亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 13-07.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Other Block Ciphers</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=13//-->
<!--PAGES=323-326//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="13-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="13-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>The number at the positions of &#147;<I>x</I>&#148; can be any number. If this key is used, the bit-wise XOR of certain plaintext pairs guarantees the bit-wise XOR of the resultant ciphertext pairs.</P>
<P>In any case, the chance of accidentally generating one of these weak keys is very small: one in 2<SUP>96</SUP>. There is no danger if you choose keys at random. And it is easy to modify IDEA so that it doesn&#146;t have any weak keys: XOR every subkey with the value 0x0dae [409].</P>
<P>I know of no other cryptanalytic results against IDEA, although many people have tried.</P>
<P><FONT SIZE="+1"><B><I>IDEA Modes of Operation and Variants</I></B></FONT></P>
<P>IDEA can work within any block cipher mode discussed in Chapter 9. Any double-IDEA implementation would be susceptible to the same meet-in-the-middle attack as DES (see Section 15.1). However, because IDEA&#146;s key length is more than double DES&#146;s, the attack is impractical. It would require a storage space of 64*2<SUP>128</SUP> bits, or 10<SUP>39</SUP> bytes. Maybe there&#146;s enough matter in the universe to create a memory device that large, but I doubt it.</P>
<I><P><A NAME="Fig10"></A><A HREF="javascript:displayWindow('images/13-10.jpg',316,339 )"><IMG SRC="images/13-10t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/13-10.jpg',316,339)"><FONT COLOR="#000077"><B>Figure 13.10</B></FONT></A>&nbsp;&nbsp;PES.</I>
</P>
<P>If you&#146;re worried about parallel universes as well, use a triple-IDEA implementation (see Section 15.2):
</P>
<DL>
<DD><I>C</I> = <I>E</I><SUB><SMALL>K</SMALL>3</SUB>(<I><SMALL>D</SMALL><SUB>K</I>2</SUB>(<I>E</I><SUB><SMALL>K</SMALL>1</SUB>(<I>P</I>)))
</DL>
<P>It is immune to the meet-in-the-middle attack.
</P>
<P>There&#146;s also no reason why you can&#146;t implement IDEA with independent subkeys, especially if you have key-management tools to handle the longer key. IDEA needs a total of 52 16-bit keys, for a total key length of 832 bits. This variant is definitely more secure, but no one knows by how much.</P>
<P>A na&#239;ve variation might double the block size. The algorithm would work just as well with 32-bit sub-blocks instead of 16-bit sub-blocks, and a 256-bit key. Encryption would be quicker and security would increase 2<SUP>32</SUP> times. Or would it? The theory behind the algorithm hinges on the fact that 2<SUP>16</SUP> &#43; 1 is prime; 2<SUP>32</SUP> &#43; 1 is not. Perhaps the algorithm could be modified to work, but it would have very different security properties. Lai says it would be difficult to make it work [926].</P>
<P>While IDEA appears to be significantly more secure than DES, it isn&#146;t always easy to substitute one for the other in an existing application. If your database and message templates are hardwired to accept a 64-bit key, it may be impossible to implement IDEA&#146;s 128-bit key.</P>
<P>For those applications, generate a 128-bit key by concatenating the 64-bit key with itself. Remember that IDEA is weakened considerably by this modification.</P>
<P>If you are more concerned with speed than security, you might consider a variant of IDEA with fewer rounds. Currently the best attack against IDEA is faster than brute force only for 2.5 rounds or less [1050]; 4 round IDEA would be twice as fast and, as far as I know, just as secure.</P>
<P><FONT SIZE="+1"><B><I>Caveat Emptor</I></B></FONT></P>
<P>IDEA is a relatively new algorithm, and many questions remain. Is IDEA a group? (Lai thinks not [926].) Are there any still-undiscovered ways of breaking this cipher? IDEA has a firm theoretical basis, but time and time again secure-looking algorithms have fallen to new forms of cryptanalysis. Several academic and military groups have cryptanalyzed IDEA. None of them has gone public about any successes they might have had. One might&#151;someday.
