亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 01-02.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Foundations</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=01//-->
<!--PAGES=004-006//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="01-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="01-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Symmetric algorithms can be divided into two categories. Some operate on the plaintext a single bit (or sometimes byte) at a time; these are called <B>stream algorithms</B> or <B>stream ciphers</B>. Others operate on the plaintext in groups of bits. The groups of bits are called <B>blocks</B>, and the algorithms are called <B>block algorithms</B> or <B>block ciphers</B>. For modern computer algorithms, a typical block size is 64 bits&#151;large enough to preclude analysis and small enough to be workable. (Before computers, algorithms generally operated on plaintext one character at a time. You can think of this as a stream algorithm operating on a stream of characters.)</P>
<P><FONT SIZE="+1"><B><I>Public-Key Algorithms</I></B></FONT></P>
<P><B>Public-key algorithms</B> (also called asymmetric algorithms) are designed so that the key used for encryption is different from the key used for decryption. Furthermore, the decryption key cannot (at least in any reasonable amount of time) be calculated from the encryption key. The algorithms are called &#147;public-key&#148; because the encryption key can be made public: A complete stranger can use the encryption key to encrypt a message, but only a specific person with the corresponding decryption key can decrypt the message. In these systems, the encryption key is often called the <B>public key</B>, and the decryption key is often called the <B>private key</B>. The private key is sometimes also called the secret key, but to avoid confusion with symmetric algorithms, that tag won&#146;t be used here.</P>
<P>Encryption using public key <I>K</I> is denoted by:</P>
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>M</I>) = <I>C</I>
</DL>
<P>Even though the public key and private key are different, decryption with the corresponding private key is denoted by:
</P>
<DL>
<DD><I>D</I><SUB>K</SUB>(<I>C</I>) = <I>M</I>
</DL>
<P>Sometimes, messages will be encrypted with the private key and decrypted with the public key; this is used in digital signatures (see Section 2.6). Despite the possible confusion, these operations are denoted by, respectively:
</P>
<DL>
<DD><I>E</I><SUB>K</SUB>(<I>M</I>) = <I>C</I>
<DD><I>D</I><SUB>K</SUB>(<I>C</I>) = <I>M</I>
</DL>
<P><FONT SIZE="+1"><B><I>Cryptanalysis</I></B></FONT></P>
<P>The whole point of cryptography is to keep the plaintext (or the key, or both) secret from eavesdroppers (also called adversaries, attackers, interceptors, interlopers, intruders, opponents, or simply the enemy). Eavesdroppers are assumed to have complete access to the communications between the sender and receiver.
</P>
<P>Cryptanalysis is the science of recovering the plaintext of a message without access to the key. Successful cryptanalysis may recover the plaintext or the key. It also may find weaknesses in a cryptosystem that eventually lead to the previous results. (The loss of a key through noncryptanalytic means is called a <B>compromise</B>.)</P>
<P>An attempted cryptanalysis is called an <B>attack</B>. A fundamental assumption in cryptanalysis, first enunciated by the Dutchman A. Kerckhoffs in the nineteenth century, is that the secrecy must reside entirely in the key [794]. Kerckhoffs assumes that the cryptanalyst has complete details of the cryptographic algorithm and implementation. (Of course, one would assume that the CIA does not make a habit of telling Mossad about its cryptographic algorithms, but Mossad probably finds out anyway.) While real-world cryptanalysts don&#146;t always have such detailed information, it&#146;s a good assumption to make. If others can&#146;t break an algorithm, even with knowledge of how it works, then they certainly won&#146;t be able to break it without that knowledge.</P>
<P>There are four general types of cryptanalytic attacks. Of course, each of them assumes that the cryptanalyst has complete knowledge of the encryption algorithm used:</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;<B>Ciphertext-only attack</B>. The cryptanalyst has the ciphertext of several messages, all of which have been encrypted using the same encryption algorithm. The cryptanalyst&#146;s job is to recover the plaintext of as many messages as possible, or better yet to deduce the key (or keys) used to encrypt the messages, in order to decrypt other messages encrypted with the same keys.
<DL>
<DD>Given: <I>C</I><SUB>1</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>1</SUB>), <I>C</I><SUB>2</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>2</SUB>),...<I>C<SUB>i</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>i</SUB>)
<DD>Deduce: Either <I>P</I><SUB>1</SUB>, <I>P</I><SUB>2</SUB>,...<I>P</I><SUB>i</SUB>; <I>k</I>; or an algorithm to infer <I>P</I><SUB>i&#43;1</SUB> from <I>C</I><SUB>i&#43;1</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>i&#43;1</SUB>)
</DL>
<DD><B>2.</B>&nbsp;&nbsp;<B>Known-plaintext attack</B>. The cryptanalyst has access not only to the ciphertext of several messages, but also to the plaintext of those messages. His job is to deduce the key (or keys) used to encrypt the messages or an algorithm to decrypt any new messages encrypted with the same key (or keys).
