袜| 亚洲激情综合网| 五月天国产精品| 美女视频网站久久| 成人免费福利片| 在线影院国内精品| 4438成人网| 国产视频一区二区三区在线观看| 国产精品免费aⅴ片在线观看| 亚洲精品视频自拍| 天堂午夜影视日韩欧美一区二区| 日本中文在线一区| 国产盗摄一区二区| 在线视频一区二区三区| 日韩欧美专区在线| 国产精品国产三级国产专播品爱网| 亚洲精品乱码久久久久久久久| 亚洲成人7777| 国产高清亚洲一区| 欧洲av一区二区嗯嗯嗯啊| 欧美一级久久久久久久大片| 久久精品无码一区二区三区| 亚洲欧美激情视频在线观看一区二区三区| 亚洲最新视频在线观看| 精品制服美女丁香| 不卡一区在线观看| 91精品久久久久久久久99蜜臂| 久久久久久久电影| 亚洲图片有声小说| 国产凹凸在线观看一区二区| 欧美三级日韩三级国产三级| 国产亚洲制服色| 日韩中文字幕亚洲一区二区va在线| 国产不卡免费视频| 91精品欧美福利在线观看| 国产精品电影一区二区| 久久国产精品99精品国产| 色综合一区二区三区| 精品福利一区二区三区免费视频| 亚洲视频综合在线| 国产精品白丝jk黑袜喷水| 欧美性生活一区| 中文av字幕一区| 蜜臀av性久久久久蜜臀aⅴ四虎| 99精品视频中文字幕| 久久综合国产精品| 五月天婷婷综合| 色狠狠桃花综合| 国产精品网站导航| 国产在线精品视频| 91精品国产综合久久久久久久| 亚洲色图19p| 国产九色sp调教91| 欧美不卡一区二区三区| 日韩国产高清影视| 欧美视频一二三区| 一区二区三区久久久| 成人午夜视频网站| 久久久精品2019中文字幕之3| 男人的j进女人的j一区| 一本大道综合伊人精品热热| 国产精品污www在线观看| 国产乱淫av一区二区三区| 欧洲国产伦久久久久久久| 国产亲近乱来精品视频| 国内精品国产成人国产三级粉色 | 国产日韩精品一区二区三区在线| 一区二区三区在线影院| 国产成人精品亚洲午夜麻豆| 精品成人免费观看| 国产一区视频导航| 26uuu久久综合| 久久av中文字幕片| 精品国产区一区| 国产综合色视频| 精品成人私密视频| 久草热8精品视频在线观看| 欧美乱妇20p| 日本不卡一区二区三区| 91精品国产乱码久久蜜臀| 麻豆免费精品视频| 日韩欧美国产麻豆| 国精品**一区二区三区在线蜜桃| 欧美精品一区二区三区一线天视频 | 日韩av中文字幕一区二区三区| 欧美男人的天堂一二区| 亚洲bt欧美bt精品| 91麻豆精品国产自产在线| 免费在线看成人av| 久久久久综合网| av电影天堂一区二区在线| 亚洲免费观看高清完整版在线| 日本电影欧美片| 日韩电影在线一区二区| 久久先锋影音av鲁色资源| 成人激情免费视频| 亚洲福利国产精品| 欧美哺乳videos| www.亚洲国产| 丝袜美腿亚洲综合| 久久一二三国产| 日本久久电影网| 蜜桃视频一区二区三区在线观看| 国产欧美精品一区二区色综合| 91丝袜国产在线播放| 视频一区国产视频|