亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 13-08.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號(hào):
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Other Block Ciphers</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=13//-->
<!--PAGES=326-329//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="13-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch14/14-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Security of MMB</I></B></FONT></P>
<P>The design of MMB ensures that each round has considerable diffusion independent of the key. In IDEA, the amount of diffusion is to some extent dependent on the particular subkeys. MMB was also designed not to have any weak keys as IDEA has.
</P>
<P>MMB is dead [402]. Although no cryptanalysis has been published, this is true for several reasons. First, it was not designed to be resistant to linear cryptanalysis. The multiplication factors were chosen to be resistant to differential cryptanalysis, but the algorithm&#146;s authors were unaware of linear cryptanalysis.</P>
<P>Second, Eli Biham has an effective chosen-key attack [160], which exploits the fact that all rounds are identical and that the key schedule is just a cyclic shift by 32 bits. Third, even though MMB would be very efficient in software, the algorithm would be less efficient than DES in hardware.</P>
<P>Daemen suggests that anyone interested in improving MMB should first do an analysis of modular multiplication with respect to linear cryptanalysis and choose a new multiplication factor, and then make the constant C different for each round [402]. Then, improve the key scheduling by adding constants to the round keys to remove the bias. He&#146;s not going to do it; he designed 3-Way instead (see Section 14.5).</P>
<H3><A NAME="Heading12"></A><FONT COLOR="#000077">13.11 CA-1.1</FONT></H3>
<P>CA is a block cipher built on cellular automata, designed by Howard Gutowitz [677, 678, 679]. It encrypts plaintext in 384-bit blocks and has a 1088-bit key (it&#146;s really two keys, a 1024-bit key and a 64-bit key). Because of the nature of cellular automata, the algorithm is most efficient when implemented in massively parallel integrated circuits.
</P>
<P>CA-1.1 uses both reversible and irreversible cellular automaton rules. Under a reversible rule, each state of the lattice comes from a unique predecessor state, while under an irreversible rule, each state can have many predecessor states. During encryption, irreversible rules are iterated backward in time. To go backward from a given state, one of the possible predecessor states is selected at random. This process can be repeated many times. Backward iteration thus serves to mix random information with the message information. CA-1.1 uses a particular kind of partially linear irreversible rule, which is such that a random predecessor state for any given state can be rapidly built. Reversible rules are also used for some stages of encryption.</P>
<P>The reversible rules (simple parallel permutations on sub-blocks of the state) are nonlinear. The irreversible rules are derived entirely from information in the key, while the reversible rules depend both on key information and on the random information inserted during the stages of encryption with irreversible rules.</P>
<P>CA-1.1 is built around a block-link structure. That is, the processing of the message block is partially segregated from the processing of the stream of random information inserted during encryption. This random information serves to link stages of encryption together. It can also be used to chain together a ciphertext stream. The information in the link is generated as part of encryption.</P>
<P>Because CA-1.1 is a new algorithm, it is too early to make any pronouncements on its security. Gutowitz discusses some possible attacks, including differential cryptanalysis, but is unable to break the algorithm. As an incentive, Gutowitz has offered a $1000 prize to &#147;the first person who develops a tractable procedure to break CA-1.1.&#148;</P>
<P>CA-1.1 is patented [678], but is available free for non-commercial use. Anyone interested in either licensing the algorithm or in the cryptanalysis prize should contact Howard Gutowitz, ESPCI, Laboratoire d&#146;僱ectronique, 10 rue Vauquelin, 75005 Paris, France.</P>
<H3><A NAME="Heading13"></A><FONT COLOR="#000077">13.12 Skipjack</FONT></H3>
<P>Skipjack is the NSA-developed encryption algorithm for the Clipper and Capstone chips (see Sections 24.16 and 24.17). Since the algorithm is classified Secret, its details have never been published. It will only be implemented in tamperproof hardware.
