亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 01-06.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Foundations</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=01//-->
<!--PAGES=016-018//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="01-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch02/02-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Assuming an eavesdropper can&#146;t get access to the one-time pad used to encrypt the message, this scheme is perfectly secure. A given ciphertext message is equally likely to correspond to any possible plaintext message of equal size.
</P>
<P>Since every key sequence is equally likely (remember, the key letters are generated randomly), an adversary has no information with which to cryptanalyze the ciphertext. The key sequence could just as likely be:</P>
<!-- CODE SNIP //-->
<PRE>
    POYYAEAAZX
</PRE>
<!-- END CODE SNIP //-->
<P>which would decrypt to:
</P>
<!-- CODE SNIP //-->
<PRE>
    SALMONEGGS
</PRE>
<!-- END CODE SNIP //-->
<P>or
</P>
<!-- CODE SNIP //-->
<PRE>
    BXFGBMTMXM
</PRE>
<!-- END CODE SNIP //-->
<P>which would decrypt to:
</P>
<!-- CODE SNIP //-->
<PRE>
    GREENFLUID
</PRE>
<!-- END CODE SNIP //-->
<P>This point bears repeating: Since every plaintext message is equally possible, there is no way for the cryptanalyst to determine which plaintext message is the correct one. A random key sequence added to a nonrandom plaintext message produces a completely random ciphertext message and no amount of computing power can change that.
</P>
<P>The caveat, and this is a big one, is that the key letters have to be generated randomly. Any attacks against this scheme will be against the method used to generate the key letters. Using a pseudo-random number generator doesn&#146;t count; they always have nonrandom properties. If you use a real random source&#151;this is much harder than it might first appear, see Section 17.14&#151;it&#146;s secure.</P>
<P>The other important point is that you can never use the key sequence again, ever. Even if you use a multiple-gigabyte pad, if a cryptanalyst has multiple ciphertexts whose keys overlap, he can reconstruct the plaintext. He slides each pair of ciphertexts against each other and counts the number of matches at each position. If they are aligned right, the proportion of matches jumps suddenly&#151;the exact percentages depend on the plaintext language. From this point cryptanalysis is easy. It&#146;s like the index of coincidence, but with just two &#147;periods&#148; to compare [904]. Don&#146;t do it.</P>
<P>The idea of a one-time pad can be easily extended to binary data. Instead of a one-time pad consisting of letters, use a one-time pad of bits. Instead of adding the plaintext to the one-time pad, use an XOR. To decrypt, XOR the ciphertext with the same one-time pad. Everything else remains the same and the security is just as perfect.</P>
<P>This all sounds good, but there are a few problems. Since the key bits must be random and can never be used again, the length of the key sequence must be equal to the length of the message. A one-time pad might be suitable for a few short messages, but it will never work for a 1.544 Mbps communications channel. You can store 650 megabytes worth of random bits on a CD-ROM, but there are problems. First, you want exactly two copies of the random bits, but CD-ROMs are economical only for large quantities. And second, you want to be able to destroy the bits already used. CD-ROM has no erase facilities except for physically destroying the entire disk. Digital tape is a much better medium for this sort of thing.</P>
<P>Even if you solve the key distribution and storage problem, you have to make sure the sender and receiver are perfectly synchronized. If the receiver is off by a bit (or if some bits are dropped during the transmission), the message won&#146;t make any sense. On the other hand, if some bits are altered during transmission (without any bits being added or removed&#151;something far more likely to happen due to random noise), only those bits will be decrypted incorrectly. But on the other hand, a one-time pad provides no authenticity.</P>
<P>One-time pads have applications in today&#146;s world, primarily for ultra-secure low-bandwidth channels. The hotline between the United States and the former Soviet Union was (is it still active?) rumored to be encrypted with a one-time pad. Many Soviet spy messages to agents were encrypted using one-time pads. These messages are still secure today and will remain that way forever. It doesn&#146;t matter how long the supercomputers work on the problem. Even after the aliens from Andromeda land with their massive spaceships and undreamed-of computing power, they will not be able to read the Soviet spy messages encrypted with one-time pads (unless they can also go back in time and get the one-time pads).</P>
<H3><A NAME="Heading7"></A><FONT COLOR="#000077">1.6 Computer Algorithms</FONT></H3>
<P>There are many cryptographic algorithms. These are three of the most common:
</P>
<DL>
<DD>&#151; DES (Data Encryption Standard) is the most popular computer encryption algorithm. DES is a U.S. and international standard. It is a symmetric algorithm; the same key is used for encryption and decryption.
