亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 01-03.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Foundations</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=01//-->
<!--PAGES=006-009//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="01-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="01-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>There are at least three other types of cryptanalytic attack.
</P>
<DL>
<DD><B>5.</B>&nbsp;&nbsp;<B>Chosen-ciphertext attack</B>. The cryptanalyst can choose different ciphertexts to be decrypted and has access to the decrypted plaintext. For example, the cryptanalyst has access to a tamperproof box that does automatic decryption. His job is to deduce the key.
<DL>
<DD>Given: <I>C</I><SUB>1</SUB>, <I>P</I><SUB>1</SUB> = <I>D</I><SUB>k</SUB>(<I>C</I><SUB>1</SUB>), <I>C</I><SUB>2</SUB>, <I>P</I><SUB>2</SUB> = <I>D</I><SUB>k</SUB>(<I>C</I><SUB>2</SUB>),...<I>C</I><SUB>i</SUB>, <I>P</I><SUB>i</SUB> = <I>D</I><SUB>k</SUB>(<I>C</I><SUB>i</SUB>)
<DD>Deduce: <I>k</I>
</DL>
<BR>This attack is primarily applicable to public-key algorithms and will be discussed in Section 19.3. A chosen-ciphertext attack is sometimes effective against a symmetric algorithm as well. (Sometimes a chosen-plaintext attack and a chosen-ciphertext attack are together known as a <B>chosen-text attack</B>.)
<DD><B>6.</B>&nbsp;&nbsp;<B>Chosen-key attack</B>. This attack doesn&#146;t mean that the cryptanalyst can choose the key; it means that he has some knowledge about the relationship between different keys. It&#146;s strange and obscure, not very practical, and discussed in Section 12.4.
<DD><B>7.</B>&nbsp;&nbsp;<B>Rubber-hose cryptanalysis</B>. The cryptanalyst threatens, blackmails, or tortures someone until they give him the key. Bribery is sometimes referred to as a <B>purchase-key attack</B>. These are all very powerful attacks and often the best way to break an algorithm.
</DL>
<P>Known-plaintext attacks and chosen-plaintext attacks are more common than you might think. It is not unheard-of for a cryptanalyst to get a plaintext message that has been encrypted or to bribe someone to encrypt a chosen message. You may not even have to bribe someone; if you give a message to an ambassador, you will probably find that it gets encrypted and sent back to his country for consideration. Many messages have standard beginnings and endings that might be known to the cryptanalyst. Encrypted source code is especially vulnerable because of the regular appearance of keywords: #define, struct, else, return. Encrypted executable code has the same kinds of problems: functions, loop structures, and so on. Known-plaintext attacks (and even chosen-plaintext attacks) were successfully used against both the Germans and the Japanese during World War II. David Kahn&#146;s books [794,795,796] have historical examples of these kinds of attacks.
</P>
<P>And don&#146;t forget Kerckhoffs&#146;s assumption: If the strength of your new cryptosystem relies on the fact that the attacker does not know the algorithm&#146;s inner workings, you&#146;re sunk. If you believe that keeping the algorithm&#146;s insides secret improves the security of your cryptosystem more than letting the academic community analyze it, you&#146;re wrong. And if you think that someone won&#146;t disassemble your code and reverse-engineer your algorithm, you&#146;re na&#239;ve. (In 1994 this happened with the RC4 algorithm&#151;see Section 17.1.) The best algorithms we have are the ones that have been made public, have been attacked by the world&#146;s best cryptographers for years, and are still unbreakable. (The National Security Agency keeps their algorithms secret from outsiders, but they have the best cryptographers in the world working within their walls&#151;you don&#146;t. Additionally, they discuss their algorithms with one another, relying on peer review to uncover any weaknesses in their work.)</P>
<P>Cryptanalysts don&#146;t always have access to the algorithms, as when the United States broke the Japanese diplomatic code PURPLE during World War II [794]&#151;but they often do. If the algorithm is being used in a commercial security program, it is simply a matter of time and money to disassemble the program and recover the algorithm. If the algorithm is being used in a military communications system, it is simply a matter of time and money to buy (or steal) the equipment and reverse-engineer the algorithm.</P>
<P>Those who claim to have an unbreakable cipher simply because they can&#146;t break it are either geniuses or fools. Unfortunately, there are more of the latter in the world. Beware of people who extol the virtues of their algorithms, but refuse to make them public; trusting their algorithms is like trusting snake oil.</P>
<P>Good cryptographers rely on peer review to separate the good algorithms from the bad.</P>
<P><FONT SIZE="+1"><B><I>Security of Algorithms</I></B></FONT></P>
<P>Different algorithms offer different degrees of security; it depends on how hard they are to break. If the cost required to break an algorithm is greater than the value of the encrypted data, then you&#146;re probably safe. If the time required to break an algorithm is longer than the time the encrypted data must remain secret, then you&#146;re probably safe. If the amount of data encrypted with a single key is less than the amount of data necessary to break the algorithm, then you&#146;re probably safe.
