亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 13-06.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號(hào):
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Other Block Ciphers</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=13//-->
<!--PAGES=322-323//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="13-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="13-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Decryption is exactly the same, except that the subkeys are reversed and slightly different. The decryption subkeys are either the additive or multiplicative inverses of the encryption subkeys. (For the purposes of IDEA, the all-zero sub-block is considered to represent 2<SUP>16</SUP> = &#150; 1 for multiplication modulo 2<SUP>16</SUP> &#43; 1; thus the multiplicative inverse of 0 is 0.) Calculating these takes some doing, but you only have to do it once for each decryption key. Table 13.4 shows the encryption subkeys and the corresponding decryption subkeys.</P>
<P><FONT SIZE="+1"><B><I>Speed of IDEA</I></B></FONT></P>
<P>Current software implementations of IDEA are about twice as fast as DES. IDEA on a 33 megahertz 386 machine encrypts data at 880 kilobits per second, and 2400 kilobits per second on a 66 megahertz 486 machine. You might think IDEA should be faster, but multiplications aren&#146;t cheap. To multiply two 32-bit numbers on a 486 requires 40 clock cycles (10 on a Pentium).
</P>
<P>A VLSI implementation of PES encrypts data at 55 megabits per second at 25 megahertz [208, 398]. Another VLSI chip developed at ETH Zurich, consisting of 251, 000 transistors on a chip 107.8 square millimeters, encrypts data using the IDEA algorithm at a 177 megabit-per-second data rate when clocked at 25 megahertz [926, 207, 397].</P>
<TABLE WIDTH="100%"><TH CAPTION COLSPAN="3" ALIGN="CENTER">Table 13.4<BR>IDEA Encryption and Decryption Subkeys
<TR>
<TD COLSPAN="3"><HR>
<TR>
<TH ALIGN="LEFT">Round
<TH ALIGN="LEFT">Encryption Subkeys
<TH ALIGN="LEFT">Decryption Subkeys
<TR>
<TD COLSPAN="3"><HR>
<TR>
<TD ALIGN="LEFT" VALIGN="TOP">1st
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(1)</SUP> Z<SUB>2</SUB><SUP>(1)</SUP> Z<SUB>3</SUB><SUP>(1)</SUP> Z<SUB>4</SUB><SUP>(1)</SUP> Z<SUB>5</SUB><SUP>(1)</SUP> Z<SUB>6</SUB><SUP>(1)</SUP>
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(9) - 1</SUP> &#150;Z<SUB>2</SUB><SUP>(9)</SUP> &#150;Z<SUB>3</SUB><SUP>(9)</SUP> Z<SUB>4</SUB><SUP>(9) - 1</SUP> Z<SUB>5</SUB><SUP>(8)</SUP> Z<SUB>6</SUB><SUP>(8)</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="TOP">2nd
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(2)</SUP> Z<SUB>2</SUB><SUP>(2)</SUP> Z<SUB>3</SUB><SUP>(2)</SUP> Z<SUB>4</SUB><SUP>(2)</SUP> Z<SUB>5</SUB><SUP>(2)</SUP> Z<SUB>6</SUB><SUP>(2)</SUP>
