亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 02-07.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Protocol Building Blocks</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=02//-->
<!--PAGES=035-037//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="02-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Signing Documents with Symmetric Cryptosystems and an Arbitrator</I></B></FONT></P>
<P>Alice wants to sign a digital message and send it to Bob. With the help of Trent and a symmetric cryptosystem, she can.
</P>
<P>Trent is a powerful, trusted arbitrator. He can communicate with both Alice and Bob (and everyone else who may want to sign a digital document). He shares a secret key, <I>K</I><SUB>A</SUB>, with Alice, and a different secret key, <I>K</I><SUB>B</SUB>, with Bob. These keys have been established long before the protocol begins and can be reused multiple times for multiple signings.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice encrypts her message to Bob with <I>K</I><SUB>A</SUB> and sends it to Trent.
<DD><B>(2)</B>&nbsp;&nbsp;Trent decrypts the message with <I>K</I><SUB>A</SUB>.
<DD><B>(3)</B>&nbsp;&nbsp;Trent takes the decrypted message and a statement that he has received this message from Alice, and encrypts the whole bundle with <I>K</I><SUB>B</SUB>.
<DD><B>(4)</B>&nbsp;&nbsp;Trent sends the encrypted bundle to Bob.
<DD><B>(5)</B>&nbsp;&nbsp;Bob decrypts the bundle with <I>K</I><SUB>B</SUB>. He can now read both the message and Trent&#146;s certification that Alice sent it.
</DL>
<P>How does Trent know that the message is from Alice and not from some imposter? He infers it from the message&#146;s encryption. Since only he and Alice share their secret key, only Alice could encrypt a message using it.
</P>
<P>Is this as good as a paper signature? Let&#146;s look at the characteristics we want:</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;This signature is authentic. Trent is a trusted arbitrator and Trent knows that the message came from Alice. Trent&#146;s certification serves as proof to Bob.
<DD><B>2.</B>&nbsp;&nbsp;This signature is unforgeable. Only Alice (and Trent, but everyone trusts him) knows <I>K</I><SUB>A</SUB>, so only Alice could have sent Trent a message encrypted with <I>K</I><SUB>A</SUB>. If someone tried to impersonate Alice, Trent would have immediately realized this in step (2) and would not certify its authenticity.
<DD><B>3.</B>&nbsp;&nbsp;This signature is not reusable. If Bob tried to take Trent&#146;s certification and attach it to another message, Alice would cry foul. An arbitrator (it could be Trent or it could be a completely different arbitrator with access to the same information) would ask Bob to produce both the message and Alice&#146;s encrypted message. The arbitrator would then encrypt the message with <I>K</I><SUB>A</SUB> and see that it did not match the encrypted message that Bob gave him. Bob, of course, could not produce an encrypted message that matches because he does not know <I>K</I><SUB>A</SUB>.
<DD><B>4.</B>&nbsp;&nbsp;The signed document is unalterable. Were Bob to try to alter the document after receipt, Trent could prove foul play in exactly the same manner just described.
<DD><B>5.</B>&nbsp;&nbsp;The signature cannot be repudiated. Even if Alice later claims that she never sent the message, Trent&#146;s certification says otherwise. Remember, Trent is trusted by everyone; what he says is true.
</DL>
<P>If Bob wants to show Carol a document signed by Alice, he can&#146;t reveal his secret key to her. He has to go through Trent again:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Bob takes the message and Trent&#146;s statement that the message came from Alice, encrypts them with <I>K</I><SUB>B</SUB>, and sends them back to Trent.
<DD><B>(2)</B>&nbsp;&nbsp;Trent decrypts the bundle with <I>K</I><SUB>B</SUB>.
<DD><B>(3)</B>&nbsp;&nbsp;Trent checks his database and confirms that the original message came from Alice.
<DD><B>(4)</B>&nbsp;&nbsp;Trent re-encrypts the bundle with the secret key he shares with Carol, <I>K</I><SUB>C</SUB>, and sends it to Carol.
<DD><B>(5)</B>&nbsp;&nbsp;Carol decrypts the bundle with <I>K</I><SUB>C</SUB>. She can now read both the message and Trent&#146;s certification that Alice sent it.