</P>
<P><FONT SIZE="+1"><B><I>Patents and Licenses</I></B></FONT></P>
<P>IDEA is patented in Europe and the United States [1012, 1013]. The patent is held by Ascom-Tech AG. No license fee is required for non-commercial use. Commercial users interested in licensing the algorithm should contact Ascom Systec AG, Dept CMVV, Gewerbepark, CH-5506, M&#228;genwil, Switzerland<I>;</I> &#43;41 64 56 59 83<I>;</I> Fax:&#43;41 64 56 59 90<I>;</I> idea@ascom.ch.</P>
<H3><A NAME="Heading11"></A><FONT COLOR="#000077">13.10 MMB</FONT></H3>
<P>A complaint against IDEA, that it uses a 64-bit encryption block, was addressed by Joan Daemen in an algorithm called MMB (Modular Multiplication-based Block cipher) [385, 405, 406]. MMB is based on the same basic theory as IDEA: mixing operations of different algebraic groups. MMB is an iterative algorithm that mainly consists of linear steps (XOR and key applications) and the parallel applications of four large nonlinear invertible substitutions. These substitutions are determined by a multiplication modulo 2<SUP>32</SUP> &#150; 1 with constant factors. The result is an algorithm that has both a 128-bit key and a 128-bit block size.</P>
<P>MMB operates on 32-bit sub-blocks of text (<I>x</I><SUB>0</SUB>, <I>x</I><SUB>1</SUB>, <I>x</I><SUB>2</SUB>, <I>x</I><SUB>3</SUB>) and 32-bit sub-blocks of key (<I>k</I><SUB>0</SUB>, <I>k</I><SUB>1</SUB>, <I>k</I><SUB>2</SUB>, <I>k</I><SUB>3</SUB>). This makes the algorithm well suited for implementation on modern, 32-bit processors. A nonlinear function, f, is applied six times alternating with XORing. Here it is (all index operations are mod 4):</P>
<DL>
<DD><I>x</I><SUB>i</SUB> = <I>x</I><SUB>i</SUB> &#8853; <I>k</I><SUB>i</SUB>, for <I>i</I> = 0 to 3
<DD>f(<I>x</I><SUB>0</SUB>,<I>x</I><SUB>1</SUB>,<I>x</I><SUB>2</SUB>,<I>x</I><SUB>3</SUB>)
<DD><I>x</I><SUB>i</SUB> = <I>x</I><SUB>i</SUB> &#8853; <I>k</I><SUB>i &#43; 1</SUB>, for <I>i</I> = 0 to 3
<DD>f(<I>x</I><SUB>0</SUB>,<I>x</I><SUB>1</SUB>,<I>x</I><SUB>2</SUB>,<I>x</I><SUB>3</SUB>)
<DD><I>x</I><SUB>i</SUB> = <I>x</I><SUB>i</SUB> &#8853; <I>k</I><SUB>i &#43; 2</SUB>, for <I>i</I> = 0 to 3
<DD>f(<I>x</I><SUB>0</SUB>,<I>x</I><SUB>1</SUB>,<I>x</I><SUB>2</SUB>,<I>x</I><SUB>3</SUB>)
<DD><I>x</I><SUB>i</SUB> = <I>x</I><SUB>i</SUB> &#8853; <I>k</I><SUB>i</SUB>, for <I>i</I> = 0 to 3
<DD>f(<I>x</I><SUB>0</SUB>,<I>x</I><SUB>1</SUB>,<I>x</I><SUB>2</SUB>,<I>x</I><SUB>3</SUB>)
<DD><I>x</I><SUB>i</SUB> = <I>x</I><SUB>i</SUB> &#8853; <I>k</I><SUB>i &#43; 1</SUB>, for <I>i</I> = 0 to 3
<DD>f(<I>x</I><SUB>0</SUB>,<I>x</I><SUB>1</SUB>,<I>x</I><SUB>2</SUB>,<I>x</I><SUB>3</SUB>)
<DD><I>x</I><SUB>i</SUB> = <I>x</I><SUB>i</SUB> &#8853; <I>k</I><SUB>i &#43; 2</SUB>, for <I>i</I> = 0 to 3
<DD>f(<I>x</I><SUB>0</SUB>,<I>x</I><SUB>1</SUB>,<I>x</I><SUB>2</SUB>,<I>x</I><SUB>3</SUB>)
</DL>
<P>The function f has three steps:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;<I>x</I><SUB>i</SUB> = <I>c</I><SUB>i</SUB> * <I>x</I><SUB>i</SUB>, for <I>i</I> = 0 to 3 (If the input to the multiplication is all 1s, the output is also all 1s.)