<DD>&#151; RSA (named for its creators&#151;Rivest, Shamir, and Adleman) is the most popular public-key algorithm. It can be used for both encryption and digital signatures.
<DD>&#151; DSA (Digital Signature Algorithm, used as part of the Digital Signature Standard) is another public-key algorithm. It cannot be used for encryption, but only for digital signatures.
</DL>
<P>These are the kinds of stuff this book is about.
</P>
<H3><A NAME="Heading8"></A><FONT COLOR="#000077">1.7 Large Numbers</FONT></H3>
<P>Throughout this book, I use various large numbers to describe different things in cryptography. Because it is so easy to lose sight of these numbers and what they signify, Table 1.1 gives physical analogues for some of them.
</P>
<P>These numbers are order-of-magnitude estimates, and have been culled from a variety of sources. Many of the astrophysics numbers are explained in Freeman</P>
<TABLE WIDTH="100%"><TH CAPTION ALIGN="CENTER" COLSPAN="2">TABLE 1.1<BR>Large Numbers
<TR>
<TD COLSPAN="2"><HR>
<TR>
<TH WIDTH="60%" ALIGN="LEFT">Physical Analogue
<TH ALIGN="LEFT" VALIGN="TOP">Number
<TR>
<TD COLSPAN="2"><HR>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Odds of being killed by lightning (per day)
<TD VALIGN="TOP" ALIGN="LEFT">1 in 9 billion (2<SUP>33</SUP>)
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Odds of winning the top prize in a U.S. state lottery
<TD VALIGN="TOP" ALIGN="LEFT">1 in 4,000,000 (2<SUP>22</SUP>)
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Odds of winning the top prize in a U.S. state lottery and being killed by lightning in the same day
<TD VALIGN="TOP" ALIGN="LEFT">1 in 2<SUP>55</SUP>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Odds of drowning (in the U.S. per year)
<TD VALIGN="TOP" ALIGN="LEFT">1 in 59,000 (2<SUP>16</SUP>)
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Odds of being killed in an automobile accident(in the U.S. in 1993)
<TD VALIGN="TOP" ALIGN="LEFT">1 in 6100 (2<SUP>13</SUP>)
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Odds of being killed in an automobile accident(in the U.S. per lifetime)
<TD VALIGN="TOP" ALIGN="LEFT">1 in 88 (2<SUP>7</SUP>)
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Time until the next ice age
<TD VALIGN="TOP" ALIGN="LEFT">14,000 (2<SUP>14</SUP>) years
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Time until the sun goes nova
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>9</SUP> (2<SUP>30</SUP>) years
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Age of the planet
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>9</SUP> (2<SUP>30</SUP>) years
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Age of the Universe
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>10</SUP> (2<SUP>34</SUP>) years
