亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 01-01.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Foundations</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=01//-->
<!--PAGES=001-004//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../about_author.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="01-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Chapter 1<BR>Foundations
</FONT></H2>
<H3><A NAME="Heading2"></A><FONT COLOR="#000077">1.1 Terminology</FONT></H3>
<P><FONT SIZE="+1"><B><I>Sender and Receiver</I></B></FONT></P>
<P>Suppose a sender wants to send a message to a receiver. Moreover, this sender wants to send the message securely: She wants to make sure an eavesdropper cannot read the message.
</P>
<P><FONT SIZE="+1"><B><I>Messages and Encryption</I></B></FONT></P>
<P>A message is <B>plaintext</B> (sometimes called cleartext). The process of disguising a message in such a way as to hide its substance is <B>encryption</B>. An encrypted message is <B>ciphertext</B>. The process of turning ciphertext back into plaintext is <B>decryption</B>. This is all shown in Figure 1.1.</P>
<P>(If you want to follow the ISO 7498-2 standard, use the terms &#147;encipher&#148; and &#147;decipher.&#148; It seems that some cultures find the terms &#147;encrypt&#148; and &#147;decrypt&#148; offensive, as they refer to dead bodies.)</P>
<P>The art and science of keeping messages secure is <B>cryptography</B>, and it is practiced by <B>cryptographers</B>. <B>Cryptanalysts</B> are practitioners of <B>cryptanalysis</B>, the art and science of breaking ciphertext; that is, seeing through the disguise. The branch of mathematics encompassing both cryptography and cryptanalysis is <B>cryptology</B> and its practitioners are <B>cryptologists</B>. Modern cryptologists are generally trained in theoretical mathematics&#151;they have to be.</P>
<I><P><A NAME="Fig1"></A><A HREF="javascript:displayWindow('images/01-01.jpg',281,41 )"><IMG SRC="images/01-01t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/01-01.jpg',281,41)"><FONT COLOR="#000077"><B>Figure 1.1</B></FONT></A>&nbsp;&nbsp;Encryption and Decryption.</I>
</P>
<P>Plaintext is denoted by <I>M</I>, for message, or <I>P</I>, for plaintext. It can be a stream of bits, a text file, a bitmap, a stream of digitized voice, a digital video image...whatever. As far as a computer is concerned, <I>M</I> is simply binary data. (After this chapter, this book concerns itself with binary data and computer cryptography.) The plaintext can be intended for either transmission or storage. In any case, <I>M</I> is the message to be encrypted.</P>
<P>Ciphertext is denoted by <I>C</I>. It is also binary data: sometimes the same size as <I>M</I>, sometimes larger. (By combining encryption with compression, <I>C</I> may be smaller than <I>M</I>. However, encryption does not accomplish this.) The encryption function <I>E</I>, operates on <I>M</I> to produce <I>C</I>. Or, in mathematical notation:</P>
<DL>
<DD><I>E</I>(<I>M</I>) = <I>C</I>
</DL>
<P>In the reverse process, the decryption function <I>D</I> operates on <I>C</I> to produce <I>M</I>:</P>
<DL>
<DD><I>D</I>(<I>C</I>) = <I>M</I>
</DL>
<P>Since the whole point of encrypting and then decrypting a message is to recover the original plaintext, the following identity must hold true:
</P>
<DL>
<DD><I>D</I>(<I>E</I>(<I>M</I>)) = <I>M</I>
</DL>
<P><FONT SIZE="+1"><B><I>Authentication, Integrity, and Nonrepudiation</I></B></FONT></P>
<P>In addition to providing confidentiality, cryptography is often asked to do other jobs:
</P>
<DL>
<DD>&#151; <B>Authentication</B>. It should be possible for the receiver of a message to ascertain its origin; an intruder should not be able to masquerade as someone else.
<DD>&#151; <B>Integrity</B>. It should be possible for the receiver of a message to verify that it has not been modified in transit; an intruder should not be able to substitute a false message for a legitimate one.