<DD><B>(2)</B>&nbsp;&nbsp;If the least significant bit of <I>x</I><SUB>0</SUB> = 1, then <I>x</I><SUB>0</SUB> = <I>x</I><SUB>0</SUB> &#8853; C. If the least significant byte of <I>x</I><SUB>3</SUB> = 0, then <I>x</I><SUB>3</SUB> = <I>x</I><SUB>3</SUB> &#8853; C.
<DD><B>(3)</B>&nbsp;&nbsp;<I>x</I><SUB>i</SUB> = <I>x</I><SUB>i &#150; 1</SUB> &#8853; <I>x</I><SUB>i</SUB> &#8853; <I>x</I><SUB>i &#43; 1</SUB>, for <I>i</I> = 0 to 3
<P>All index operations are mod 4. The multiplication operation in step (1) is modulo 2<SUP>32</SUP> &#150; 1. For the purposes of the algorithm, if the second operand is 2<SUP>32</SUP> &#150; 1, then the result is 2<SUP>32</SUP> &#150; 1. The various constants are:
</DL>
<DL>
<DD>C = 2aaaaaaa
<DD>c<SUB>0</SUB> = 025f1cdb
<DD>c<SUB>1</SUB> = 2 * c<SUB>0</SUB>
<DD>c<SUB>2</SUB> = 2<SUP>3</SUP> * c<SUB>0</SUB>
<DD>c<SUB>3</SUB> = 2<SUP>7</SUP> * c<SUB>0</SUB>
</DL>
<P>The constant C is the &#147;simplest&#148; constant with a high ternary weight, a least-significant bit of zero, and no circular symmetry. The constant c<SUB>0</SUB> has certain other characteristics. The constants c<SUB>1</SUB>, c<SUB>2</SUB>, and c<SUB>3</SUB> are shifted versions of c<SUB>0</SUB>, preventing attacks based on symmetry. See [405] for more details.</P>
<P>Decryption is the reverse process. Steps (2) and (3) are their own inverse. Step (1) uses <I>c</I><SUB>i</SUB><SUP>-1</SUP> instead of <I>c</I><SUB>i</SUB>. The value of <I>c</I><SUB>0</SUB><SUP>-1</SUP> is 0dad4694.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="13-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="13-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99久久免费精品| 日韩三级在线观看| 日韩免费观看高清完整版| 欧美国产欧美亚州国产日韩mv天天看完整 | 亚洲一区二区高清| 国产乱理伦片在线观看夜一区| 色又黄又爽网站www久久| 精品少妇一区二区三区在线视频| 亚洲欧美日韩在线不卡| 国产在线视频不卡二| 欧美日韩激情一区二区三区| 国产亚洲污的网站| 麻豆91在线看| 欧美日韩成人综合在线一区二区| 国产精品二三区| 国产一区欧美二区| 日韩一区二区在线播放| 亚洲小说春色综合另类电影| 岛国一区二区在线观看| 久久先锋影音av| 蜜乳av一区二区三区| 欧美日韩一区二区在线视频| 国产精品丝袜一区| 国产成人无遮挡在线视频| 精品三级在线观看| 毛片一区二区三区| 欧美tickle裸体挠脚心vk| 日韩精品乱码av一区二区| 欧美日韩国产精品成人| 亚洲午夜电影在线| 欧美日韩一区二区在线观看| 