</DL>
<P>These protocols work, but they&#146;re time-consuming for Trent. He must spend his days decrypting and encrypting messages, acting as the intermediary between every pair of people who want to send signed documents to one another. He must keep a database of messages (although this can be avoided by sending the recipient a copy of the sender&#146;s encrypted message). He is a bottleneck in any communications system, even if he&#146;s a mindless software program.
</P>
<P>Harder still is creating and maintaining someone like Trent, someone that everyone on the network trusts. Trent has to be infallible; if he makes even one mistake in a million signatures, no one is going to trust him. Trent has to be completely secure. If his database of secret keys ever got out or if someone managed to modify his programming, everyone&#146;s signatures would be completely useless. False documents purported to be signed years ago could appear. Chaos would result. Governments would collapse. Anarchy would reign. This might work in theory, but it doesn&#146;t work very well in practice.</P>
<P><FONT SIZE="+1"><B><I>Digital Signature Trees</I></B></FONT></P>
<P>Ralph Merkle proposed a digital signature scheme based on secret-key cryptography, producing an infinite number of one-time signatures using a tree structure [1067,1068]. The basic idea of this scheme is to place the root of the tree in some public file, thereby authenticating it. The root signs one message and authenticates its sub-nodes in the tree. Each of these nodes signs one message and authenticates its sub-nodes, and so on.
</P>
<P><FONT SIZE="+1"><B><I>Signing Documents with Public-Key Cryptography</I></B></FONT></P>
<P>There are public-key algorithms that can be used for digital signatures. In some algorithms&#151;RSA is an example (see Section 19.3)&#151;either the public key or the private key can be used for encryption. Encrypt a document using your private key, and you have a secure digital signature. In other cases&#151;DSA is an example (see Section 20.1)&#151;there is a separate algorithm for digital signatures that cannot be used for encryption. This idea was first invented by Diffie and Hellman [496] and further expanded and elaborated on in other texts [1282,1328,1024,1283,426]. See [1099] for a good survey of the field.
</P>
<P>The basic protocol is simple:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice encrypts the document with her private key, thereby signing the document.
<DD><B>(2)</B>&nbsp;&nbsp;Alice sends the signed document to Bob.
<DD><B>(3)</B>&nbsp;&nbsp;Bob decrypts the document with Alice&#146;s public key, thereby verifying the signature.
