亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? 05-04.html

?? 應(yīng)用密碼學(xué)電子書(shū)籍
?? HTML
字號(hào):
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Advanced Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=05//-->
<!--PAGES=109-111//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-03.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="05-05.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>The Chess Grandmaster Problem</I></B></FONT></P>
<P>Here&#146;s how Alice, who doesn&#146;t even know the rules to chess, can defeat a grandmaster. (This is sometimes called the Chess Grandmaster Problem.) She challenges both Gary Kasparov and Anatoly Karpov to a game, at the same time and place, but in separate rooms. She plays white against Kasparov and black against Karpov. Neither grandmaster knows about the other.
</P>
<P>Karpov, as white, makes his first move. Alice records the move and walks into the room with Kasparov. Playing white, she makes the same move against Kasparov. Kasparov makes his first move as black. Alice records the move, walks into the room with Karpov, and makes the same move. This continues, until she wins one game and loses the other, or both games end in a draw.</P>
<P>In reality, Kasparov is playing Karpov and Alice is simply acting as the middleman, mimicking the moves of each grandmaster on the other&#146;s board. However, if neither Karpov nor Kasparov knows about the other&#146;s presence, each will be impressed with Alice&#146;s play.</P>
<P>This kind of fraud can be used against zero-knowledge proofs of identity [485,120]. While Alice is proving her identity to Mallory, Mallory can simultaneously prove to Bob that he is Alice.</P>
<P><FONT SIZE="+1"><B><I>The Mafia Fraud</I></B></FONT></P>
<P>When discussing his zero-knowledge identification protocol, Adi Shamir [1424] said: &#147;I could go to a Mafia-owned store a million successive times and they will still not be able to misrepresent themselves as me.&#148;
</P>
<P>Here&#146;s how the Mafia can. Alice is eating at Bob&#146;s Diner, a Mafia-owned restaurant. Carol is shopping at Dave&#146;s Emporium, an expensive jewelry store. Bob and Carol are both members of the Mafia and are communicating by a secret radio link. Alice and Dave are unaware of the fraud.</P>
<P>At the end of Alice&#146;s meal, when she is ready to pay and prove her identity to Bob, Bob signals Carol that the fraud is ready to begin. Carol chooses some expensive diamonds and gets ready to prove her identity to Dave. Now, as Alice proves her identity to Bob, Bob radios Carol and Carol performs the same protocol with Dave. When Dave asks a question in the protocol, Carol radios the question back to Bob, and Bob asks it of Alice. When Alice answers, Bob radios the correct answer to Carol. Actually, Alice is just proving her identity to Dave, and Bob and Carol are simply sitting in the middle of the protocol passing messages back and forth. When the protocol finishes, Alice has proved herself to Dave and has purchased some expensive diamonds (which Carol disappears with).</P>
<P><FONT SIZE="+1"><B><I>The Terrorist Fraud</I></B></FONT></P>
<P>If Alice is willing to collaborate with Carol, they can also defraud Dave. In this protocol, Carol is a well-known terrorist. Alice is helping her enter the country. Dave is the immigration officer. Alice and Carol are connected by a secret radio link.
</P>
<P>When Dave asks Carol questions as part of the zero-knowledge protocol, Carol radios them back to Alice, who answers them herself. Carol recites these answers to Dave. In reality, Alice is proving her identity to Dave, with Carol acting as a communications path. When the protocol finishes, Dave thinks that Carol is Alice and lets her into the country. Three days later, Carol shows up at some government building with a minivan full of explosives.</P>
<P><FONT SIZE="+1"><B><I>Suggested Solutions</I></B></FONT></P>
<P>Both the Mafia and Terrorist frauds are possible because the conspirators can communicate via a secret radio. One way to prevent this requires all identifications to take place inside Faraday cages, which block all electromagnetic radiation. In the terrorist example, this assures immigration officer Dave that Carol was not receiving her answers from Alice. In the Mafia example, Bob could simply build a faulty Faraday cage in his restaurant, but jeweler Dave would have a working one; Bob and Carol would not be able to communicate. To solve the Chess Grandmaster Problem, Alice should be forced to sit in her seat until the end of a game.