<DD>&#151; <B>Nonrepudiation</B>. A sender should not be able to falsely deny later that he sent a message.
</DL>
<P>These are vital requirements for social interaction on computers, and are analogous to face-to-face interactions. That someone is who he says he is...that someone&#146;s credentials&#151;whether a driver&#146;s license, a medical degree, or a passport&#151;are valid...that a document purporting to come from a person actually came from that person.... These are the things that authentication, integrity, and nonrepudiation provide.
</P>
<P><FONT SIZE="+1"><B><I>Algorithms and Keys</I></B></FONT></P>
<P>A <B>cryptographic algorithm</B>, also called a <B>cipher</B>, is the mathematical function used for encryption and decryption. (Generally, there are two related functions: one for encryption and the other for decryption.)</P>
<P>If the security of an algorithm is based on keeping the way that algorithm works a secret, it is a <B>restricted</B> algorithm. Restricted algorithms have historical interest, but are woefully inadequate by today&#146;s standards. A large or changing group of users cannot use them, because every time a user leaves the group everyone else must switch to a different algorithm. If someone accidentally reveals the secret, everyone must change their algorithm.</P>
<P>Even more damning, restricted algorithms allow no quality control or standardization. Every group of users must have their own unique algorithm. Such a group can&#146;t use off-the-shelf hardware or software products; an eavesdropper can buy the same product and learn the algorithm. They have to write their own algorithms and implementations. If no one in the group is a good cryptographer, then they won&#146;t know if they have a secure algorithm.</P>
<P>Despite these major drawbacks, restricted algorithms are enormously popular for low-security applications. Users either don&#146;t realize or don&#146;t care about the security problems inherent in their system.</P>
<P>Modern cryptography solves this problem with a <B>key</B>, denoted by <I>K</I>. This key might be any one of a large number of values. The range of possible values of the key is called the <B>keyspace</B>. Both the encryption and decryption operations use this key (i.e., they are dependent on the key and this fact is denoted by the k subscript), so the functions now become:</P>
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>M</I>) = <I>C</I>
<DD><I>D</I><SUB>K</SUB>(<I>C</I>) = <I>M</I>
</DL>
<P>Those functions have the property that (see Figure 1.2):
</P>
<DL>
<DD><I>D</I><SUB>K</SUB>(<I>E</I><SUB>K</SUB>(<I>M</I>)) = <I>M</I>
</DL>
<P>Some algorithms use a different encryption key and decryption key (see Figure 1.3). That is, the encryption key, <I>K</I><SUB>1</SUB>, is different from the corresponding decryption key, <I>K</I><SUB>2</SUB>. In this case:</P>
<DL>
<DD><I>E</I><SUB><SMALL>K</SMALL><SUB>1</SUB></SUB>(<I>M</I>) = <I>C</I>
<DD><I>D</I><SUB><SMALL>K</SMALL><SUB>2</SUB></SUB>(<I>C</I>) = <I>M</I>
<DD><I>D</I><SUB><SMALL>K</SMALL><SUB>2</SUB></SUB>(<I>E</I><SUB>K<SUB>1</SUB></SUB> (<I>M</I>)) = <I>M</I>
</DL>
<P>All of the security in these algorithms is based in the key (or keys); none is based in the details of the algorithm. This means that the algorithm can be published and analyzed. Products using the algorithm can be mass-produced. It doesn&#146;t matter if an eavesdropper knows your algorithm; if she doesn&#146;t know your particular key, she can&#146;t read your messages.