亚洲二区在线观看| 欧美色老头old∨ideo| 亚洲一区在线视频观看| 欧美综合天天夜夜久久| 亚洲高清免费观看高清完整版在线观看| 成人免费精品视频| 中文字幕一区二区三区av| 风流少妇一区二区| 国产精品色在线观看| 成人福利视频在线看| 国产精品久线在线观看| 91免费在线看| 亚洲三级在线免费观看| 色综合久久久久久久久| 一区二区三区国产| 91精品国产aⅴ一区二区| 麻豆免费精品视频| 欧美激情艳妇裸体舞| 色综合久久88色综合天天免费| 亚洲免费毛片网站| 欧美日韩大陆一区二区| 久久99国产精品免费网站| 久久久综合视频| 99久久综合精品| 亚洲制服丝袜一区| 精品国产露脸精彩对白 | 天堂一区二区在线免费观看| 91精品午夜视频| 久久av老司机精品网站导航| 久久久天堂av| 一本久久a久久精品亚洲 | 一区二区三区久久| 51久久夜色精品国产麻豆| 国产91高潮流白浆在线麻豆| 亚洲欧洲av一区二区三区久久| 欧美日韩一二区| 国产成人啪免费观看软件| 一区二区免费看| 久久奇米777| 欧美亚洲一区二区在线| 国产自产2019最新不卡| 一区二区三区不卡在线观看 | 精品中文字幕一区二区小辣椒| 欧美国产视频在线| 欧美精品一二三| av电影在线观看一区| 日本最新不卡在线| 最新成人av在线| 精品国产乱子伦一区| 色美美综合视频| 国产成人免费视频网站| 肉色丝袜一区二区| 国产精品狼人久久影院观看方式| 日韩三级精品电影久久久| 一本色道久久综合精品竹菊| 国产精品自拍av| 日韩中文字幕1| 亚洲久本草在线中文字幕| 久久久综合激的五月天| 欧美日韩精品系列| 国产精品欧美一区喷水| 天堂蜜桃一区二区三区| 亚洲欧洲日本在线| 欧美精品一区二区三区高清aⅴ| 91国偷自产一区二区使用方法| 久久99热99| 图片区日韩欧美亚洲| 亚洲欧美二区三区| 国产精品欧美久久久久无广告| 日韩欧美高清在线| 欧美日韩dvd在线观看| 欧美在线观看18| 一本色道久久综合亚洲精品按摩| 豆国产96在线|亚洲| 国产成人在线免费观看| 久久精品免费观看| 日韩精品午夜视频| 天天综合色天天综合| 亚洲欧美视频在线观看视频| 一区在线播放视频| 国产精品乱码一区二区三区软件| 精品国产91洋老外米糕| 欧美电影免费观看完整版| 在线成人av网站| 91精品久久久久久蜜臀| 7777精品伊人久久久大香线蕉的 | 日本欧美在线看| 亚洲高清不卡在线| 丝袜美腿亚洲色图| 蜜臀精品一区二区三区在线观看 | 欧美巨大另类极品videosbest | 国产精品久久久久影院| 国产精品电影院| 一区二区三区在线观看国产| 一区二区三区视频在线看| 伊人开心综合网| 亚洲成在线观看| 人人精品人人爱| 国产中文字幕精品| 粉嫩高潮美女一区二区三区| 成人深夜福利app| 91在线视频在线| 欧美日韩精品一二三区| 日韩免费观看高清完整版在线观看| 日韩美女视频在线| 国产亚洲欧美在线| 亚洲精品高清视频在线观看| 亚洲成人激情av| 精品一二三四在线| 成人av综合在线| 欧美视频在线观看一区| 6080日韩午夜伦伦午夜伦| 久久久精品一品道一区| 亚洲免费观看高清在线观看| 亚洲国产精品综合小说图片区| 奇米影视7777精品一区二区| 国产精品伊人色| 91成人免费在线视频| 欧美大度的电影原声| 国产精品久久久一本精品| 亚洲成a天堂v人片| 国产精品一区二区在线观看网站| 91免费观看视频在线| 91精品国产一区二区人妖| 国产精品久久久久久久久久久免费看| 一区二区三区精品| 国产精品一级在线| 欧美日韩国产天堂| 国产精品伦理一区二区| 蜜桃精品视频在线| 欧美羞羞免费网站| 中文av字幕一区| 麻豆精品精品国产自在97香蕉| 91亚洲精品久久久蜜桃| 日韩免费高清电影| 亚洲一区二区欧美日韩| 懂色av一区二区三区免费观看| 91精品久久久久久久91蜜桃| 亚洲精品中文字幕乱码三区| 国内精品第一页| 欧美一区二区三区在线观看| 专区另类欧美日韩| 国产成人亚洲综合a∨婷婷图片| 制服丝袜在线91| 亚洲小少妇裸体bbw| 91丝袜美腿高跟国产极品老师| 久久久91精品国产一区二区三区| 日韩高清不卡一区二区| 色吧成人激情小说| 成人免费在线视频| 国产高清不卡一区| 欧美一区二区三区视频免费 | 国产成人av影院| 欧美日韩一级片在线观看| 欧美精品少妇一区二区三区| 最新高清无码专区| 国产成人综合亚洲网站| 在线观看91精品国产麻豆| 亚洲国产精品久久一线不卡| 成人h动漫精品一区二区| 日韩精品一区国产麻豆| 日本在线不卡视频| 在线看不卡av| 国产精品久久久久久久久果冻传媒| 国产福利一区二区| 精品av综合导航| 美洲天堂一区二卡三卡四卡视频 | 欧美亚洲动漫制服丝袜| 在线播放亚洲一区|