亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 05-08.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Advanced Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=05//-->
<!--PAGES=119-122//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="05-09.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>As the protocol proceeds, both Alice and Bob agree to be bound to the contract with a greater and greater probability. For example, Alice might define her <I>a</I> as 2 percent and Bob might define his <I>b</I> as 1 percent. (It would be nice if they had chosen larger increments; we will be here for a while.) Alice&#146;s first message might state that she is bound with 2 percent probability. Bob might respond that he is bound with 3 percent probability. Alice&#146;s next message might state that she is bound with 5 percent probability and so on, until both are bound with 100 percent probability.</P>
<P>If both Alice and Bob complete the protocol by the completion date, all is well. Otherwise, either party can take the contract to the judge, along with the other party&#146;s last signed message. The judge then randomly chooses a value between 0 and 1 before seeing the contract. If the value is less than the probability the other party signed, then both parties are bound. If the value is greater than the probability, then both parties are not bound. (The judge then saves the value, in case he has to rule on another matter regarding the same contract.) This is what is meant by being bound to the contract with probability <I>p</I>.</P>
<P>That&#146;s the basic protocol, but it can have more complications. The judge can rule in the absence of one of the parties. The judge&#146;s ruling either binds both or neither party; in no situation is one party bound and the other one not. Furthermore, as long as one party is willing to have a slightly higher probability of being bound than the other (no matter how small), the protocol will terminate.</P>
<P><FONT SIZE="+1"><B><I>Simultaneous Contract Signing without an Arbitrator (Using Cryptography)</I></B></FONT></P>
<P>This cryptographic protocol uses the same baby-step approach [529]. DES is used in the description, although any symmetric algorithm will do.
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Both Alice and Bob randomly select 2<I>n</I> DES keys, grouped in pairs. The pairs are nothing special; they are just grouped that way for the protocol.
<DD><B>(2)</B>&nbsp;&nbsp;Both Alice and Bob generate <I>n</I> pairs of messages, <I>L</I><SUB>i</SUB> and <I>R</I><SUB>i</SUB>: &#147;This is the left half of my <I>i</I>th signature&#148; and &#147;This is the right half of my <I>i</I>th signature,&#148; for example. The identifier, <I>i</I>, runs from 1 to <I>n</I>. Each message will probably also include a digital signature of the contract and a timestamp. The contract is considered signed if the other party can produce both halves, <I>L</I><SUB>i</SUB> and <I>R</I><SUB>i</SUB>, of a single signature pair.
<DD><B>(3)</B>&nbsp;&nbsp;Both Alice and Bob encrypt their message pairs in each of the DES key pairs, the left message with the left key in the pair and the right message with the right key in the pair.
<DD><B>(4)</B>&nbsp;&nbsp;Alice and Bob send each other their pile of 2<I>n</I> encrypted messages, making clear which messages are which halves of which pairs.
<DD><B>(5)</B>&nbsp;&nbsp;Alice and Bob send each other every key pair using the oblivious transfer protocol for each pair. That is, Alice sends Bob either the key used to encrypt the left message or the key used to encrypt the right message, independently, for each of the <I>n</I> pairs. Bob does the same. They can either alternate sending halves or one can send 100 and then the other&#151;it doesn&#146;t matter. Now both Alice and Bob have one key in each key pair, but neither knows which halves the other one has.
<DD><B>(6)</B>&nbsp;&nbsp;Both Alice and Bob decrypt the message halves that they can, using the keys they received. They make sure that the decrypted messages are valid.
<DD><B>(7)</B>&nbsp;&nbsp;Alice and Bob send each other the first bits of all 2<I>n</I> DES keys.
<DD><B>(8)</B>&nbsp;&nbsp;Alice and Bob repeat step (7) for the second bits of all 2<I>n</I> DES keys, the third bits, and so on, until all the bits of all the DES keys have been transferred.
<DD><B>(9)</B>&nbsp;&nbsp;Alice and Bob decrypt the remaining halves of the message pairs and the contract is signed.
<DD><B>(10)</B>&nbsp;&nbsp;Alice and Bob exchange the private keys used during the oblivious transfer protocol in step (5) and each verifies that the other did not cheat.
</DL>
<P>Why do Alice and Bob have to go through all this work? Let&#146;s assume Alice wants to cheat and see what happens. In steps (4) and (5), Alice could disrupt the protocol by sending Bob nonsense bit strings. Bob would catch this in step (6), when he tried to decrypt whatever half he received. Bob could then stop safely, before Alice could decrypt any of Bob&#146;s message pairs.