</P>
<I><P><A NAME="Fig2"></A><A HREF="javascript:displayWindow('images/01-02.jpg',268,52 )"><IMG SRC="images/01-02t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/01-02.jpg',268,52)"><FONT COLOR="#000077"><B>Figure 1.2</B></FONT></A>&nbsp;&nbsp;Encryption and decryption with a key.</I>
<I></P>
<P><A NAME="Fig3"></A><A HREF="javascript:displayWindow('images/01-03.jpg',263,58 )"><IMG SRC="images/01-03t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/01-03.jpg',263,58)"><FONT COLOR="#000077"><B>Figure 1.3</B></FONT></A>&nbsp;&nbsp;Encryption and decryption with two different keys.</I>
</P>
<P>A <B>cryptosystem</B> is an algorithm, plus all possible plaintexts, ciphertexts, and keys.</P>
<P><FONT SIZE="+1"><B><I>Symmetric Algorithms</I></B></FONT></P>
<P>There are two general types of key-based algorithms: symmetric and public-key. <B>Symmetric algorithms</B>, sometimes called conventional algorithms, are algorithms where the encryption key can be calculated from the decryption key and vice versa. In most symmetric algorithms, the encryption key and the decryption key are the same. These algorithms, also called secret-key algorithms, single-key algorithms, or one-key algorithms, require that the sender and receiver agree on a key before they can communicate securely. The security of a symmetric algorithm rests in the key; divulging the key means that anyone could encrypt and decrypt messages. As long as the communication needs to remain secret, the key must remain secret.</P>
<P>Encryption and decryption with a symmetric algorithm are denoted by:</P>
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>M</I>) = <I>C</I>
<DD><I>D</I><SUB>K</SUB>(<I>C</I>) = <I>M</I>
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../about_author.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="01-02.