亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? appendix-a.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Afterword</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--APPENDIX=A//-->
<!--PAGES=619-621//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="ch25/25-10.html">Previous</A></TD>
<TD><A HREF="ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="appendix-b.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Afterword by Matt Blaze</FONT></H2>
<P>One of the most dangerous aspects of cryptology (and, by extension, of this book), is that you can almost measure it. Knowledge of key lengths, factoring methods, and cryptanalytic techniques makes it possible to estimate (in the absence of a real theory of cipher design) the &#147;work factor&#148; required to break a particular cipher. It&#146;s all too tempting to misuse these estimates as if they were overall security metrics for the systems in which they are used. The real world offers the attacker a richer menu of options than mere cryptanalysis. Often more worrisome are protocol attacks, Trojan horses, viruses, electromagnetic monitoring, physical compromise, blackmail and intimidation of key holders, operating system bugs, application program bugs, hardware bugs, user errors, physical eavesdropping, social engineering, and dumpster diving, to name just a few.
</P>
<P>High-quality ciphers and protocols are important tools, but by themselves make poor substitutes for realistic, critical thinking about what is actually being protected and how various defenses might fail (attackers, after all, rarely restrict themselves to the clean, well-defined threat models of the academic world). Ross Anderson gives examples of cryptographically strong systems (in the banking industry) that fail when exposed to the threats of the real world [43, 44]. Even when the attacker has access only to ciphertext, seemingly minor breaches in other parts of the system can leak enough information to render good cryptosystems useless. The Allies in World War II broke the German Enigma traffic largely by carefully exploiting operator errors [1587].</P>
<P>An NSA-employed acquaintance, when asked whether the government can crack DES traffic, quipped that real systems are so insecure that they never need to bother. Unfortunately, there are no easy recipes for making a system secure, no substitute for careful design and critical,  ongoing scrutiny. Good cryptosystems have the nice property of making life much harder for the attacker than for the legitimate user; this is not the case for almost every other aspect of computer and communication security. Consider the following (quite incomplete) &#147;Top Ten Threats to Security in Real Systems&#148; list; all are easier to exploit than to prevent.</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;The sorry state of software. Everyone knows that nobody knows how to write software. Modern systems are complex, with hundreds of thousands of lines of code; any one of them has the chance to compromise security. Fatal bugs may even be far-removed from the security portion of the software.
<DD><B>2.</B>&nbsp;&nbsp;Ineffective protection against denial-of-service attacks. Some cryptographic protocols allow anonymity. It may be especially dangerous to deploy anonymous protocols if they increase the opportunities for unidentified vandals to disrupt service; anonymous systems therefore need to be especially resistant to denial-of-service attacks. Robust networks can more easily support anonymity; consider that hardly anyone worries very much about the millions of anonymous entry points to more robust networks like the telephone system or the postal service, where it&#146;s relatively difficult (or expensive) for an individual to cause large-scale failures.
<DD><B>3.</B>&nbsp;&nbsp;No place to store secrets. Cryptosystems protect large secrets with smaller ones (keys). Unfortunately, modern computers aren&#146;t especially good at protecting even the smallest secrets. Multi-user networked workstations can be broken into and their memories compromised. Standalone, single-user machines can be stolen or compromised through viruses that leak secrets asynchronously. Remote servers, where there may be no user available to enter a passphrase (but see threat #5), are an especially hard problem.
<DD><B>4.</B>&nbsp;&nbsp;Poor random-number generation. Keys and session variables need good sources of unpredictable bits. A running computer has a lot of entropy in it but rarely provides applications with a convenient or reliable way to exploit it. A number of techniques have been proposed for getting true random numbers in software (taking advantage of unpredictability in things like I/O interarrival timing, clock and timer skew, and even air turbulence inside disk enclosures), but all these are very sensitive to slight changes in the environments in which they are used.
<DD><B>5.</B>&nbsp;&nbsp;Weak passphrases. Most cryptographic software addresses the key storage and key generation problems by relying on user-generated passphrase strings, which are presumed to be unpredictable enough to produce good key material and are also easy enough to remember that they do not require secure storage. While dictionary attacks are a well-known problem with short passwords, much less is known about lines of attack against user-selected passphrase-based keys. Shannon tells us that English text has only just over 1 bit of entropy per character, which would seem to leave most passphrases well within reach of brute-force search. Less is known, however, about good techniques for enumerating passphrases in order to exploit this. Until we have a better understanding of how to attack passphrases, we really have no idea how weak or strong they are.