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(8) - 1</SUP> &#150;Z<SUB>3</SUB><SUP>(8)</SUP> &#150;Z<SUB>2</SUB><SUP>(8)</SUP> Z<SUB>4</SUB><SUP>(8) - 1</SUP> Z<SUB>5</SUB><SUP>(7)</SUP> Z<SUB>6</SUB><SUP>(7)</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="TOP">3rd
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(3)</SUP> Z<SUB>2</SUB><SUP>(3)</SUP> Z<SUB>3</SUB><SUP>(3)</SUP> Z<SUB>4</SUB><SUP>(3)</SUP> Z<SUB>5</SUB><SUP>(3)</SUP> Z<SUB>6</SUB><SUP>(3)</SUP>
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(7) - 1</SUP> &#150;Z<SUB>3</SUB><SUP>(7)</SUP> &#150;Z<SUB>2</SUB><SUP>(7)</SUP> Z<SUB>4</SUB><SUP>(7) - 1</SUP> Z<SUB>5</SUB><SUP>(6)</SUP> Z<SUB>6</SUB><SUP>(6)</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="TOP">4th
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(4)</SUP> Z<SUB>2</SUB><SUP>(4)</SUP> Z<SUB>3</SUB><SUP>(4)</SUP> Z<SUB>4</SUB><SUP>(4)</SUP> Z<SUB>5</SUB><SUP>(4)</SUP> Z<SUB>6</SUB><SUP>(4)</SUP>
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(6) - 1</SUP> &#150;Z<SUB>3</SUB><SUP>(6)</SUP> &#150;Z<SUB>2</SUB><SUP>(6)</SUP> Z<SUB>4</SUB><SUP>(6) - 1</SUP> Z<SUB>5</SUB><SUP>(5)</SUP> Z<SUB>6</SUB><SUP>(5)</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="TOP">5th
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(5)</SUP> Z<SUB>2</SUB><SUP>(5)</SUP> Z<SUB>3</SUB><SUP>(5)</SUP> Z<SUB>4</SUB><SUP>(5)</SUP> Z<SUB>5</SUB><SUP>(5)</SUP> Z<SUB>6</SUB><SUP>(5)</SUP>
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(5) - 1</SUP> &#150;Z<SUB>3</SUB><SUP>(5)</SUP> &#150;Z<SUB>2</SUB><SUP>(5)</SUP> Z<SUB>4</SUB><SUP>(5) - 1</SUP> Z<SUB>5</SUB><SUP>5(4)</SUP> Z<SUB>6</SUB><SUP>(4)</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="TOP">6th
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(6)</SUP> Z<SUB>2</SUB><SUP>(6)</SUP> Z<SUB>3</SUB><SUP>(6)</SUP> Z<SUB>4</SUB><SUP>(6)</SUP> Z<SUB>5</SUB><SUP>(6)</SUP> Z<SUB>6</SUB><SUP>(6)</SUP>
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(4) - 1</SUP> &#150;Z<SUB>3</SUB><SUP>(4)</SUP> &#150;Z<SUB>2</SUB><SUP>(4)</SUP> Z<SUB>4</SUB><SUP>(4) - 1</SUP> Z<SUB>5</SUB><SUP>(3)</SUP> Z<SUB>6</SUB><SUP>(3)</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="TOP">7th
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(7)</SUP> Z<SUB>2</SUB><SUP>(7)</SUP> Z<SUB>3</SUB><SUP>(7)</SUP> Z<SUB>4</SUB><SUP>(7)</SUP> Z<SUB>5</SUB><SUP>(7)</SUP> Z<SUB>6</SUB><SUP>(7)</SUP>
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(3) - 1</SUP> &#150;Z<SUB>3</SUB><SUP>(3)</SUP> &#150;Z<SUB>2</SUB><SUP>(3)</SUP> Z<SUB>4</SUB><SUP>(3) - 1</SUP> Z<SUB>5</SUB><SUP>(2)</SUP> Z<SUB>6</SUB><SUP>(2)</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="TOP">8th
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(8)</SUP> Z<SUB>2</SUB><SUP>(8)</SUP> Z<SUB>3</SUB><SUP>(8)</SUP> Z<SUB>4</SUB><SUP>(8)</SUP> Z<SUB>5</SUB><SUP>(8)</SUP> Z<SUB>6</SUB><SUP>(8)</SUP>