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲精品免费电影| 寂寞少妇一区二区三区| 国产亚洲成年网址在线观看| 91精品国产免费| 欧美日本一道本| 欧美综合天天夜夜久久| 91丨九色丨蝌蚪丨老版| 91丨九色丨蝌蚪富婆spa| 91麻豆精品视频| 91福利在线观看| 欧美日韩国产片| 91精品国产色综合久久不卡电影 | 成人免费视频caoporn| 国产一区二区三区综合| 国产久卡久卡久卡久卡视频精品| 国产在线视频一区二区三区| 国产在线播放一区三区四| 精品一二三四在线| 丰满放荡岳乱妇91ww| 成人av网站免费| 一道本成人在线| 欧美年轻男男videosbes| 6080亚洲精品一区二区| 精品福利一区二区三区| 国产婷婷色一区二区三区四区| 国产精品久久久久永久免费观看 | 成人av在线网站| 91猫先生在线| 6080yy午夜一二三区久久| 精品免费99久久| 国产精品麻豆99久久久久久| 亚洲一区二区三区爽爽爽爽爽 | 国产在线视频一区二区三区| 成人免费高清视频在线观看| 一本大道久久a久久精品综合| 一本大道综合伊人精品热热| 欧美精选在线播放| 久久久久国产免费免费| 亚洲色图视频网站| 日韩国产在线观看一区| 国产一区二区三区久久久 | 国产精品国产三级国产普通话99| 亚洲伦理在线免费看| 日本伊人午夜精品| 国产91丝袜在线18| 777亚洲妇女| 欧美国产一区二区| 亚洲不卡在线观看| 高清日韩电视剧大全免费| 亚洲国产cao| 三级成人在线视频| 国产不卡视频在线观看| 欧美在线一二三| 久久久久国产免费免费 | 99精品桃花视频在线观看| 欧美日韩国产欧美日美国产精品| 久久免费美女视频| 图片区日韩欧美亚洲| aaa亚洲精品一二三区| 日韩一级二级三级| 亚洲男人天堂一区| 国产传媒日韩欧美成人| 51精品视频一区二区三区| 中文字幕五月欧美| 精品一区二区三区在线播放| 在线观看日韩电影| 国产精品三级av| 精品一区二区三区蜜桃| 欧美三级日韩三级国产三级| 国产欧美日韩在线看| 免费av成人在线| 在线看日韩精品电影| 欧美国产1区2区| 激情综合网av| 欧美一区二区三区小说| 亚洲国产综合人成综合网站| 成人免费观看视频| 久久久久久久久久久久电影 | 亚洲va国产va欧美va观看| 成人av免费在线播放| 精品国产乱码久久久久久蜜臀| 亚洲一区二区黄色| 99久久精品国产网站| 国产亚洲欧美日韩日本| 久久se精品一区精品二区| 欧美裸体一区二区三区| 亚洲主播在线播放| 91蜜桃视频在线| 国产精品久久久久影院亚瑟 | 精品少妇一区二区三区在线视频| 亚洲第一福利视频在线| 一本色道综合亚洲| 亚洲欧美经典视频| 99久久精品国产一区| 国产精品高潮久久久久无| 成人网在线播放| 国产午夜精品一区二区三区视频| 激情综合网激情| 久久综合久久综合亚洲| 久久99热99| 一区二区免费视频| 污片在线观看一区二区 | 亚洲欧美一区二区三区孕妇| 成人综合婷婷国产精品久久蜜臀 | 日韩电影免费在线| 欧美一级日韩不卡播放免费| 日韩专区中文字幕一区二区| 欧美精品第1页| 人人超碰91尤物精品国产| 国产精品系列在线观看| 日韩视频免费观看高清完整版在线观看 | 91久久免费观看| 一区二区免费在线| 在线不卡中文字幕| 奇米在线7777在线精品 | 琪琪久久久久日韩精品| 精品捆绑美女sm三区| 国产在线播放一区| 日本一区二区三区久久久久久久久不| 国产精品自产自拍| 亚洲视频网在线直播| 91福利视频网站| 偷拍日韩校园综合在线| 欧美一区二区三区日韩| 国产高清久久久久| |精品福利一区二区三区| 欧美亚洲综合一区| 日韩av电影一区| 国产亚洲综合在线| eeuss国产一区二区三区| 亚洲网友自拍偷拍| 精品国产a毛片| 91在线国内视频| 天堂一区二区在线| 欧美精品一区二| 91麻豆国产福利精品| 亚洲最大色网站| 欧美成人一区二区| 成人av手机在线观看| 亚洲成人av福利| 久久综合一区二区| 色综合中文综合网| 正在播放一区二区| 国产成人综合精品三级| 亚洲最色的网站| 久久亚洲一级片| 色婷婷综合久色| 美国十次综合导航| √…a在线天堂一区| 91精品国产91热久久久做人人| 国产精品18久久久久久久网站| √…a在线天堂一区| 日韩一区二区不卡| av中文字幕不卡| 青青草原综合久久大伊人精品| 国产女主播视频一区二区| 欧美午夜精品久久久久久孕妇| 青青草原综合久久大伊人精品| 中文字幕久久午夜不卡| 制服丝袜国产精品| 色综合色综合色综合| 久久99精品久久久久久| 亚洲美女免费视频| 久久这里只有精品6| 欧美性三三影院| 成人永久免费视频| 蜜桃视频在线观看一区二区| 亚洲精品视频在线| 欧美男男青年gay1069videost| 亚洲国产中文字幕| 国产精品欧美综合在线| 日韩免费一区二区| 91久久香蕉国产日韩欧美9色| 国产电影一区在线| 日韩不卡一二三区| 一区二区三区在线观看国产| 国产性做久久久久久| 日韩一区二区免费在线观看| 色综合一区二区三区| 成人午夜电影网站| 九一久久久久久| 日韩电影在线看| 亚洲一区二区成人在线观看| 国产精品传媒视频| 欧美激情在线一区二区| 日韩欧美电影在线| 欧美高清视频一二三区 | 日韩av电影免费观看高清完整版 | 亚洲成人一区二区在线观看| 国产精品色噜噜| 国产日韩av一区二区| 久久亚洲精品小早川怜子| 91精品国产综合久久精品图片| 在线观看日韩精品| 色狠狠综合天天综合综合| 国产成人精品免费看| 国产精品综合在线视频| 九九视频精品免费| 久久国产乱子精品免费女| 日本亚洲视频在线|