亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 05-09.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Advanced Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=05//-->
<!--PAGES=122-124//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-08.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch06/06-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading9"></A><FONT COLOR="#000077">5.8 Digital Certified Mail</FONT></H3>
<P>The same simultaneous oblivious transfer protocol used for contract signing works, with some modifications, for computer certified mail [529]. Suppose Alice wants to send a message to Bob, but she does not want him to read it without signing a receipt. Surly postal workers handle this process in real life, but the same thing can be done with cryptography. Whitfield Diffie first discussed this problem in [490].
</P>
<P>At first glance, the simultaneous contract-signing protocol can do this. Alice simply encrypts her message with a DES key. Her half of the protocol can be something like: &#147;This is the left half of the DES key: 32f5,&#148; and Bob&#146;s half can be something like: &#147;This is the left half of my receipt.&#148; Everything else stays the same.</P>
<P>To see why this won&#146;t work, remember that the protocol hinges on the fact that the oblivious transfer in step (5) keeps both parties honest. Both of them know that they sent the other party a valid half, but neither knows which. They don&#146;t cheat in step (8) because the odds of getting away with it are miniscule. If Alice is sending Bob not a message but half of a DES key, Bob can&#146;t check the validity of the DES key in step (6). Alice can still check the validity of Bob&#146;s receipt, so Bob is still forced to be honest. Alice can freely send Bob some garbage DES key, and he won&#146;t know the difference until she has a valid receipt. Tough luck, Bob.</P>
<P>Getting around this problem requires some adjustment of the protocol:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice encrypts her message using a random DES key, and sends the message to Bob.
<DD><B>(2)</B>&nbsp;&nbsp;Alice generates <I>n</I> pairs of DES keys. The first key of each pair is generated at random; the second key of each pair is the XOR of the first key and the message encryption key.
<DD><B>(3)</B>&nbsp;&nbsp;Alice encrypts a dummy message with each of her 2<I>n</I> keys.
<DD><B>(4)</B>&nbsp;&nbsp;Alice sends the whole pile of encrypted messages to Bob, making sure he knows which messages are which halves of which pairs.
<DD><B>(5)</B>&nbsp;&nbsp;Bob generates <I>n</I> pairs of random DES keys.
<DD><B>(6)</B>&nbsp;&nbsp;Bob generates a pair of messages that indicates a valid receipt. &#147;This is the left half of my receipt&#148; and &#147;this is the right half of my receipt&#148; are good candidates, with the addition of some kind of random-bit string. He makes <I>n</I> receipt pairs, each numbered. As with the previous protocol, the receipt is considered valid if Alice can produce both halves of a receipt (with the same number) and all of her encryption keys.
<DD><B>(7)</B>&nbsp;&nbsp;Bob encrypts each of his message pairs with DES key pairs, the <I>i</I>th message pair with the <I>i</I>th key pair, the left message with the left key in the pair, and the right message with the right key in the pair.
<DD><B>(8)</B>&nbsp;&nbsp;Bob sends his pile of message pairs to Alice, making sure that Alice knows which messages are which halves of which pairs.
<DD><B>(9)</B>&nbsp;&nbsp;Alice and Bob send each other every key pair using the oblivious transfer protocol. That is, Alice sends Bob either the key used to encrypt the left message or the key used to encrypt the right message, for each of the <I>n</I> pairs. Bob does the same. They can either alternate sending halves or one can send <I>n</I> and then the other&#151;it doesn&#146;t matter. Now both Alice and Bob have one key in each key pair, but neither knows which halves the other has.
<DD><B>(10)</B>&nbsp;&nbsp;Both Alice and Bob decrypt the halves they can and make sure that the decrypted messages are valid.
<DD><B>(11)</B>&nbsp;&nbsp;Alice and Bob send each other the first bits of all 2<I>n</I> DES keys. (If they are worried about Eve being able to read these mail messages, then they should encrypt their transmissions to each other.)
<DD><B>(12)</B>&nbsp;&nbsp;Alice and Bob repeat step (11) for the second bits of all 2<I>n</I> DES keys, the third bits, and so on, until all the bits of all the DES keys have been transferred.
<DD><B>(13)</B>&nbsp;&nbsp;Alice and Bob decrypt the remaining halves of the message pairs. Alice has a valid receipt from Bob, and Bob can XOR any key pair to get the original message encryption key.
<DD><B>(14)</B>&nbsp;&nbsp;Alice and Bob exchange the private keys used during the oblivious transfer protocol and each verifies that the other did not cheat.
