亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 13-05.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Other Block Ciphers</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=13//-->
<!--PAGES=318-322//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="13-04.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="13-06.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>RSADSI&#146;s refusal to make RC2 public casts doubt on their claims. They are willing to provide details of the algorithm to most anyone willing to sign a nondisclosure agreement, and have claimed to allow cryptanalysts to publish any negative results they find. I don&#146;t know of any cryptanalyst outside the employ of the company who studied it, since it would amount to doing their analysis work for them.
</P>
<P>Still, Ron Rivest is not the usual snake-oil peddler. He&#146;s a respected and competent cryptographer. I would put a fair degree of trust in the algorithm, even though I haven&#146;t personally inspected the code. RC4, once the proprietary intellectual property of RSADSI, was posted to the Internet (see Section 17.1), and it&#146;s probably just a matter of time before RC2 is posted as well.</P>
<P>An agreement between the Software Publishers Association (SPA) and the U.S. government gave RC2 and RC4 (see Section 17.1) special export status (see Section 25.14). Products that implement one of these two algorithms have a much simpler export approval process, provided that the keys are no more than 40 bits long.</P>
<P>Is a 40-bit key enough? There are a total of one trillion possible keys. Assuming that brute force is the most efficient method of cryptanalysis (a big assumption, considering that the algorithm has never been published), and assuming that a brute-force cryptanalysis chip can test one million keys per second, it will take him 12.7 days to find the correct key. One thousand machines working in parallel can produce the key in twenty minutes.</P>
<P>RSA Data Security, Inc., maintains that while encryption and decryption are quick, exhaustive key search is not. A significant amount of time is spent setting up the key schedule. While this time is negligible when encrypting and decrypting messages, it is not when trying every possible key.</P>
<P>The U.S. government would never allow export of any algorithm it couldn&#146;t, at least in theory, break. They could create a magnetic tape or CD of a specific plaintext block encrypted with every possible key. To break a given message, they could just run the tape and compare the ciphertext blocks in the message with the ciphertext blocks on the tape. If there is a match, they could try the candidate key and see if the message makes any sense. If they choose a common plaintext block (all zeros, the ASCII characters for a space, etc.), this method should work. The storage requirement for a 64-bit plaintext block encrypted with all 10<SUP>12</SUP> possible keys is 8 terabytes&#151;certainly possible.</P>
<P>For information on licensing RC2, contact RSADSI (see Section 25.4).</P>
<H3><A NAME="Heading10"></A><FONT COLOR="#000077">13.9 IDEA</FONT></H3>
<P>The first incarnation of the IDEA cipher, by Xuejia Lai and James Massey, surfaced in 1990 [929]. It was called PES (Proposed Encryption Standard). The next year, after Biham and Shamir&#146;s demonstrated differential cryptanalysis, the authors strengthened their cipher against the attack and called the new algorithm IPES (Improved Proposed Encryption Standard) [931,924]. IPES changed its name to IDEA (International Data Encryption Algorithm) in 1992 [925].
</P>
<P>IDEA is based on some impressive theoretical foundations and, although cryptanalysis has made some progress against reduced-round variants, the algorithm still seems strong. In my opinion, it is the best and most secure block algorithm available to the public at this time.</P>
<P>The future of IDEA is not yet clear. There has been no rush to adopt it as a replacement to DES, partly because it is patented and must be licensed for commercial applications, and partly because people are still waiting to see how well the algorithm fares during the coming years of cryptanalysis. Its current claim to fame is that it is part of PGP (see Section 24.12).</P>
<P><FONT SIZE="+1"><B><I>Overview of IDEA</I></B></FONT></P>
<P>IDEA is a block cipher; it operates on 64-bit plaintext blocks. The key is 128 bits long. The same algorithm is used for both encryption and decryption.
</P>
<P>As with all the other block ciphers we&#146;ve seen, IDEA uses both confusion and diffusion. The design philosophy behind the algorithm is one of &#147;mixing operations from different algebraic groups.&#148; Three algebraic groups are being mixed, and they are all easily implemented in both hardware and software:</P>
<DL>
<DD>&#151; XOR
<DD>&#151; Addition modulo 2<SUP>16</SUP>
<DD>&#151; Multiplication modulo 2<SUP>16</SUP> &#43; 1. (This operation can be viewed as IDEA&#146;s S-box.)
</DL>
<P>All these operations (and these are the only operations in the algorithm&#151;there are no bit-level permutations) operate on 16-bit sub-blocks. This algorithm is even efficient on 16-bit processors.
</P>
<P><FONT SIZE="+1"><B><I>Description of IDEA</I></B></FONT></P>
<P>Figure 13.9 is an overview of IDEA. The 64-bit data block is divided into four 16-bit sub-blocks: <I>X</I><SUB>1</SUB>, <I>X</I><SUB>2</SUB>, <I>X</I><SUB>3</SUB>, and <I>X</I><SUB>4</SUB>. These four sub-blocks become the input to the first round of the algorithm. There are eight rounds total. In each round the four sub-blocks are XORed, added, and multiplied with one another and with six 16-bit subkeys. Between rounds, the second and third sub-blocks are swapped. Finally, the four sub-blocks are combined with four subkeys in an output transformation.</P>
<P>In each round, the sequence of events is as follows:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Multiply <I>X</I><SUB>1</SUB> and the first subkey.