</P>
<P>I say &#147;probably&#148; because there is always a chance of new breakthroughs in cryptanalysis. On the other hand, the value of most data decreases over time. It is important that the value of the data always remain less than the cost to break the security protecting it.</P>
<P>Lars Knudsen classified these different categories of breaking an algorithm. In decreasing order of severity [858]:</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;<B>Total break</B>. A cryptanalyst finds the key, <I>K</I>, such that <I>D</I><SUB>K</SUB>(<I>C</I>) = <I>P</I>.
<DD><B>2.</B>&nbsp;&nbsp;<B>Global deduction</B>. A cryptanalyst finds an alternate algorithm, <I>A</I>, equivalent to <I>D</I><SUB>K</SUB>(<I>C</I>), without knowing <I>K</I>.
<DD><B>3.</B>&nbsp;&nbsp;<B>Instance (or local) deduction</B>. A cryptanalyst finds the plaintext of an intercepted ciphertext.
<DD><B>4.</B>&nbsp;&nbsp;<B>Information deduction</B>. A cryptanalyst gains some information about the key or plaintext. This information could be a few bits of the key, some information about the form of the plaintext, and so forth.
</DL>
<P>An algorithm is <B>unconditionally secure</B> if, no matter how much ciphertext a cryptanalyst has, there is not enough information to recover the plaintext. In point of fact, only a one-time pad (see Section 1.5) is unbreakable given infinite resources. All other cryptosystems are breakable in a ciphertext-only attack, simply by trying every possible key one by one and checking whether the resulting plaintext is meaningful. This is called a <B>brute-force</B> attack (see Section 7.1).</P>
<P>Cryptography is more concerned with cryptosystems that are computationally infeasible to break. An algorithm is considered <B>computationally secure</B> (sometimes called strong) if it cannot be broken with available resources, either current or future. Exactly what constitutes &#147;available resources&#148; is open to interpretation.</P>
<P>You can measure the complexity (see Section 11.1) of an attack in different ways:</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;<B>Data complexity</B>. The amount of data needed as input to the attack.
<DD><B>2.</B>&nbsp;&nbsp;<B>Processing complexity</B>. The time needed to perform the attack. This is often called the <B>work factor</B>.
<DD><B>3.</B>&nbsp;&nbsp;<B>Storage requirements</B>. The amount of memory needed to do the attack.
</DL>
<P>As a rule of thumb, the complexity of an attack is taken to be the minimum of these three factors. Some attacks involve trading off the three complexities: A faster attack might be possible at the expense of a greater storage requirement.
</P>