</DL>
<P>Steps (5) through (8) for Bob, and steps (9) through (12) for both Alice and Bob, are the same as the contract-signing protocol. The twist is all of Alice&#146;s dummy messages. They give Bob some way of checking the validity of her oblivious transfer in step (10), which forces her to stay honest during steps (11) through (13). And, as with the simultaneous contract-signing protocol, both a left and a right half of one of Alice&#146;s message pairs are required to complete the protocol.
</P>
<H3><A NAME="Heading10"></A><FONT COLOR="#000077">5.9 Simultaneous Exchange of Secrets</FONT></H3>
<P>Alice knows secret <I>A;</I> Bob knows secret <I>B</I>. Alice is willing to tell Bob <I>A</I>, if Bob tells her <I>B</I>. Bob is willing to tell Alice <I>B</I>, if Alice tells him <I>A</I>. This protocol, observed in a schoolyard, does not work:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice: &#147;I&#146;ll tell if you tell me first.&#148;
<DD><B>(2)</B>&nbsp;&nbsp;Bob: &#147;I&#146;ll tell if you tell me first.&#148;
<DD><B>(3)</B>&nbsp;&nbsp;Alice: &#147;No, you first.&#148;
<DD><B>(4)</B>&nbsp;&nbsp;Bob: &#147;Oh, all right.&#148; Bob whispers.
<DD><B>(5)</B>&nbsp;&nbsp;Alice: &#147;Ha! I won&#146;t tell you.&#148;
<DD><B>(6)</B>&nbsp;&nbsp;Bob: &#147;That&#146;s not fair.&#148;
</DL>
<P>Cryptography can make it fair. The previous two protocols are implementations of this more general protocol, one that lets Alice and Bob exchange secrets simultaneously [529]. Rather than repeat the whole protocol, I&#146;ll sketch the modifications to the certified mail protocol.
</P>
<P>Alice performs steps (1) through (4) using <I>A</I> as the message. Bob goes through similar steps using <I>B</I> as his message. Alice and Bob perform the oblivious transfer in step (9), decrypt the halves they can in step (10), and go through the iterations in steps (11) and (12). If they are concerned about Eve, they should encrypt their messages. Finally, both Alice and Bob decrypt the remaining halves of the message pairs and XOR any key pair to get the original message encryption key.</P>
<P>This protocol allows Alice and Bob to exchange secrets simultaneously, but says nothing about the quality of the secrets exchanged. Alice could promise Bob the solution to the Minotaur&#146;s labyrinth, but actually send him a map of Boston&#146;s subway system. Bob will get whatever secret Alice sends him. Other protocols are [1286,195,991,1524,705,753,259,358,415].</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-08.