</P>
<P>The algorithm is classified Secret, not because that enhances its security, but because the NSA doesn&#146;t want Skipjack being used without the Clipper key-escrow mechanism. They don&#146;t want the algorithm implemented in software and spread around the world.</P>
<P>Is Skipjack secure? If the NSA wants to produce a secure algorithm, they presumably can. On the other hand, if the NSA wants to design an algorithm with a trapdoor, they can do that as well.</P>
<P>Here&#146;s what has been published [1154, 462].</P>
<DL>
<DD><B>&#151;</B>&nbsp;&nbsp;It&#146;s an iterative block cipher.
<DD><B>&#151;</B>&nbsp;&nbsp;The block size is 64 bits.
<DD><B>&#151;</B>&nbsp;&nbsp;It has an 80-bit key.
<DD><B>&#151;</B>&nbsp;&nbsp;It can be used in ECB, CBC, 64-bit OFB, or 1-, 8-, 16-, 32- or 64-bit CFB modes.
<DD><B>&#151;</B>&nbsp;&nbsp;There are 32 rounds of processing per single encrypt or decrypt operation.
<DD><B>&#151;</B>&nbsp;&nbsp;NSA started the design in 1985 and completed the evaluation in 1990.
</DL>
<P>The documentation for the Mykotronx Clipper chip says that the latency for the Skipjack algorithm is 64 clock cycles. This means that each round consists of two clock cycles: presumably one for the S-box substitution and another for the final XOR at the end of the round. (Remember: permutations take no time in hardware.) The Mykotronx documentation calls this two-clock-cycle operation a &#147;G-box, &#148; and the whole thing a &#147;shift.&#148; (Some part of the G-box is called an &#147;F-table, &#148; probably a table of constants but maybe a table of functions.)
</P>
<P>I heard a rumor that Skipjack uses 16 S-boxes, and another that the total memory requirement for storing the S-boxes is 128 bytes. It is unlikely that both of these rumors are true.</P>
<P>Another rumor implies that Skipjack&#146;s rounds, unlike DES&#146;s, do not operate on half of the block size. This, combined with the notion of &#147;shifts, &#148; an inadvertent statement made at Crypto &#146;94 that Skipjack has &#147;a 48-bit internal structure, &#148; implies that it is similar in design to SHA (see Section 18.7) but with four 16-bit sub-blocks: three sub-blocks go through a key-dependent one-way function to produce 16 bits, which are XORed with the remaining sub-block; then the whole block is circularly shifted 16 bits to become the input to the next round, or shift. This also implies 128 bytes of S-box data. I suspect that the S-boxes are key-dependent.</P>
<P>The structure of Skipjack is probably similar to DES. The NSA realizes that their tamperproof hardware will be reverse-engineered eventually; they won&#146;t risk any advanced cryptographic techniques.</P>
<P>The fact that the NSA is planning to use the Skipjack algorithm to encrypt their Defense Messaging System (DMS) implies that the algorithm is secure. To convince the skeptics, NIST allowed a panel of &#147;respected experts from outside the government...access to the confidential details of the algorithm to assess its capabilities and publicly report its findings&#148; [812].</P>
<P>The preliminary report of these experts [262] (there never was a final report, and probably never will be) concluded that:</P>
<BLOCKQUOTE><P>Under an assumption that the cost of processing power is halved every 18 months, it will be 36 years before the difficulty of breaking Skipjack by exhaustive search will be equal to the difficulty of breaking DES today. Thus, there is no significant risk that Skipjack will be broken by exhaustive search in the next 30&#150;40 years.
</P>
<P>There is no significant risk that Skipjack can be broken through a shortcut method of attack, including differential cryptanalysis. There are no weak keys; there is no complementation property. The experts, not having time to evaluate the algorithm to any great extent, instead evaluated NSA&#146;s own design and evaluation process.</P>
<P>The strength of Skipjack against a cryptanalytic attack does not depend on the secrecy of the algorithm.</P>
</BLOCKQUOTE><P>Of course, the panelists did not look at the algorithm long enough to come to any conclusions themselves. All they could do was to look at the results that the NSA showed to them.