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Number of atoms in the planet
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>51</SUP> (2<SUP>170</SUP>)
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Number of atoms in the sun
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>57</SUP> (2<SUP>190</SUP>)
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Number of atoms in the galaxy
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>67</SUP> (2<SUP>223</SUP>)
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Number of atoms in the Universe (dark matter excluded)
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>77</SUP> (2<SUP>265</SUP>)
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Volume of the Universe
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>84</SUP> (2<SUP>280</SUP>) cm<SUP>3</SUP>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT"><B>If the Universe is Closed:</B>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Total lifetime of the Universe
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>11</SUP> (2<SUP>37</SUP>) years<BR>10<SUP>18</SUP> (2<SUP>61</SUP>) seconds
<TR>
<TD VALIGN="TOP" ALIGN="LEFT"><B>If the Universe is Open:</B>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Time until low-mass stars cool off
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>14</SUP> (2<SUP>47</SUP>) years
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Time until planets detach from stars
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>15</SUP> (2<SUP>50</SUP>) years
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Time until stars detach from galaxies
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>19</SUP> (2<SUP>64</SUP>) years
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Time until orbits decay by gravitational radiation
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>20</SUP> (2<SUP>67</SUP>) years
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Time until black holes decay by the Hawking process
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>64</SUP> (2<SUP>213</SUP>) years
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Time until all matter is liquid at zero temperature
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>65</SUP> (2<SUP>216</SUP>) years
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Time until all matter decays to iron
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>1026</SUP> years
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Time until all matter collapses to black holes
<TD VALIGN="TOP" ALIGN="LEFT">10<SUP>1076</SUP> years
<TR>
<TD COLSPAN="2"><HR>
<TR>
</TABLE>