<DD><B>(2)</B>&nbsp;&nbsp;Add <I>X</I><SUB>2</SUB> and the second subkey.
<DD><B>(3)</B>&nbsp;&nbsp;Add <I>X</I><SUB>3</SUB> and the third subkey.
<DD><B>(4)</B>&nbsp;&nbsp;Multiply <I>X</I><SUB>4</SUB> and the fourth subkey.
<DD><B>(5)</B>&nbsp;&nbsp;XOR the results of steps (1) and (3).
<DD><B>(6)</B>&nbsp;&nbsp;XOR the results of steps (2) and (4).
<DD><B>(7)</B>&nbsp;&nbsp;Multiply the results of step (5) with the fifth subkey.
<DD><B>(8)</B>&nbsp;&nbsp;Add the results of steps (6) and (7).
<DD><B>(9)</B>&nbsp;&nbsp;Multiply the results of step (8) with the sixth subkey.
<DD><B>(10)</B>&nbsp;&nbsp;Add the results of steps (7) and (9).
<I><P><A NAME="Fig9"></A><A HREF="javascript:displayWindow('images/13-09.jpg',303,339 )"><IMG SRC="images/13-09t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/13-09.jpg',303,339)"><FONT COLOR="#000077"><B>Figure 13.9</B></FONT></A>&nbsp;&nbsp;IDEA.</I>
</P>
<DD><B>(11)</B>&nbsp;&nbsp;XOR the results of steps (1) and (9).
<DD><B>(12)</B>&nbsp;&nbsp;XOR the results of steps (3) and (9).
<DD><B>(13)</B>&nbsp;&nbsp;XOR the results of steps (2) and (10).
<DD><B>(14)</B>&nbsp;&nbsp;XOR the results of steps (4) and (10).
</DL>
<P>The output of the round is the four sub-blocks that are the results of steps (11), (12), (13), and (14). Swap the two inner blocks (except for the last round) and that&#146;s the input to the next round.
</P>
<P>After the eighth round, there is a final output transformation:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Multiply <I>X</I><SUB>1</SUB> and the first subkey.
<DD><B>(2)</B>&nbsp;&nbsp;Add <I>X</I><SUB>2</SUB> and the second subkey.
<DD><B>(3)</B>&nbsp;&nbsp;Add <I>X</I><SUB>3</SUB> and the third subkey.
<DD><B>(4)</B>&nbsp;&nbsp;Multiply <I>X</I><SUB>4</SUB> and the fourth subkey.
</DL>
<P>Finally, the four sub-blocks are reattached to produce the ciphertext.
</P>
<P>Creating the subkeys is also easy. The algorithm uses 52 of them (six for each of the eight rounds and four more for the output transformation). First, the 128-bit key is divided into eight 16-bit subkeys. These are the first eight subkeys for the algorithm (the six for the first round, and the first two for the second round). Then, the key is rotated 25 bits to the left and again divided into eight subkeys. The first four are used in round 2; the last four are used in round 3. The key is rotated another 25 bits to the left for the next eight subkeys, and so on until the end of the algorithm.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="13-04.