<DD><B>6.</B>&nbsp;&nbsp;Mismatched trust. Almost all currently available cryptographic software assumes that the user is in direct control over the systems on which it runs and has a secure path to it. For example, the interfaces to programs like PGP assume that their passphrase input always comes from the user over a secure path like the local console. This is not always the case, of course; consider the problem of reading your encrypted mail when logged in over a network connection. What the system designer assumes is trusted may not match the needs or expectations of the real users, especially when software can be controlled remotely over insecure networks.
<DD><B>7.</B>&nbsp;&nbsp;Poorly understood protocol and service interactions. As systems get bigger and more complex, benign features frequently come back to haunt us, and it&#146;s hard to know even where to look when things fail. The Internet worm was propagated via an obscure and innocent-looking feature in the sendmail program; how many more features in how many more programs have unexpected consequences just waiting to be discovered?
<DD><B>8.</B>&nbsp;&nbsp;Unrealistic threat and risks assessment. Security experts tend to focus on the threats they know how to model and prevent. Unfortunately, attackers focus on what they know how to exploit, and the two are rarely exactly the same. Too many &#147;secure&#148; systems are designed without considering what the attacker is actually likely to do.
<DD><B>9.</B>&nbsp;&nbsp;Interfaces that make security expensive and special. If security features are to be used, they must be convenient and transparent enough that people actually turn them on. It&#146;s easy to design encryption mechanisms that come only at the expense of performance or ease of use, and even easier to design mechanisms that invite mistakes. Security should be harder to turn off than on; unfortunately, few systems actually work this way.
<DD><B>10.</B>&nbsp;&nbsp;Little broad-based demand for security. This is a well-known problem among almost everyone who has tied his or her fortune to selling security products and services. Until there is widespread demand for transparent security, the tools and infrastructure needed to support it will be expensive and inaccessible to many applications. This is partly a problem of understanding and exposing the threats and risks in real applications and partly a problem of not designing systems that include security as a basic feature rather than as a later add-on.
</DL>
<P>A more complete list and discussion of these kinds of threats could easily fill a book of this size and barely scratch the surface. What makes them especially difficult and dangerous is that there are no magic techniques, beyond good engineering and ongoing scrutiny,  for avoiding them. The lesson for the aspiring cryptographer is to respect the limits of the art.