</P>
<P>One unanswered question is whether the Skipjack keyspace is flat (see Section 8.2). Even if Skipjack has no weak keys in the DES sense, some artifact of the key-scheduling process could make some keys stronger than others. Skipjack could have 2<SUP>70</SUP> strong keys, far more than DES; the odds of choosing one of those strong keys at random would still be about 1 in 1000. Personally, I think the Skipjack keyspace is flat, but the fact that no one has ever said this publicly is worrisome.</P>
<P>Skipjack is patented, but the patent is being withheld from distribution by a patent secrecy agreement [1122]. The patent will only be issued when and if the Skipjack algorithm is successfully reverse-engineered. This gives the government the best of both worlds: the protection of a patent and the confidentiality of a trade secret.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="13-07.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch14/14-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91精品黄色片免费大全| 日韩avvvv在线播放| 久久免费的精品国产v∧| 欧美精品一二三| 国产v综合v亚洲欧| 日本免费新一区视频| 日韩一区二区在线免费观看| 国产一区二区主播在线| 精品成a人在线观看| 一本一道久久a久久精品| ㊣最新国产の精品bt伙计久久| 欧美一区二区三区播放老司机| 久久精品999| 亚洲精品免费播放| 亚洲欧洲日产国产综合网| 国产日韩精品一区二区三区| 欧美一区二区视频网站| 色哟哟国产精品| 一本大道久久a久久精品综合| 国产尤物一区二区在线| 日韩精品久久久久久| 亚洲欧洲精品一区二区三区不卡 | 欧美刺激脚交jootjob| 欧美天堂一区二区三区| 欧亚一区二区三区| 国产成人精品三级| 久久99久久久久| 日韩精品一卡二卡三卡四卡无卡| 国产精品成人免费在线| 精品国产麻豆免费人成网站| 在线观看网站黄不卡| 成人黄色免费短视频| 成人国产精品视频| 成人高清av在线| 日韩精品成人一区二区在线| 亚洲一二三四区| 亚洲一区欧美一区| 亚洲一区在线观看免费观看电影高清| 国产精品视频线看| 亚洲va欧美va国产va天堂影院| 欧美激情一区不卡| 亚洲第一综合色| jlzzjlzz国产精品久久| 欧美日韩一区二区欧美激情| 亚洲成a人片在线观看中文| 日本亚洲三级在线| av网站一区二区三区| 欧美性一级生活| 国产视频亚洲色图| 午夜精品久久久久久久99樱桃| 黄色成人免费在线| 欧美午夜宅男影院| 国产亚洲女人久久久久毛片| 亚洲午夜羞羞片| 国产91精品一区二区| 欧美电视剧免费观看| 最新热久久免费视频| 日本午夜精品一区二区三区电影| 