<P>Complexities are expressed as orders of magnitude. If an algorithm has a processing complexity of 2<SUP>128</SUP>, then 2<SUP>128</SUP> operations are required to break the algorithm. (These operations may be complex and time-consuming.) Still, if you assume that you have enough computing speed to perform a million operations every second and you set a million parallel processors against the task, it will still take over 10<SUP>19</SUP> years to recover the key. That&#146;s a billion times the age of the universe.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="01-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="01-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲美女一区二区三区| 国产精品白丝jk白祙喷水网站| 欧美久久久影院| 粉嫩高潮美女一区二区三区| 日韩av网站在线观看| 亚洲免费在线观看视频| 精品三级av在线| 欧美午夜电影网| 91在线免费看| 成人黄色777网| 国产在线一区观看| 久久精品99国产精品日本| 夜夜嗨av一区二区三区网页| 自拍视频在线观看一区二区| 久久久亚洲精华液精华液精华液| 欧美三级日本三级少妇99| 色婷婷精品久久二区二区蜜臂av| 精品一区二区三区的国产在线播放| 午夜欧美视频在线观看| 亚洲国产精品人人做人人爽| 一区二区三区在线免费播放| 自拍偷拍亚洲激情| 亚洲欧美日韩国产手机在线| 亚洲青青青在线视频| 国产精品久久久久久久久快鸭| 久久精品人人做人人综合| 国产丝袜欧美中文另类| 久久精品一区二区三区不卡 | 欧美色图在线观看| 欧美无砖砖区免费| 欧美一级久久久| 精品久久久影院| 久久精品一区二区| 国产精品欧美一区二区三区| 日韩美女啊v在线免费观看| 中文字幕一区二区三中文字幕| 欧美激情一区在线观看| 亚洲欧洲另类国产综合| 一区二区三区鲁丝不卡| 日本va欧美va精品发布| 国产69精品久久99不卡| 欧美专区日韩专区| 欧美一区二区三区在线观看| 337p日本欧洲亚洲大胆精品| 国产精品天干天干在线综合| 综合久久久久久| 美女视频一区二区三区| 成人黄色软件下载| 69堂成人精品免费视频| 国产亚洲综合性久久久影院| 亚洲裸体xxx| 激情综合色播五月| 在线观看免费一区| 久久免费的精品国产v∧| 亚洲韩国精品一区| 成人av在线网| 日韩一区二区免费在线观看| 国产精品色在线观看| 久草这里只有精品视频| 欧美综合天天夜夜久久| 亚洲精品一二三四区| 亚洲美女在线国产| 从欧美一区二区三区| 欧美一区二区三区播放老司机| 国产精品电影一区二区三区| 久久成人免费网站| 在线电影国产精品| 亚洲午夜三级在线| 欧美在线视频全部完| 国产精品美女视频| 懂色av一区二区在线播放| 精品久久免费看| 99热99精品| 久久狠狠亚洲综合| 最新日韩在线视频| 日韩欧美一区二区免费| 丁香天五香天堂综合| 亚洲制服丝袜在线| 久久久久久久久久美女| 日本丶国产丶欧美色综合| 美国毛片一区二区| 亚洲视频一二三| 欧美一区在线视频| www.欧美色图| 日韩影院精彩在线| 国产亚洲综合在线| 欧美羞羞免费网站| 国产aⅴ精品一区二区三区色成熟| 亚洲另类一区二区| 久久久久久电影| 67194成人在线观看| 亚洲地区一二三色| 精品国产乱码久久久久久浪潮| 成人午夜又粗又硬又大| 一区二区三区在线视频免费观看| 欧美日韩一区中文字幕| 久久机这里只有精品| 国产精品不卡视频| 91麻豆精品国产91久久久久久| 免费精品视频最新在线| 国产精品另类一区| 欧美精品久久一区二区三区| 精品系列免费在线观看| 亚洲三级视频在线观看| 欧美一级淫片007| 91女厕偷拍女厕偷拍高清| 日韩精品成人一区二区三区 | 色嗨嗨av一区二区三区| 亚洲欧美怡红院| 欧美videos中文字幕| 91成人免费在线视频| 成人午夜又粗又硬又大| 免费观看久久久4p| 亚洲国产毛片aaaaa无费看| 久久久久高清精品| 2017欧美狠狠色| 欧美精品视频www在线观看| av电影一区二区| 成人免费毛片app| 国产91富婆露脸刺激对白| 免费一区二区视频| 石原莉奈在线亚洲二区| 一区二区三区在线观看动漫| 亚洲男人天堂av网| 国产精品女人毛片| 欧美激情一区二区三区蜜桃视频| 精品美女被调教视频大全网站| 欧美日韩在线观看一区二区| 91在线高清观看| 99国产欧美另类久久久精品| 高清国产一区二区三区| 豆国产96在线|亚洲| 国产精品主播直播| 成人高清在线视频| 91在线视频官网| 欧美日韩国产成人在线91| 日韩小视频在线观看专区| 日韩精品影音先锋| 久久久国产精品不卡| 中文字幕中文在线不卡住| 一区二区三区四区不卡在线| 午夜精彩视频在线观看不卡| 婷婷久久综合九色综合伊人色| 麻豆中文一区二区| 国产大片一区二区| 欧美日韩一区不卡| 精品久久久久久久久久久院品网 | 狠狠狠色丁香婷婷综合久久五月| 九九九久久久精品| 成人国产视频在线观看| 欧美成人性战久久| 日韩精品资源二区在线| 亚洲三级久久久| aaa亚洲精品一二三区| 国产亚洲精品aa午夜观看| 日本午夜一本久久久综合| 色噜噜久久综合| 日本一区二区成人在线| 六月丁香综合在线视频| 欧美日韩一二区| 亚洲色图第一区| 成人动漫在线一区| 精品动漫一区二区三区在线观看| 亚洲电影在线免费观看| 一本大道av伊人久久综合| 国产偷国产偷精品高清尤物| 乱一区二区av| 欧美精品一区二区三区在线播放| 日韩二区在线观看| 欧美一二区视频| 美国三级日本三级久久99| 欧美一区二区观看视频| 日本不卡1234视频| 日韩你懂的在线播放| 精品在线播放午夜| 日韩午夜激情视频| 国产综合久久久久久鬼色| 日韩美女视频在线| 国产成人在线电影| 国产精品久久久久精k8| 91黄视频在线观看| 亚洲成精国产精品女| 欧美一级久久久| 国产一区二区三区四区五区美女 | 国产精品资源网| 国产精品超碰97尤物18| 欧洲精品一区二区| 麻豆国产91在线播放| 国产精品天天看| 欧美日韩dvd在线观看| 毛片av一区二区三区| 国产精品天美传媒沈樵| 欧美久久高跟鞋激| 国产一区二区不卡| 亚洲一区二区成人在线观看| 日韩三级高清在线| 国产在线精品一区二区夜色 | 国产中文字幕精品| 亚洲一卡二卡三卡四卡五卡| 久久久影院官网|