<P>Dyson&#146;s paper, &#147;Time Without End: Physics and Biology in an Open Universe,&#148; in <I>Reviews of Modern Physics</I>, v. 52, n. 3, July 1979, pp. 447&#150;460. Automobile accident deaths are calculated from the Department of Transportation&#146;s statistic of 163 deaths per million people in 1993 and an average lifespan of 69.7 years.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="01-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch02/02-01.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲国产欧美日韩另类综合| 麻豆精品国产传媒mv男同| 国产精品国产三级国产普通话蜜臀 | 久久久综合激的五月天| 一区二区三区蜜桃网| 粉嫩绯色av一区二区在线观看| 日韩视频在线永久播放| 午夜精品久久久久久不卡8050| 成人免费视频视频| 国产精品久久久久aaaa| 成人福利视频在线看| 亚洲欧洲韩国日本视频| 成人动漫中文字幕| 亚洲精品欧美激情| 欧美视频一区二区三区四区 | 亚洲小说欧美激情另类| 欧美午夜电影一区| 免费成人在线视频观看| 26uuu欧美| 色婷婷久久99综合精品jk白丝| 亚洲男人电影天堂| 欧美r级在线观看| 国内精品久久久久影院色| 成人欧美一区二区三区白人 | 波多野结衣中文一区| 亚洲女同一区二区| 欧美激情在线一区二区| 亚洲欧美一区二区三区久本道91| 在线视频你懂得一区| 色香蕉久久蜜桃| 色综合激情五月| av中文字幕一区| 成人精品小蝌蚪| 国产精品亚洲人在线观看| 国产成人综合视频| 成人综合婷婷国产精品久久| 高清国产一区二区| 成人午夜免费视频| 色妹子一区二区| 欧美日韩一级大片网址| 制服.丝袜.亚洲.中文.综合| 日韩一区二区三区在线观看| 欧美变态tickle挠乳网站| 久久久美女艺术照精彩视频福利播放| 精品久久久网站| 亚洲男同性恋视频| 奇米777欧美一区二区| 狠狠色狠狠色综合日日91app| 福利电影一区二区三区| 不卡免费追剧大全电视剧网站| 色综合久久久久网| 日韩一区二区免费在线观看| 国产精品三级久久久久三级| 亚洲成人免费av| 丁香啪啪综合成人亚洲小说| 91福利在线导航| 一区在线观看视频| 中文字幕中文字幕一区| 亚洲精品国久久99热| 亚洲成av人**亚洲成av**| 国产在线麻豆精品观看| 97se亚洲国产综合在线| 777xxx欧美| 亚洲欧洲色图综合| 久久精品国产99| 91福利社在线观看| 国产欧美一区二区精品久导航| 亚洲桃色在线一区| 捆绑调教一区二区三区| 色哦色哦哦色天天综合| 欧美成人a视频| 亚洲精品视频在线观看网站| 免费一级片91| 欧美视频一二三区| 自拍av一区二区三区| 国产精品一卡二卡在线观看| 欧美日韩成人综合| 亚洲图片有声小说| 一本到三区不卡视频| 国产日韩欧美麻豆| 91在线小视频| 亚洲视频你懂的| 成人ar影院免费观看视频| 久久伊人蜜桃av一区二区| 日韩成人av影视| 国产真实精品久久二三区| 白白色亚洲国产精品| 国产亚洲欧美色| 日韩精品福利网| 欧美系列一区二区| 亚洲免费观看在线视频| 成人激情小说乱人伦| 自拍偷拍亚洲综合| 国产麻豆成人传媒免费观看| 正在播放亚洲一区| 亚洲成人精品影院| 日韩一区二区高清| 国产999精品久久久久久绿帽| 久久综合资源网| 欧美自拍偷拍午夜视频| 久久国产综合精品| 亚洲成av人片www| 中文字幕日韩av资源站| 欧美精品一区二区不卡| 日本道在线观看一区二区| 亚洲18色成人| 国产午夜亚洲精品不卡| 在线观看亚洲专区| 久久国产欧美日韩精品| 国产精品国产三级国产aⅴ中文| 91首页免费视频| 久久国产精品72免费观看| 亚洲天天做日日做天天谢日日欢 | 日韩码欧中文字| 欧美日韩欧美一区二区| 精品一区二区三区在线播放| 国产精品视频在线看| 欧美久久久久久久久中文字幕| 亚洲主播在线播放| 一区二区三区日本| 亚洲国产精品国自产拍av| 欧美成人一区二区三区片免费| 91啦中文在线观看| 欧美高清视频www夜色资源网| 91美女在线观看| av中文字幕不卡| 91小视频在线免费看| 波多野结衣一区二区三区| 国产suv精品一区二区6| 高清av一区二区| 99r精品视频| 不卡一二三区首页| 99re热这里只有精品免费视频| 亚洲精品中文字幕在线观看| 欧美tk—视频vk| 国产91精品欧美| 日韩av一区二区在线影视| 欧美成人一区二区三区片免费 | 欧美电视剧在线观看完整版| 在线精品国精品国产尤物884a| 91麻豆精品国产91久久久久| 欧美日韩中文字幕一区二区| 国产精品免费aⅴ片在线观看| 国产成人午夜片在线观看高清观看| 久久亚洲综合av| 国产精品一区二区免费不卡| 国产视频一区在线观看| 福利一区二区在线| 亚洲私人影院在线观看| 在线观看日韩精品| 三级在线观看一区二区| 欧美mv和日韩mv国产网站| 国产精品99久久久久久宅男| 国产精品精品国产色婷婷| 一本到高清视频免费精品| 亚洲国产成人av| 日韩欧美不卡在线观看视频| 精一区二区三区| 中文字幕制服丝袜一区二区三区| 在线亚洲一区二区| 欧美美女视频在线观看| 久草中文综合在线| 国产精品三级av| 欧美三级电影一区| 精品一区二区免费在线观看| 国产欧美日本一区二区三区| 欧美在线一区二区三区| 久久er99精品| 亚洲视频在线一区观看| 在线不卡中文字幕| 粉嫩av一区二区三区| 亚洲精品午夜久久久| 日韩精品一区二区三区中文不卡| 波多野结衣欧美| 日韩av不卡一区二区| 国产亚洲一本大道中文在线| 在线观看成人小视频| 久久国产精品无码网站| 亚洲欧美中日韩| 3d动漫精品啪啪一区二区竹菊| 成人午夜看片网址| 日本 国产 欧美色综合| 日韩理论在线观看| 精品久久久久久久久久久久久久久久久| 成人黄页毛片网站| 看电视剧不卡顿的网站| 亚洲另类在线视频| 久久综合九色综合欧美98| 91黄色激情网站| 成人丝袜18视频在线观看| 日本亚洲一区二区| 一区二区三区四区高清精品免费观看 | 九色综合狠狠综合久久| 亚洲精品免费播放| 久久久久综合网| 91麻豆精品国产91久久久久久久久 | 国产精品久久三区| 日韩午夜中文字幕| 欧美色爱综合网| 91视频.com|