</P>
<P>Thomas Beth and Yvo Desmedt proposed another solution, one using accurate clocks [148]. If each step in the protocol must take place at a given time, no time would be available for the conspirators to communicate. In the Chess Grandmaster Problem, if every move in each game must be made as a clock strikes one minute, then Alice will have no time to run from room to room. In the Mafia story, Bob and Carol will have no time to pass questions and answers to one another.</P>
<P><FONT SIZE="+1"><B><I>The Multiple Identity Fraud</I></B></FONT></P>
<P>There are other possible abuses to zero-knowledge proofs of identity, also discussed in [485,120]. In some implementations, there is no check when an individual registers a public key. Hence, Alice can have several private keys and, therefore, several identities. This can be a great help if she wants to commit tax fraud. Alice can also commit a crime and disappear. First, she creates and publishes several identities. One of them she doesn&#146;t use. Then, she uses that identity once and commits a crime so that the person who identifies her is the witness. Then, she immediately stops using that identity. The witness knows the identity of the person who committed the crime, but if Alice never uses that identity again&#151;she&#146;s untraceable.
</P>
<P>To prevent this, there has to be some mechanism by which each person has only one identity. In [120] the authors suggest the bizarre idea of tamperproof babies who are impossible to clone and contain a unique number as part of their genetic code. They also suggested having each baby apply for an identity at birth. (Actually, the parents would have to do this as the baby would be otherwise occupied.) This could easily be abused; parents could apply for multiple identities at the child&#146;s birth. In the end, the uniqueness of an individual is based on trust.</P>
<P><FONT SIZE="+1"><B><I>Renting Passports</I></B></FONT></P>
<P>Alice wants to travel to Zaire, but that government won&#146;t give her a visa. Carol offers to rent her identity to Alice. (Bob offered first, but there were some obvious problems.) Carol sells Alice her private key and Alice goes off to Zaire pretending to be Carol.
</P>
<P>Carol has not only been paid for her identity, but now she has a perfect alibi. She commits a crime while Alice is in Zaire. &#147;Carol&#148; has proved her identity in Zaire; how could she commit a crime back home?</P>
<P>Of course, Alice is free to commit crimes as well. She does so either before she leaves or after she returns, near Carol&#146;s home. First she identifies herself as Carol (she has Carol&#146;s private key, so she can easily do that), then she commits a crime and runs away. The police will come looking for Carol. Carol will claim she rented her identity to Alice, but who would believe such a nonsensical story?</P>