</P>
<TABLE WIDTH="100%"><TD ALIGN="LEFT" VALIGN="TOP" WIDTH="80%">
<TD ALIGN="LEFT" VALIGN="TOP" WIDTH="20%">Matt Blaze<BR>New York, NY
</TABLE>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="ch25/25-10.html">Previous</A></TD>
<TD><A HREF="ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="appendix-b.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久―日本道色综合久久| 亚洲精品一二三区| 日韩一区有码在线| 亚洲第一搞黄网站| 蓝色福利精品导航| 成人黄色在线视频| 777亚洲妇女| 欧美极品美女视频| 亚洲免费在线观看| 美女一区二区久久| thepron国产精品| 欧美一区二区视频在线观看| 日本一区二区三区久久久久久久久不| 亚洲女人的天堂| 精品一区二区三区免费观看| 国产精品18久久久久| 欧美无乱码久久久免费午夜一区| 欧美成人在线直播| 一区二区三区久久久| 亚洲国产成人av好男人在线观看| 国产一区二区三区精品欧美日韩一区二区三区 | 国产一区二区在线免费观看| 波多野结衣在线一区| 欧美日本国产视频| 欧美激情一区二区三区| 五月激情丁香一区二区三区| 日韩电影在线一区二区| 99久久婷婷国产综合精品电影 | 91理论电影在线观看| 日韩一区二区三区电影在线观看| 中文字幕一区二区三区精华液| 日韩1区2区日韩1区2区| 日本丶国产丶欧美色综合| 国产偷v国产偷v亚洲高清| 天堂影院一区二区| 91丨九色porny丨蝌蚪| 久久影音资源网| 蜜臀av性久久久久蜜臀aⅴ| 色欧美日韩亚洲| 国产日产欧美一区二区视频| 亚洲激情av在线| 懂色av一区二区在线播放| 日韩三级免费观看| 午夜精品福利久久久| 在线观看视频一区二区欧美日韩| 国产精品少妇自拍| 国产精品自拍一区| 精品久久久久久久久久久久久久久| 午夜影视日本亚洲欧洲精品| 在线看日本不卡| 亚洲男人的天堂网| 91免费观看在线| 国产精品福利一区| 国产精品乡下勾搭老头1| 欧美成人精品1314www| 蜜臀精品久久久久久蜜臀| 欧美一区二区三区系列电影| 午夜影院久久久| 久久夜色精品国产噜噜av| 99久久精品免费看国产免费软件| 一区二区三区日韩精品| 91精品国产综合久久精品| 国产又黄又大久久| 亚洲女子a中天字幕| 日韩欧美色综合| 国产99一区视频免费| 亚洲国产另类av| 久久久久久久久蜜桃| 色综合天天视频在线观看| 美腿丝袜亚洲一区| 中文字幕一区二区三区乱码在线| 欧美另类久久久品| 国产精品一区二区男女羞羞无遮挡| 亚洲色欲色欲www| 精品福利一二区| 91久久免费观看| 国产精品一区一区三区| 一片黄亚洲嫩模| 国产亚洲欧美在线| 欧美老肥妇做.爰bbww| 国产v综合v亚洲欧| 日韩av在线发布| 综合久久久久久| 久久九九影视网| 欧美日韩国产乱码电影| 粉嫩蜜臀av国产精品网站| 性做久久久久久免费观看欧美| 国产亚洲福利社区一区| 欧美色老头old∨ideo| 粗大黑人巨茎大战欧美成人| 日本不卡一区二区三区| 亚洲女女做受ⅹxx高潮| 久久久久99精品一区| 欧美一级久久久| 欧美日韩成人综合| 91捆绑美女网站| 大桥未久av一区二区三区中文| 蜜臀精品一区二区三区在线观看 | 一区二区成人在线| 欧美国产丝袜视频| 久久免费偷拍视频| 欧美大胆人体bbbb| 在线播放中文字幕一区| 欧美视频一二三区| 色视频欧美一区二区三区| 99在线精品观看| 不卡视频在线看| 国产成人精品综合在线观看 | 欧美一区二区三区四区视频| 91高清视频免费看| 91丝袜呻吟高潮美腿白嫩在线观看| 国产成人免费9x9x人网站视频| 国产在线观看一区二区| 免费成人av在线| 喷白浆一区二区| 久久99久久久久久久久久久| 日本女人一区二区三区| 日本不卡不码高清免费观看| 热久久免费视频| 免费成人深夜小野草| 精品一区二区三区免费毛片爱| 精品一区二区三区在线观看| 韩国女主播成人在线| 国产一区二区三区四区在线观看| 精品一区在线看| 国产成人精品1024| 91亚洲精品久久久蜜桃| 色婷婷久久久亚洲一区二区三区 | 国产一区二区三区日韩| 国产精品亚洲一区二区三区妖精| 国产在线视视频有精品| 成人午夜免费av| 91国模大尺度私拍在线视频| 欧美日韩卡一卡二| 欧美一二三在线| 国产精品午夜春色av| 亚洲视频在线观看三级| 夜夜嗨av一区二区三区网页| 日本中文一区二区三区| 国产一区二区91| 色系网站成人免费| 欧美午夜视频网站| 亚洲精品一区二区三区在线观看| 日本一区二区三区免费乱视频| 亚洲人一二三区| 日韩精品免费专区| 黄色日韩三级电影| 一本色道久久综合亚洲91| 欧美一级片在线| 国产精品国产三级国产aⅴ原创 | 激情综合色丁香一区二区| 国产精品12区| 欧美午夜一区二区三区| 精品国内片67194| 亚洲国产高清在线| 亚洲午夜在线电影| 国产剧情一区二区| 欧美亚洲国产一区在线观看网站| 日韩精品自拍偷拍| 亚洲人精品一区| 国产真实乱对白精彩久久| 色婷婷狠狠综合| 久久亚洲一区二区三区四区| 亚洲色欲色欲www| 国产精品中文字幕一区二区三区| 色香色香欲天天天影视综合网| 欧美tk—视频vk| 亚洲第一久久影院| 成人av网址在线| 精品欧美一区二区三区精品久久| 一区二区视频在线| 国产一区二区三区免费观看| 欧美巨大另类极品videosbest| 中文字幕在线一区免费| 麻豆成人久久精品二区三区小说| 色婷婷综合五月| 国产欧美日本一区二区三区| 日本vs亚洲vs韩国一区三区| 在线观看av一区| 亚洲视频在线一区| 国产iv一区二区三区| 精品久久久三级丝袜| 亚洲va欧美va国产va天堂影院| 99在线精品一区二区三区| 国产日韩欧美制服另类| 麻豆精品新av中文字幕| 欧美图片一区二区三区| 亚洲精品伦理在线| 成人黄色在线视频| 国产精品午夜免费| 丁香六月综合激情| 久久久精品免费免费| 国产在线精品不卡| 久久亚洲捆绑美女| 黄页视频在线91| 精品国产免费视频| 国产综合久久久久久久久久久久| 日韩一区二区三区精品视频| 免费观看91视频大全| 日韩一区二区三区在线|