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(2) - 1</SUP> &#150;Z<SUB>3</SUB><SUP>(2)</SUP> &#150;Z<SUB>2</SUB><SUP>(2)</SUP> Z<SUB>4</SUB><SUP>(2) - 1</SUP> Z<SUB>5</SUB><SUP>(1)</SUP> Z<SUB>6</SUB><SUP>(1)</SUP>
<TR>
<TD ALIGN="LEFT" VALIGN="TOP">output<BR>transformation
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(9)</SUP> Z<SUB>2</SUB><SUP>(9)</SUP> Z<SUB>3</SUB><SUP>(9)</SUP> Z<SUB>4</SUB><SUP>(9)</SUP>
<TD ALIGN="LEFT" VALIGN="TOP">Z<SUB>1</SUB><SUP>(1) - 1</SUP> &#150;Z<SUB>2</SUB><SUP>(1)</SUP> &#150;Z<SUB>3</SUB><SUP>(1)</SUP> Z<SUB>4</SUB><SUP>(1) - 1</SUP>
<TR>
<TD COLSPAN="3"><HR>
</TABLE>
<P><FONT SIZE="+1"><B><I>Cryptanalysis of IDEA</I></B></FONT></P>
<P>IDEA&#146;s key length is 128 bits&#151;over twice as long as DES. Assuming that a brute-force attack is the most efficient, it would require 2<SUP>128</SUP>(10<SUP>38</SUP>) encryptions to recover the key. Design a chip that can test a billion keys per second and throw a billion of them at the problem, and it will still take 10<SUP>13</SUP> years&#151;that&#146;s longer than the age of the universe. An array of 10<SUP>24</SUP> such chips can find the key in a day, but there aren&#146;t enough silicon atoms in the universe to build such a machine. Now we&#146;re getting somewhere&#151;although I&#146;d keep my eye on the dark matter debate.</P>
<P>Perhaps brute force isn&#146;t the best way to attack IDEA. The algorithm is still too new for any definitive cryptanalytic results. The designers have done their best to make the algorithm immune to differential cryptanalysis; they defined the concept of a Markov cipher and showed that resistance to differential cryptanalysis can be modeled and quantified [931, 925]. (Figure 13.10 shows the original PES algorithm to be contrasted with the IDEA algorithm of Figure 13.9 which was strengthened against differential cryptanalysis. It&#146;s amazing how a few subtle changes can make such a big difference.) In [925], Lai argued (he gave evidence, not a proof) that IDEA is immune to differential cryptanalysis after only 4 of its 8 rounds. According to Biham, his related-key cryptanalytic attack doesn&#146;t work against IDEA, either [160].</P>
<P>Willi Meier examined the three algebraic operations of IDEA, and pointed out that while they are incompatible, there are instances where they can be simplified in such a way as to facilitate cryptanalysis some percentage of the time [1050]. His attack is more efficient than brute-force for 2-round IDEA (2<SUP>42</SUP> operations), but less efficient for 3-round IDEA or higher. Normal IDEA, with 8 rounds, is safe.</P>