成人免费看片app下载| 日韩色视频在线观看| 一区二区三区资源| 高清国产午夜精品久久久久久| 欧美精品xxxxbbbb| 亚洲欧美日本在线| 国产精品99久久久久久久女警| 欧美日韩高清在线| 亚洲色图在线看| 国产乱人伦偷精品视频免下载| 欧美精品久久久久久久久老牛影院| 国产精品国产三级国产有无不卡| 日韩va亚洲va欧美va久久| 91蝌蚪porny九色| 久久久精品免费观看| 七七婷婷婷婷精品国产| 欧美日韩亚洲不卡| 亚洲男女一区二区三区| 国产成人精品一区二| 欧美成人精品二区三区99精品| 亚洲国产精品欧美一二99| 97久久超碰国产精品| 国产欧美日韩视频在线观看| 精品一区免费av| 91精品国产入口在线| 性做久久久久久| 欧日韩精品视频| 一区二区在线观看av| 99精品热视频| 国产精品久久久久久久久免费樱桃 | 国产网站一区二区三区| 美腿丝袜在线亚洲一区| 欧美日韩一区三区四区| 亚洲综合成人网| 91老师国产黑色丝袜在线| 国产精品色在线观看| 成人在线视频首页| 日本一二三不卡| 成人影视亚洲图片在线| 国产欧美一区视频| 丰满放荡岳乱妇91ww| 国产偷国产偷精品高清尤物| 国产美女精品人人做人人爽| 久久网这里都是精品| 国产精品88888| 欧美国产成人精品| 成人性生交大片免费看中文| 国产精品久久久久桃色tv| 成人午夜大片免费观看| 国产精品久99| 95精品视频在线| 亚洲黄色性网站| 欧美日韩卡一卡二| 日本大胆欧美人术艺术动态| 日韩免费性生活视频播放| 久久不见久久见免费视频1| 精品成人免费观看| 国产成人精品免费一区二区| 国产精品不卡一区二区三区| 色琪琪一区二区三区亚洲区| 一区二区三区鲁丝不卡| 7777女厕盗摄久久久| 久久精品国产99国产精品| 久久无码av三级| 97se狠狠狠综合亚洲狠狠| 国产精品一二三区在线| 中文字幕在线观看不卡| 日本福利一区二区| 热久久免费视频| 久久精品视频一区| 一本色道久久加勒比精品| 天天色图综合网| 精品成人佐山爱一区二区| 不卡一区在线观看| 亚洲电影中文字幕在线观看| 日韩午夜在线播放| 9色porny自拍视频一区二区| 亚洲网友自拍偷拍| 久久一区二区视频| 色综合久久久久综合体桃花网| 五月婷婷综合网| 国产拍欧美日韩视频二区| 欧美亚洲国产一区二区三区va| 免费成人在线影院| 中文字幕一区在线| 91麻豆精品国产91久久久更新时间| 国产在线日韩欧美| 一区二区三区精品在线| 精品少妇一区二区三区在线播放 | 欧美伊人久久久久久久久影院 | 麻豆一区二区三| 国产精品无人区| 欧美精品一卡二卡| k8久久久一区二区三区| 日韩精品亚洲一区| 最新不卡av在线| 精品黑人一区二区三区久久| 日本道免费精品一区二区三区| 美女诱惑一区二区| 中文字幕在线一区| 欧美成人官网二区| 欧美日韩亚州综合| av一区二区三区四区| 久久超级碰视频| 亚洲一区二区三区免费视频| 国产亚洲综合在线| 91麻豆精品91久久久久久清纯| aaa欧美大片| 国产麻豆成人传媒免费观看| 午夜激情综合网| 亚洲蜜臀av乱码久久精品| 亚洲精品一区二区三区香蕉| 色婷婷精品大在线视频| 国产成人精品三级麻豆| 麻豆成人免费电影| 午夜成人免费电影| 有坂深雪av一区二区精品| 欧美国产精品一区| 久久综合久久综合久久综合| 欧美电影在哪看比较好| 色综合久久综合| a4yy欧美一区二区三区| 国产激情精品久久久第一区二区| 日韩av电影天堂| 亚洲第一av色| 亚洲一区二区影院| ...中文天堂在线一区| 中文字幕av一区二区三区 | 久久se精品一区二区| 亚洲福利一二三区| 一区二区三区在线视频免费观看| 国产精品国产自产拍高清av| 国产偷国产偷精品高清尤物| 欧美精品一区二区三区蜜桃视频 | 日韩国产欧美三级| 亚洲在线成人精品| 亚洲乱码国产乱码精品精可以看 | 一区二区三区四区在线免费观看| 欧美激情在线观看视频免费| 精品国产3级a| 欧美r级电影在线观看| 日韩欧美国产一区二区在线播放|