<P>The problem is that Alice isn&#146;t really proving her identity; she is proving that she knows a piece of secret information. It is the link between that information and the person it belongs to that is being abused. The tamperproof baby solution would protect against this type of fraud, as would a police state where all citizens would have to prove their identity very frequently (at the end of each day, at each street corner, etc.). Biometric methods&#151;fingerprints, retinal scanning, voiceprints, and so on&#151;may help solve this problem.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-03.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="05-05.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
视频一区二区国产| 久久久夜色精品亚洲| 青青草国产成人av片免费| 亚洲一区二区视频| 久久久精品综合| 国精产品一区一区三区mba视频| 欧美午夜影院一区| 国产午夜精品理论片a级大结局| 久久久久久麻豆| 成人欧美一区二区三区1314| 日韩一区二区三区精品视频 | 日韩制服丝袜av| 欧美日韩国产经典色站一区二区三区| 中文字幕精品—区二区四季| 正在播放亚洲一区| 成人午夜又粗又硬又大| 色成年激情久久综合| 欧美一区二区三区免费视频| 精品国产三级a在线观看| 日韩网站在线看片你懂的| 久久久无码精品亚洲日韩按摩| 国产精品私人自拍| 91精品国产麻豆| 精品久久久久99| 亚洲欧美影音先锋| 婷婷成人激情在线网| 九九视频精品免费| 成人精品亚洲人成在线| 91精品国产综合久久精品| hitomi一区二区三区精品| 国产视频一区在线播放| 日本中文一区二区三区| 精品久久久久久久人人人人传媒 | 欧美精品一区二区久久婷婷| 国产精品免费网站在线观看| 欧美国产激情一区二区三区蜜月| 精品久久久久久综合日本欧美| 久久九九久久九九| 亚洲福利国产精品| 国产不卡视频在线播放| 91免费看片在线观看| 96av麻豆蜜桃一区二区| 欧美三级视频在线| 欧美国产成人在线| 美国精品在线观看| 欧美综合在线视频| 亚洲欧洲三级电影| 国产福利一区在线| 欧美无乱码久久久免费午夜一区| 国产精品系列在线| 韩国v欧美v亚洲v日本v| 在线不卡中文字幕播放| 亚洲午夜久久久| 99re这里只有精品6| 久久婷婷成人综合色| 日韩在线播放一区二区| 欧美伊人久久久久久午夜久久久久| 一本色道久久综合亚洲精品按摩| 亚洲精品在线电影| 国产一区二区精品久久| 91麻豆精品国产91久久久更新时间| 亚洲精品中文字幕在线观看| 成人免费高清在线| 欧美久久一二三四区| 亚洲第一综合色| 91麻豆精品国产91久久久使用方法| 一区二区三区四区av| 懂色av中文字幕一区二区三区 | 欧美精品一区二区三| 日韩精品每日更新| 欧美电影免费观看高清完整版在线 | 国产精品久久99| 成人a区在线观看| 亚洲免费观看在线观看| 在线看日韩精品电影| 国产精品麻豆99久久久久久| 成人午夜视频网站| 亚洲最色的网站| 久久久噜噜噜久久人人看| 91麻豆swag| 麻豆极品一区二区三区| 欧美v国产在线一区二区三区| 国产一区二区精品久久99| 国产欧美日韩在线| 欧美精品自拍偷拍动漫精品| 毛片不卡一区二区| 亚洲国产aⅴ成人精品无吗| 欧美xxxxx裸体时装秀| 国产九色sp调教91| 久久99在线观看| 一区二区三区在线免费播放| 高清国产一区二区| 一区二区三区视频在线观看| www激情久久| 日韩精品一区二区三区在线观看 | 久久九九久精品国产免费直播| 91在线云播放| 狠狠狠色丁香婷婷综合激情| 亚洲午夜成aⅴ人片| 综合自拍亚洲综合图不卡区| 国产亚洲污的网站| 久久久久久久久97黄色工厂| 91精品欧美综合在线观看最新| 色婷婷激情久久| 国产99精品视频| 国产精品91xxx| 成人网在线播放| 成人国产亚洲欧美成人综合网| 久久国产精品第一页| 蜜臀av一级做a爰片久久| 蜜桃在线一区二区三区| 国产精品久久久久久久裸模| 日韩一区二区三区观看| 国产午夜亚洲精品午夜鲁丝片| 国产日韩欧美亚洲| 亚洲欧美在线另类| 中文字幕日本不卡| 亚洲国产一区二区a毛片| 日日摸夜夜添夜夜添亚洲女人| 日本vs亚洲vs韩国一区三区二区| 国产精品国模大尺度视频| 亚洲免费伊人电影| 日本午夜一区二区| 国产福利电影一区二区三区| 色婷婷综合久久久中文字幕| 欧美猛男男办公室激情| 国产女主播视频一区二区| 国产亚洲精久久久久久| 亚洲国产一区二区在线播放| 粉嫩嫩av羞羞动漫久久久| 色综合久久久久综合体桃花网| 欧美日韩免费观看一区三区| 91精品国产aⅴ一区二区| 日韩亚洲国产中文字幕欧美| 亚洲欧洲成人自拍| 亚洲福利一二三区| 99久精品国产| 在线观看欧美精品| 中文在线免费一区三区高中清不卡| 亚洲综合色噜噜狠狠| 精品一区二区三区在线视频| 日本高清不卡aⅴ免费网站| 欧美精品vⅰdeose4hd| 亚洲欧美日韩小说| 色婷婷激情久久| 中文字幕一区二区在线观看| 午夜精品成人在线视频| 91免费观看视频| 国产日韩成人精品| 日韩av在线播放中文字幕| 欧美三级电影一区| 亚洲综合色噜噜狠狠| 国产v综合v亚洲欧| 国产精品美女久久久久久久久久久 | 欧美性猛交xxxxxx富婆| 91免费视频网址| 亚洲成人激情综合网| 日韩女优电影在线观看| 久久久久久亚洲综合| 色综合久久久久网| 国产成人综合在线| 免费一级欧美片在线观看| 国产精品理论在线观看| 精品国产免费一区二区三区四区| 懂色一区二区三区免费观看| 婷婷成人激情在线网| 中文字幕人成不卡一区| 国产欧美日产一区| 久久久青草青青国产亚洲免观| 91精品国产一区二区三区| 91女神在线视频| 色哟哟国产精品| 国产精品久久福利| 亚洲欧美日韩久久| 亚洲免费毛片网站| 亚洲在线中文字幕| 亚洲精品写真福利| 一区二区免费在线播放| 亚洲精品国产无套在线观| 亚洲免费观看高清完整版在线观看 | 国产精品一卡二卡在线观看| 美女脱光内衣内裤视频久久影院| 亚洲国产一区二区在线播放| 亚洲成人在线观看视频| 午夜激情久久久| 韩国理伦片一区二区三区在线播放| 免费日本视频一区| 成人a级免费电影| 91福利精品视频| 日韩一级片在线观看| 国产日韩av一区二区| 亚洲精品视频观看| 成人高清在线视频| 99久久精品国产精品久久| 色综合中文字幕| 国产精品私人影院| 成人激情动漫在线观看| 国产精品网曝门| 91一区一区三区| 亚洲啪啪综合av一区二区三区|