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch06/06-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩国产小视频| 亚洲影院久久精品| 久久精品欧美一区二区三区不卡| 欧美视频一区在线观看| 久久精品一区二区三区四区| 欧美精品高清视频| 91麻豆高清视频| 麻豆久久久久久| 欧美午夜在线观看| 欧美精品一二三区| 亚洲制服丝袜一区| 久久久91精品国产一区二区精品| 精品蜜桃在线看| 国产aⅴ精品一区二区三区色成熟| 琪琪一区二区三区| 粉嫩蜜臀av国产精品网站| 91麻豆蜜桃一区二区三区| 欧美日韩国产综合一区二区三区| 精品少妇一区二区三区日产乱码| 国产精品嫩草影院com| 亚洲aaa精品| av在线播放一区二区三区| 国产精品一区二区久久精品爱涩| 在线观看视频91| 精品国精品国产| 亚洲一区二区三区三| 91精品国产丝袜白色高跟鞋| 91在线一区二区三区| 欧美色图片你懂的| 国产精品美女久久久久久久久| 亚洲成人动漫精品| 欧美视频一二三区| 亚洲欧美日韩系列| a美女胸又www黄视频久久| 精品国产一区二区三区久久久蜜月 | 日韩三级中文字幕| 在线看日本不卡| 日韩毛片视频在线看| 国产麻豆视频一区| 久久久777精品电影网影网| 日本不卡一区二区三区| 欧美猛男gaygay网站| 亚洲国产精品一区二区久久恐怖片 | 久久精品国内一区二区三区| 91视频一区二区三区| 日韩美女视频在线| 亚洲国产精品人人做人人爽| 在线看国产一区二区| 亚洲激情在线激情| 欧美一区二区视频在线观看| 日韩精品免费视频人成| 欧美大黄免费观看| youjizz国产精品| 亚洲成人免费av| 欧美精品一区二区三区蜜桃| 国产精品538一区二区在线| 国产精品亲子伦对白| 欧美日韩成人一区二区| 蜜乳av一区二区三区| 国产精品福利在线播放| 色婷婷综合久色| 日韩综合一区二区| 中文成人av在线| 日韩欧美一二三四区| 成人av在线资源网| 亚洲精品一区二区三区四区高清 | 一区二区在线电影| 精品国产伦一区二区三区免费| 成人免费黄色在线| 久久精品国产澳门| 亚洲福中文字幕伊人影院| 久久久精品天堂| 欧美va在线播放| 欧美精品777| 欧美性色aⅴ视频一区日韩精品| 蜜桃精品视频在线| 香蕉成人啪国产精品视频综合网| 久久精品一区四区| 久久日韩精品一区二区五区| 欧美一区二区在线播放| 在线观看免费亚洲| 午夜一区二区三区在线观看| 久久久久久电影| 久久久久久免费网| 久久天天做天天爱综合色| 欧美一级一级性生活免费录像| 91小视频在线观看| 91美女片黄在线观看91美女| 国产91在线观看| 91日韩一区二区三区| 色88888久久久久久影院按摩| 成人精品一区二区三区四区| 国产成人aaaa| 99久久国产免费看| 国产精品亚洲一区二区三区妖精| 亚洲最新视频在线观看| 一区二区三区av电影| 亚洲成人www| 国产中文字幕一区| 色悠悠久久综合| 欧美一卡二卡三卡四卡| 久久这里只有精品首页| 国产欧美日韩中文久久| 亚洲美女区一区| 婷婷丁香激情综合| 国产成人精品免费视频网站| 日本久久一区二区| 欧美精品一区二区三区高清aⅴ| 日本一区二区在线不卡| 国产精品天美传媒沈樵| 免费看黄色91| 欧美亚洲综合另类| 亚洲欧美中日韩| 国产在线麻豆精品观看| 91老师片黄在线观看| 欧美va亚洲va在线观看蝴蝶网| **欧美大码日韩| 国产精品自拍三区| 性感美女久久精品| 99riav久久精品riav| 欧美久久久久久蜜桃| 欧美剧在线免费观看网站 | 亚洲欧美日韩综合aⅴ视频| 久久你懂得1024| 欧美一级欧美三级| 亚洲动漫第一页| 91免费小视频| 亚洲综合一区二区精品导航| k8久久久一区二区三区| 国产精品无码永久免费888| 久久疯狂做爰流白浆xx| 精品国产青草久久久久福利| 日韩精品电影在线观看| 欧美性生交片4| 亚洲一区免费在线观看| 成人午夜在线播放| 精品噜噜噜噜久久久久久久久试看| 一区二区在线观看免费视频播放| 成人免费高清在线观看| 日本一区二区综合亚洲| www.激情成人| 午夜欧美一区二区三区在线播放| 91成人看片片| 日韩精品免费视频人成| 久久综合九色综合97婷婷| 国产一区二区三区在线观看精品| 国产丝袜欧美中文另类| 91一区二区三区在线播放| 尤物在线观看一区| 欧美成人一区二区| 色综合久久综合中文综合网| 亚洲不卡av一区二区三区| 欧美一二三区在线观看| 国产麻豆成人精品| 亚洲最大的成人av| 日韩精品一区二区三区在线观看| 韩日精品视频一区| 亚洲成在人线免费| 国产精品久久久久久久久免费相片| 欧美亚洲国产一卡| 成人av在线播放网址| 激情综合色播五月| 亚洲狠狠爱一区二区三区| 欧美激情一区二区三区不卡| 欧美日韩精品一区二区三区蜜桃| 国产馆精品极品| 裸体歌舞表演一区二区| 日韩vs国产vs欧美| 图片区日韩欧美亚洲| 自拍偷拍亚洲综合| 亚洲日本一区二区| 国产精品电影一区二区三区| 精品国产免费一区二区三区四区 | 欧美日韩在线不卡| 91婷婷韩国欧美一区二区| 日韩成人免费电影| 久久国产精品99精品国产| 天堂va蜜桃一区二区三区| 水野朝阳av一区二区三区| 亚洲永久免费视频| 香蕉久久一区二区不卡无毒影院 | 777奇米成人网| 欧美精品v日韩精品v韩国精品v| 欧美体内she精视频| 在线不卡a资源高清| 日韩一区二区视频在线观看| 精品美女一区二区三区| 欧美成人国产一区二区| 亚洲精品在线免费观看视频| 精品久久久久久久人人人人传媒| 久久综合av免费| 亚洲欧洲日韩在线| 天天色天天爱天天射综合| 国产伦精一区二区三区| a美女胸又www黄视频久久| 欧美日韩视频在线一区二区| 日韩精品最新网址| 中文字幕日韩欧美一区二区三区| 五月婷婷综合在线| 成人听书哪个软件好|