</P>
<P>If Alice were very clever, she could only disrupt half the protocol. She could send one half of each pair correctly, but send a gibberish string for the other half. Bob has only a 50 percent chance of receiving the correct half, so half the time Alice could cheat. However, this only works if there is one key pair. If there were only two pairs, this sort of deception would succeed 25 percent of the time. That is why <I>n</I> should be large. Alice has to guess correctly the outcome of <I>n</I> oblivious transfer protocols; she has a 1 in 2<SUP>n</SUP> chance of doing this. If <I>n</I> = 10, Alice has a 1 in 1024 chance of deceiving Bob.</P>
<P>Alice could also send Bob random bits in step (8). Perhaps Bob won&#146;t know that she is sending him random bits until he receives the whole key and tries to decrypt the message halves. But again, Bob has probability on his side. He has already received half of the keys, and Alice does not know which half. If <I>n</I> is large enough, Alice is sure to send him a nonsense bit to a key he has already received and he will know immediately that she is trying to deceive him.</P>
<P>Maybe Alice will just go along with step (8) until she has enough bits of the keys to mount a brute-force attack and then stop transmitting bits. DES has a 56-bit-long key. If she receives 40 of the 56 bits, she only has to try 2<SUP>16</SUP>, or 65,536, keys in order to read the message&#151;a task certainly within the realm of a computer&#146;s capabilities. But Bob will have exactly the same number of bits of her keys (or, at worst, one bit less), so he can do the same thing. Alice has no real choice but to continue the protocol.</P>
<P>The basic point is that Alice has to play fairly, because the odds of fooling Bob are just too small. At the end of the protocol, both parties have <I>n</I> signed message pairs, any one of which is sufficient for a valid signature.</P>
<P>There is one way Alice can cheat; she can send Bob identical messages in Step (5). Bob can&#146;t detect this until after the protocol is finished, but he can use a transcript of the protocol to convince a judge of Alice&#146;s duplicity.</P>
<P>There are two weaknesses with protocols of this type [138]. First, it&#146;s a problem if one of the parties has significantly more computing power than the other. If, for example, Alice can mount a brute-force attack faster than Bob can, then she can stop sending bits early in step (8), and figure out Bob&#146;s keys herself. Bob, who cannot do the same in a reasonable amount of time, will not be happy.</P>