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="13-06.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲一区二区在线观看视频| 亚洲色欲色欲www在线观看| 99国产欧美另类久久久精品| 美女mm1313爽爽久久久蜜臀| 亚洲一区二区视频| 亚洲欧美二区三区| 亚洲国产高清在线观看视频| 日韩精品一区二区三区在线观看 | 欧美日韩一区二区三区在线看 | 国产呦精品一区二区三区网站| 亚洲chinese男男1069| 一区二区三区日韩精品| 综合久久一区二区三区| 国产精品久久午夜| 国产精品国产馆在线真实露脸| 精品久久久久久综合日本欧美| 欧美一区二区三区的| 日韩午夜在线观看| 欧美精品一区二区三区四区 | 中文字幕制服丝袜一区二区三区 | 日本亚洲免费观看| 日韩电影在线免费看| 天涯成人国产亚洲精品一区av| 亚洲成人激情综合网| 日本视频一区二区三区| 狠狠v欧美v日韩v亚洲ⅴ| 国产成人欧美日韩在线电影| 成人午夜免费视频| 在线免费视频一区二区| 日韩美女视频在线| 国产精品无码永久免费888| 一区二区三区在线播| 日韩国产在线观看| 国产黑丝在线一区二区三区| 99久久夜色精品国产网站| 欧美一二三区在线观看| 亚洲国产精品国自产拍av| 亚洲一区二区视频在线观看| 韩国一区二区视频| 在线亚洲人成电影网站色www| 日韩欧美国产电影| 亚洲最大成人综合| 国产丶欧美丶日本不卡视频| 欧美久久久久久久久久| 国产精品美女久久久久久久网站| 亚洲福利电影网| 成人黄色免费短视频| 欧美一区二区三区免费视频| 亚洲欧洲制服丝袜| 国产精品77777| 日韩免费福利电影在线观看| 夜夜嗨av一区二区三区四季av| 国产精品一区二区果冻传媒| 欧美电影一区二区| 亚洲动漫第一页| 欧美日韩一区视频| 亚洲精品va在线观看| 成人免费看黄yyy456| 欧美v国产在线一区二区三区| 一区二区三区精品在线观看| 成人综合激情网| 久久精品人人做人人综合| 美国一区二区三区在线播放| 在线成人av影院| 五月激情六月综合| 欧美一区欧美二区| 免费av网站大全久久| 日韩欧美专区在线| 国产一区二区三区在线看麻豆| 欧美一区二区三区视频| 久久99精品国产麻豆婷婷洗澡| 欧美一区午夜精品| 国产精品一区二区黑丝| 日本一区二区动态图| 99视频在线精品| 午夜国产精品一区| 精品乱人伦一区二区三区| 久久精品国产精品亚洲红杏| 久久久亚洲午夜电影| 不卡电影免费在线播放一区| 亚洲视频你懂的| 欧美日韩精品欧美日韩精品| 青草国产精品久久久久久| 欧美大黄免费观看| 成人午夜大片免费观看| 亚洲综合成人在线| 日韩亚洲电影在线| 92精品国产成人观看免费| 一区二区三区四区在线播放| 久久一夜天堂av一区二区三区| 粉嫩一区二区三区性色av| 不卡视频免费播放| 日韩和欧美的一区| 成人欧美一区二区三区白人| 欧美日产在线观看| www.99精品| 激情亚洲综合在线| 亚洲一区精品在线| 久久久综合视频| 欧美日韩国产高清一区| 99久久99久久久精品齐齐| 激情五月播播久久久精品| 又紧又大又爽精品一区二区| 国产丝袜在线精品| 亚洲国产精品欧美一二99| 国产精品久久三区| 久久久不卡网国产精品二区| 日韩欧美高清dvd碟片| 在线免费观看不卡av| 91丨porny丨首页| 成人黄色在线看| 国产成人精品网址| 国产成人免费网站| 久久福利资源站| 天天免费综合色| 青娱乐精品在线视频| 五月婷婷色综合| 日韩av电影天堂| 亚洲电影中文字幕在线观看| 亚洲综合一区二区三区| 亚洲欧美色图小说| 亚洲国产精品嫩草影院| 亚洲成av人片| 理论电影国产精品| 韩国理伦片一区二区三区在线播放| 久久国产精品一区二区| 丁香亚洲综合激情啪啪综合| 国产91精品一区二区麻豆亚洲| 国产成人午夜电影网| 91网站视频在线观看| 欧美专区日韩专区| 日韩午夜在线播放| 国产精品网曝门| 亚洲一区二区三区在线看| 91在线看国产| 在线电影一区二区三区| 国产午夜精品久久久久久免费视| 国产日产欧美一区| 成人午夜视频免费看| 欧美日韩aaa| 国产亚洲制服色| 天天影视涩香欲综合网| 国产福利不卡视频| 一区二区三区精品视频在线| 亚洲综合色在线| 97se亚洲国产综合自在线不卡| 久久午夜羞羞影院免费观看| 久久99蜜桃精品| 欧美xxxxx裸体时装秀| 亚洲最新视频在线观看| 国产精品一区二区在线播放 | 国产精品一区二区不卡| 884aa四虎影成人精品一区| 国产三级三级三级精品8ⅰ区| 午夜精彩视频在线观看不卡| 北条麻妃国产九九精品视频| 欧美成人r级一区二区三区| 中文字幕制服丝袜一区二区三区| 日本aⅴ免费视频一区二区三区| 91亚洲永久精品| 国产精品国产三级国产aⅴ无密码| 婷婷开心久久网| 欧美久久一二区| 久久精品国产精品亚洲红杏| 久久丝袜美腿综合| 国产不卡在线一区| 中文字幕一区在线观看视频| 成人av免费在线播放| 亚洲国产高清在线观看视频| 成人免费观看av| 亚洲国产人成综合网站| 欧美一区二区视频观看视频| 久草这里只有精品视频| 国产精品色噜噜| 精品视频999| 国内成+人亚洲+欧美+综合在线| 国产香蕉久久精品综合网| 成人av免费网站| 日韩激情视频在线观看| 中文字幕不卡三区| 欧美日韩视频在线观看一区二区三区| 青青草视频一区| 国产日韩欧美不卡| 久久国产免费看| 99久久精品国产一区二区三区| 亚洲欧美另类小说| 久久亚洲一区二区三区四区| 毛片av中文字幕一区二区| 国产色爱av资源综合区| 3d成人动漫网站| 欧美亚洲综合一区| 激情综合色播激情啊| 一区二区三区色| 中文字幕精品—区二区四季| 制服丝袜中文字幕一区| 欧美性色黄大片| 国产成人亚洲综合色影视| 亚洲高清在线视频| 亚洲男同性视频| 精品sm在线观看|