<DL>
<DD>Given: <I>P</I><SUB>1</SUB>, <I>C</I><SUB>1</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>1</SUB>), <I>P</I><SUB>2</SUB>, <I>C</I><SUB>2</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>2</SUB>),...<I>P</I><SUB>i</SUB>, <I>C</I><SUB>i</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>i</SUB>)
<DD>Deduce: Either <I>k</I>, or an algorithm to infer <I>P</I><SUB>i&#43;1</SUB> from <I>C</I><SUB>i&#43;1</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>i&#43;1</SUB>)
</DL>
<DD><B>3.</B>&nbsp;&nbsp;<B>Chosen-plaintext attack</B>. The cryptanalyst not only has access to the ciphertext and associated plaintext for several messages, but he also chooses the plaintext that gets encrypted. This is more powerful than a known-plaintext attack, because the cryptanalyst can choose specific plaintext blocks to encrypt, ones that might yield more information about the key. His job is to deduce the key (or keys) used to encrypt the messages or an algorithm to decrypt any new messages encrypted with the same key (or keys).
<DL>
<DD>Given: <I>P</I><SUB>1</SUB>, <I>C</I><SUB>1</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>1</SUB>), <I>P</I><SUB>2</SUB>, <I>C</I><SUB>2</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>2</SUB>),...<I>P</I><SUB>i</SUB>, <I>C</I><SUB>i</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>i</SUB>), where the cryptanalyst gets to choose <I>P</I><SUB>1</SUB>, <I>P</I><SUB>2</SUB>,...<I>P</I><SUB>i</SUB>
<DD>Deduce: Either <I>k</I>, or an algorithm to infer <I>P</I><SUB>i&#43;1</SUB> from <I>C</I><SUB>i</I>&#43;1</SUB> = <I>E</I><SUB>k</SUB>(<I>P</I><SUB>i&#43;1</SUB>)
</DL>
<DD><B>4.</B>&nbsp;&nbsp;<B>Adaptive-chosen-plaintext attack</B>. This is a special case of a chosen-plaintext attack. Not only can the cryptanalyst choose the plaintext that is encrypted, but he can also modify his choice based on the results of previous encryption. In a chosen-plaintext attack, a cryptanalyst might just be able to choose one large block of plaintext to be encrypted; in an adaptive-chosen-plaintext attack he can choose a smaller block of plaintext and then choose another based on the results of the first, and so forth.