<P>Second, it&#146;s a problem if one of the parties stops the protocol early. If Alice abruptly stops the protocol, both face similar computational efforts, but Bob does not have any real legal recourse. If, for example, the contract specifies that she do something in a week, and Alice terminates the protocol at a point when Bob would have to spend a year&#146;s worth of computing power before she is really committed, that&#146;s a problem. The real difficulty here is the lack of a near-term deadline by which the process cleanly terminates with either both or neither party bound.</P>
<P>These problems also apply to the protocols in Sections 5.8 and 5.9.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="05-09.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久人人超碰精品| bt欧美亚洲午夜电影天堂| 一个色在线综合| 国产精品精品国产色婷婷| 欧美成人精品1314www| 欧美一级在线免费| 日韩一区二区视频在线观看| 3atv一区二区三区| 91麻豆精品国产91久久久久久 | 1区2区3区欧美| 中文字幕中文字幕在线一区 | 欧美日韩亚洲另类| 欧美视频在线一区| 欧美精品v国产精品v日韩精品| 在线免费观看视频一区| 丁香婷婷综合激情五月色| 国产成人在线影院 | 99久久免费国产| 国内不卡的二区三区中文字幕 | 欧美一区二区在线免费播放 | 六月丁香综合在线视频| 理论电影国产精品| 国产成人综合精品三级| 91偷拍与自偷拍精品| 91国产免费观看| 欧美美女喷水视频| 久久久久久久一区| 一区二区三区四区蜜桃| 免费在线看成人av| 成人av综合一区| 欧美群妇大交群中文字幕| 日韩美一区二区三区| 久久精品夜夜夜夜久久| 亚洲一区电影777| 久久99国产乱子伦精品免费| 国产成a人无v码亚洲福利| 欧美日韩一区二区三区在线看| 日韩欧美色综合网站| 亚洲欧美激情视频在线观看一区二区三区| 亚洲大片免费看| 丰满白嫩尤物一区二区| 欧美三级韩国三级日本一级| 久久亚洲一级片| 性感美女极品91精品| 国产风韵犹存在线视精品| 欧美午夜片在线看| 国产欧美综合在线| 全部av―极品视觉盛宴亚洲| 91天堂素人约啪| 久久夜色精品国产欧美乱极品| 亚洲制服欧美中文字幕中文字幕| 国产一区二区精品在线观看| 欧美性一区二区| 国产精品水嫩水嫩| 精品在线免费视频| 欧美日高清视频| 亚洲美女一区二区三区| 国产成人免费网站| 欧美成人精品二区三区99精品| 亚洲美女精品一区| 成人国产精品免费| 久久免费电影网| 激情偷乱视频一区二区三区| 51精品久久久久久久蜜臀| 亚洲综合一区在线| 91在线看国产| 国产精品进线69影院| 高清不卡一二三区| 中文字幕va一区二区三区| 久久国产婷婷国产香蕉| 欧美一区二区女人| 美腿丝袜亚洲一区| 日韩一二三区不卡| 免费成人在线观看视频| 欧美一区二区二区| 日本美女一区二区三区视频| 欧美日韩国产片| 免费久久99精品国产| 91极品视觉盛宴| 亚洲乱码中文字幕| 欧美日韩精品欧美日韩精品| 爽好多水快深点欧美视频| 欧美绝品在线观看成人午夜影视| 五月激情六月综合| 日韩欧美不卡一区| 国产精品99久久久久久有的能看| 久久只精品国产| 国产一区二区剧情av在线| 欧美国产丝袜视频| 91视视频在线观看入口直接观看www | 高清不卡在线观看| 亚洲精品你懂的| 欧美肥妇free| 国产精品一卡二卡在线观看| 国产精品国产三级国产有无不卡 | 欧美mv日韩mv国产网站| 亚洲人成网站在线| 99久久伊人精品| 日韩有码一区二区三区| 在线观看亚洲精品| 韩国女主播成人在线| 欧美一卡在线观看| 成人免费观看视频| 国产精品污www在线观看| 91麻豆精品在线观看| 国产精品久久久久9999吃药| 欧美日韩国产另类一区| 五月综合激情日本mⅴ| 欧美日韩在线免费视频| 一区二区欧美精品| 欧美系列一区二区| 视频一区在线视频| 日本高清不卡在线观看| 日韩国产欧美三级| 日韩毛片高清在线播放| 在线这里只有精品| 国产传媒日韩欧美成人| 国产日韩三级在线| 日韩一卡二卡三卡| 国产69精品久久777的优势| 亚洲第一搞黄网站| 精品美女一区二区三区| 欧美视频一区二区| 久久精品999| 五月综合激情婷婷六月色窝| 欧美一级高清大全免费观看| 色哟哟国产精品免费观看| 成人在线视频一区| 蜜桃精品在线观看| 色婷婷狠狠综合| 国产成人在线视频网站| 国产91综合网| 麻豆精品新av中文字幕| 日韩精品一区二区三区中文不卡| 91色porny在线视频| 国产精品欧美综合在线| 欧美三级电影在线看| 精品国产百合女同互慰| 在线中文字幕一区二区| 亚洲已满18点击进入久久| 亚洲男人电影天堂| 日韩视频免费观看高清在线视频| 不卡一区在线观看| 久久91精品国产91久久小草| 一区二区三区四区视频精品免费 | 亚洲免费观看高清完整版在线 | 欧美日韩视频在线第一区| 1区2区3区欧美| 亚洲同性gay激情无套| 成人午夜视频网站| 成人av网址在线| 欧美一区二区性放荡片| 3751色影院一区二区三区| 无码av免费一区二区三区试看 | 亚洲国产高清在线观看视频| 欧美精品久久天天躁| 水蜜桃久久夜色精品一区的特点| 国产精品无人区| 日本二三区不卡| 欧美日韩国产大片| 日韩欧美在线123| 欧美色成人综合| 91精品国产福利| 欧美三级日韩三级| 精品国产乱码久久久久久浪潮| 色爱区综合激月婷婷| 欧美日韩精品电影| 一本到不卡免费一区二区| 欧美日韩激情在线| 亚洲欧美成aⅴ人在线观看 | 99在线精品免费| 日本久久精品电影| 99久久精品免费看国产免费软件| 91极品视觉盛宴| 色婷婷亚洲精品| 精品免费99久久| 免费黄网站欧美| 成人激情视频网站| 91福利在线看| 欧美图区在线视频| 久久欧美一区二区| 久久综合九色综合欧美就去吻| 国产精品国产a| 精品国产亚洲在线| 亚洲精品高清在线| 国产精品久久久久国产精品日日| 国产精品久久国产精麻豆99网站| 亚洲成a人片在线不卡一二三区 | 69久久99精品久久久久婷婷| 国产精品自拍三区| 国产一区二区三区电影在线观看 | 亚洲综合色婷婷| 亚洲妇熟xx妇色黄| 成人精品一区二区三区中文字幕 | 国产精品第五页| 青青草精品视频| 国产在线看一区| 色综合久久久久网| 精品国产成人系列| 国产精品久久久久久户外露出|