<P>Joan Daemen discovered a class of weak keys for IDEA [406, 409]. These are not weak keys in the sense of the DES weak keys; that is, the encryption function is self-inverse. They are weak in the sense that if they are used, an attacker can easily identify them in a chosen-plaintext attack. For example, a weak key is (in hex):</P>
<DL>
<DD>0000, 0000, 0<I>x</I> 00, 0000, 0000, 000<I>x,xxxx,x</I>000
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="13-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="13-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久这里只有精品首页| 欧美国产精品一区二区三区| 粉嫩一区二区三区在线看 | 国产三级精品三级在线专区| 欧美日韩一区二区三区在线| 国产成人av一区| 日本成人中文字幕在线视频| 亚洲精品日日夜夜| 国产日韩高清在线| 欧美一级专区免费大片| 色诱视频网站一区| 粗大黑人巨茎大战欧美成人| 日本怡春院一区二区| 一区二区三区精品在线| 久久精品视频在线免费观看| 91精品国产乱| 欧美性猛交xxxx乱大交退制版| 成人av资源网站| 国产一区二区三区久久久| 婷婷综合在线观看| 亚洲最大成人综合| 亚洲欧美日韩国产成人精品影院 | 狠狠色丁香久久婷婷综合丁香| 一区二区在线观看不卡| 国产精品色噜噜| 国产欧美日韩在线| 2023国产精品视频| 欧美va日韩va| 日韩区在线观看| 在线播放中文字幕一区| 欧美亚洲精品一区| 91久久久免费一区二区| 色综合久久久久久久| thepron国产精品| 成人av网在线| av在线播放成人| 9色porny自拍视频一区二区| 成人综合在线视频| 丰满放荡岳乱妇91ww| 成人自拍视频在线观看| 成人av网址在线观看| 91蜜桃在线免费视频| 99精品国产一区二区三区不卡 | 91精品国产91久久久久久最新毛片| 91精品91久久久中77777| 色香色香欲天天天影视综合网| 97久久人人超碰| 色婷婷亚洲一区二区三区| 91亚洲精品久久久蜜桃| 在线视频一区二区三区| 欧美日韩精品一区二区三区四区| 欧美日韩在线三级| 69久久夜色精品国产69蝌蚪网| 制服丝袜av成人在线看| 欧美一级爆毛片| 久久久亚洲综合| 亚洲国产经典视频| 亚洲欧美另类久久久精品2019| 亚洲男人天堂一区| 亚洲国产一区二区三区| 麻豆成人在线观看| 国产成人综合亚洲91猫咪| 成人一区在线观看| 在线免费观看日韩欧美| 欧美精品v国产精品v日韩精品 | 欧美国产日韩在线观看| 亚洲欧洲综合另类在线| 午夜视频一区二区| 国内外成人在线| av在线不卡免费看| 欧美日韩精品欧美日韩精品| 精品人伦一区二区色婷婷| 国产精品久久一级| 午夜精品久久久久久久| 国产乱子轮精品视频| 91免费版在线看| 欧美电影免费观看完整版| 中国av一区二区三区| 亚洲国产精品一区二区www在线| 麻豆精品国产传媒mv男同| 成人少妇影院yyyy| 欧美日韩国产高清一区二区三区 | 黄色小说综合网站| 91亚洲精品乱码久久久久久蜜桃| 91精品国产综合久久精品图片| 久久久午夜精品| 亚洲国产视频网站| 成人亚洲精品久久久久软件| 欧美日韩亚洲综合在线| 国产三级精品视频| 日韩二区三区四区| 91在线国产观看| 久久在线观看免费| 亚洲第一电影网| 成人的网站免费观看| 制服丝袜激情欧洲亚洲| 亚洲欧洲精品一区二区精品久久久| 三级影片在线观看欧美日韩一区二区 | 亚洲你懂的在线视频| 国产一区二区三区美女| 欧美精品成人一区二区三区四区| 欧美激情一区在线| 蜜桃av一区二区| 欧美在线观看视频在线| 欧美激情一区二区三区四区| 久久爱www久久做| 欧美午夜精品一区二区三区| 国产精品免费视频网站| 久久国产尿小便嘘嘘| 欧美日韩在线观看一区二区| 日本一区二区久久| 国模冰冰炮一区二区| 91麻豆精品国产综合久久久久久 | 欧美va亚洲va在线观看蝴蝶网| 亚洲综合色视频| 99这里只有精品| 久久精品人人做人人综合 | 韩国三级中文字幕hd久久精品| 欧美四级电影在线观看| ...av二区三区久久精品| 国产成人免费在线| 欧美成人一区二区三区| 午夜不卡av免费| 欧美视频精品在线观看| 中文字幕中文字幕中文字幕亚洲无线| 黄页视频在线91| 日韩精品一区在线| 美女免费视频一区二区| 正在播放亚洲一区| 婷婷综合五月天| 欧美性一区二区| 一区二区三区国产精品| 色综合久久天天| 亚洲少妇30p| 色婷婷av久久久久久久| 亚洲欧美视频在线观看视频| 99re成人精品视频| 亚洲欧美一区二区三区极速播放| 成人av高清在线| 亚洲欧美日韩综合aⅴ视频| 99久久精品免费看| 亚洲色图在线看| 色呦呦一区二区三区| 一区二区三区美女视频| 欧美日韩精品一区二区三区四区 | 高清免费成人av| 国产精品三级av在线播放| 不卡电影一区二区三区| 亚洲图片激情小说| 色综合久久88色综合天天免费| 亚洲激情av在线| 欧美日韩你懂得| 久久99精品久久久| 欧美国产日韩一二三区| 972aa.com艺术欧美| 亚洲综合一区在线| 制服丝袜中文字幕一区| 国产一区二区三区综合| 国产精品色在线| 在线看国产日韩| 日本少妇一区二区| 国产视频一区在线观看| 91色.com| 日韩高清不卡在线| 国产欧美精品一区| 欧美三级资源在线| 韩国女主播一区| 欧美国产丝袜视频| 欧美色爱综合网| 精品一区二区免费看| 国产精品久久久久久久久免费丝袜 | 成人久久18免费网站麻豆| 亚洲宅男天堂在线观看无病毒| 日韩一区二区三区av| 大胆欧美人体老妇| 首页欧美精品中文字幕| 久久久99久久| 欧美亚男人的天堂| 国产美女精品一区二区三区| 亚洲欧美aⅴ...| 欧美刺激午夜性久久久久久久| av中文字幕在线不卡| 青椒成人免费视频| 国产精品毛片久久久久久| 777久久久精品| bt7086福利一区国产| 蜜臀久久久99精品久久久久久| 国产精品入口麻豆原神| 欧美大片在线观看一区二区| 99国产欧美另类久久久精品| 麻豆成人91精品二区三区| 亚洲日本在线天堂| 久久综合国产精品| 欧美三级电影一区| 成人一区二区三区视频| 麻豆91免费看| 亚欧色一区w666天堂| 国产精品国产a| 欧美精品一区二区久久久| 欧美午夜精品久久久久久孕妇|