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="01-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="01-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲人成精品久久久久| 亚洲视频一二区| 国产精品日韩成人| 亚洲综合在线免费观看| 精品影视av免费| 99久久99精品久久久久久 | 久久国产精品色| 欧美日韩精品福利| 日韩一区二区三区精品视频| 久久久精品免费网站| 亚洲va欧美va天堂v国产综合| av高清不卡在线| 国产女人18毛片水真多成人如厕 | 男女男精品视频网| 欧美日韩成人综合在线一区二区| 亚洲免费观看视频| 欧美精品久久99| 亚洲国产精品天堂| 欧美精品18+| 蜜桃av噜噜一区二区三区小说| 欧美日韩中文精品| 日韩电影在线观看一区| 制服丝袜中文字幕一区| 免费观看久久久4p| 久久久精品日韩欧美| 成人精品国产福利| 亚洲欧美日本韩国| 欧美精品一二三| 久久国产精品露脸对白| 国产欧美日韩视频在线观看| 菠萝蜜视频在线观看一区| 亚洲激情在线播放| 欧美成人午夜电影| 国产成人aaa| 亚洲电影激情视频网站| 欧美肥大bbwbbw高潮| 国内成+人亚洲+欧美+综合在线| 久久嫩草精品久久久精品一| 色综合久久久久| 久草这里只有精品视频| 国产精品大尺度| 欧美一级淫片007| 9l国产精品久久久久麻豆| 亚洲狠狠爱一区二区三区| 日韩一区二区三区视频在线观看| 国产传媒欧美日韩成人| 午夜精品福利一区二区蜜股av| 久久久精品日韩欧美| 久久精品国产在热久久| 精品少妇一区二区| 欧美亚洲高清一区| 成熟亚洲日本毛茸茸凸凹| 视频一区在线视频| 国产精品麻豆视频| 日韩欧美国产综合| 欧美性受极品xxxx喷水| 国产不卡一区视频| 天堂资源在线中文精品| 亚洲欧洲美洲综合色网| 久久综合九色综合97_久久久| 欧美日韩日日摸| 色综合久久精品| 91视频你懂的| 91免费观看在线| heyzo一本久久综合| 国产不卡高清在线观看视频| 黄色成人免费在线| 麻豆精品国产传媒mv男同| 亚洲成人你懂的| 亚洲成av人片在线观看| 亚洲一区二区三区小说| 一区二区三区在线播| 亚洲日本成人在线观看| 亚洲欧美日韩国产另类专区| 综合久久国产九一剧情麻豆| 中文字幕日韩一区二区| 国产精品乱码人人做人人爱| 国产欧美精品一区二区色综合 | 91国内精品野花午夜精品| 99久久免费视频.com| 一本到三区不卡视频| 欧美在线你懂的| 69久久夜色精品国产69蝌蚪网 | 亚洲综合色噜噜狠狠| 天堂久久一区二区三区| 久久超级碰视频| 高清国产一区二区三区| 色哟哟欧美精品| 在线播放一区二区三区| 久久人人97超碰com| 亚洲欧美怡红院| 日韩精品视频网站| 国产一区不卡在线| 色综合 综合色| 成人午夜视频福利| 91蜜桃视频在线| 欧美一区二区在线视频| 久久久不卡影院| 亚洲制服丝袜在线| 国产一区二区调教| 91久久线看在观草草青青| 欧美电影免费观看高清完整版在| 国产精品丝袜久久久久久app| 午夜私人影院久久久久| 国产精品亚洲人在线观看| 欧美日本在线播放| 国产精品久久久久一区| 日韩精品一级二级 | 日本午夜一区二区| 北岛玲一区二区三区四区| 日韩一区二区免费在线电影| 国产精品久久久久精k8| 国产一区二区不卡| 91精品国产一区二区三区蜜臀 | 日韩免费在线观看| 亚洲一区在线观看免费观看电影高清 | 99在线精品免费| 久久精品一二三| 美女在线一区二区| 欧美老肥妇做.爰bbww| 亚洲精品免费视频| 97精品国产97久久久久久久久久久久| 欧美成人乱码一区二区三区| 丝袜美腿亚洲综合| 欧美日韩中文字幕精品| 一区二区三区中文免费| 91美女片黄在线观看91美女| 国产精品久久久久aaaa| av激情亚洲男人天堂| 亚洲欧美自拍偷拍| 色综合久久88色综合天天| 亚洲欧美怡红院| 欧美性做爰猛烈叫床潮| 亚洲高清免费一级二级三级| 欧美日韩中文字幕一区| 蜜臂av日日欢夜夜爽一区| 色综合中文字幕国产 | 91免费国产视频网站| 综合婷婷亚洲小说| 97精品国产97久久久久久久久久久久| 国产亚洲1区2区3区| 波多野结衣一区二区三区| 亚洲欧美日韩国产综合| 欧美视频一区二区三区四区| 丝瓜av网站精品一区二区 | 欧美日韩免费一区二区三区| 午夜精品福利一区二区三区蜜桃| 欧美一区二区视频在线观看2020| 六月丁香婷婷久久| 久久久国产精品不卡| 国产成人午夜片在线观看高清观看| 亚洲国产精品v| 欧美色图天堂网| 老汉av免费一区二区三区| 国产精品卡一卡二| 欧美日韩www| 成人h版在线观看| 亚洲第一在线综合网站| 久久影院午夜片一区| 欧洲av在线精品| 国产成人啪免费观看软件| 亚洲不卡一区二区三区| 久久精品一区二区三区av| 欧美视频一区二区在线观看| 国产一区 二区| 日日欢夜夜爽一区| 一区在线观看免费| 精品免费视频.| 欧美日韩三级视频| 91天堂素人约啪| 国产精品一区二区果冻传媒| 亚洲一二三区不卡| 欧美国产一区视频在线观看| 日韩精品最新网址| 欧美精品在线一区二区三区| 91麻豆swag| 国产精品资源在线| 久久国产尿小便嘘嘘尿| 亚洲一卡二卡三卡四卡| 亚洲精品视频免费观看| 国产精品美日韩| 国产精品久久福利| 国产欧美一区二区精品性色| 精品毛片乱码1区2区3区| 91精品国产91久久久久久一区二区| 97久久精品人人爽人人爽蜜臀| 亚洲国产成人av好男人在线观看| 1区2区3区精品视频| 国产精品午夜在线| 欧美激情一区二区三区四区| 国产欧美一区二区在线观看| 久久综合成人精品亚洲另类欧美| 欧美不卡一二三| 26uuu国产电影一区二区| 久久久精品免费网站| 国产欧美日韩中文久久| 国产精品免费aⅴ片在线观看| 国产精品私人影院| 亚洲精品五月天| 日韩av电影天堂|