</DL>
<P>This protocol is far better than the previous one. Trent is not needed to either sign or verify signatures. (He is needed to certify that Alice&#146;s public key is indeed her public key.) The parties do not even need Trent to resolve disputes: If Bob cannot perform step (3), then he knows the signature is not valid.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="02-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本丶国产丶欧美色综合| 欧美一区在线视频| 欧美大度的电影原声| 亚洲桃色在线一区| 国产主播一区二区三区| 色婷婷精品大在线视频| www亚洲一区| 日本vs亚洲vs韩国一区三区| 99精品视频一区二区| 久久久久久久久99精品| 日韩国产欧美一区二区三区| 91国偷自产一区二区三区观看| 久久亚洲综合av| 免费高清视频精品| 欧美日韩国产高清一区二区三区 | 狠狠色综合日日| 欧美综合在线视频| 亚洲日本在线a| 懂色一区二区三区免费观看 | 亚洲日本在线看| 成人午夜伦理影院| 久久嫩草精品久久久精品| 免费人成精品欧美精品| 欧美日韩你懂的| 亚洲一区免费观看| 色偷偷一区二区三区| 亚洲色图欧洲色图| 成人免费视频网站在线观看| 国产欧美日韩久久| 国产成人综合在线播放| 久久久青草青青国产亚洲免观| 久久99国内精品| 精品国产一二三区| 国产一区二区三区不卡在线观看| 日韩欧美另类在线| 国产精品99久久久| 国产女主播一区| 色偷偷一区二区三区| 亚洲午夜精品久久久久久久久| 91精品福利视频| 亚洲已满18点击进入久久| 欧美揉bbbbb揉bbbbb| 五月天国产精品| 日韩一区二区三区四区| 精品一区在线看| 中文字幕乱码亚洲精品一区| 99久久久国产精品免费蜜臀| 伊人色综合久久天天| 欧美另类变人与禽xxxxx| 免费亚洲电影在线| 国产欧美一区二区精品久导航| 成人免费视频免费观看| 自拍偷拍欧美精品| 欧美日韩久久久久久| 免费成人你懂的| 国产片一区二区| 欧美优质美女网站| 久久疯狂做爰流白浆xx| 久久久国产精品不卡| 色狠狠色狠狠综合| 麻豆精品在线视频| 国产精品美女一区二区| 欧美日韩中文精品| 国产成人一级电影| 亚洲一区精品在线| 久久精品亚洲乱码伦伦中文| 91国产精品成人| 国内精品久久久久影院薰衣草 | 蜜桃视频在线观看一区| 国产午夜久久久久| 欧美日韩精品一区二区三区四区 | 91美女在线看| 蜜桃av一区二区| 中文字幕日本乱码精品影院| 717成人午夜免费福利电影| 国产超碰在线一区| 日日夜夜免费精品| 国产精品国产三级国产有无不卡| 欧美日韩小视频| 成人av在线网站| 日韩成人午夜电影| 亚洲天堂免费在线观看视频| 精品美女一区二区三区| 在线一区二区三区四区| 处破女av一区二区| 毛片不卡一区二区| 亚洲国产毛片aaaaa无费看| 国产午夜精品福利| 日本一区二区视频在线| 欧美日韩在线免费视频| 99久久婷婷国产综合精品电影| 久久精品国产99久久6| 亚洲综合一区二区三区| 国产精品成人网| 久久精品无码一区二区三区| 日韩一区二区三区三四区视频在线观看| 99综合影院在线| 国产99久久久久久免费看农村| 免费成人美女在线观看.| 亚洲超碰97人人做人人爱| 亚洲黄色录像片| 最近中文字幕一区二区三区| 国产欧美精品一区二区三区四区| 欧美sm美女调教| 欧美电影免费观看高清完整版| 欧美私人免费视频| 日本久久一区二区三区| 99re在线视频这里只有精品| av在线播放不卡| 成人免费视频免费观看| 不卡视频一二三四| 成人国产免费视频| 床上的激情91.| 97se狠狠狠综合亚洲狠狠| 99视频有精品| 99精品视频一区二区| 色婷婷久久综合| 欧美亚洲一区三区| 欧美日韩1234| 欧美一区二区二区| 精品国产一区二区三区四区四| 精品粉嫩超白一线天av| 久久久久久久综合日本| 国产精品午夜电影| 亚洲免费在线看| 五月天激情综合| 国产一区二区三区四区五区入口 | 日韩精品中文字幕一区二区三区| 欧美一区二区三区男人的天堂| 日韩一区二区三区视频在线| 久久精品在线观看| 中文字幕一区二区三区乱码在线| 亚洲青青青在线视频| 夜夜夜精品看看| 天天综合色天天| 国产乱子伦一区二区三区国色天香| 国产成人精品亚洲日本在线桃色| 成人综合激情网| 欧美主播一区二区三区美女| 欧美一区日本一区韩国一区| 久久日韩精品一区二区五区| 国产精品入口麻豆九色| 亚洲午夜激情网页| 免费高清在线一区| 9i在线看片成人免费| 欧美久久久久久蜜桃| 久久久噜噜噜久久中文字幕色伊伊| 国产女人aaa级久久久级| 亚洲va韩国va欧美va| 国产呦萝稀缺另类资源| 在线免费观看日本一区| 精品三级在线观看| 日韩毛片在线免费观看| 免费不卡在线视频| 91香蕉视频污| 精品88久久久久88久久久| 亚洲欧美日本韩国| 不卡一区二区在线| 精品视频色一区| 国产精品久久久久aaaa| 日本欧美韩国一区三区| 99精品视频中文字幕| 精品国内二区三区| 亚洲午夜电影网| www.成人在线| 久久视频一区二区| 三级欧美在线一区| 色av成人天堂桃色av| 久久久精品欧美丰满| 蜜臀av亚洲一区中文字幕| 欧美亚洲自拍偷拍| **网站欧美大片在线观看| 韩国成人福利片在线播放| 欧美日韩一区二区三区四区| 国产精品女人毛片| 国产精品综合二区| 欧美一区二区三区免费| 亚洲亚洲精品在线观看| 99久久亚洲一区二区三区青草| 国产婷婷精品av在线| 蜜臀av国产精品久久久久| 欧美精品电影在线播放| 亚洲一区二区三区视频在线| caoporn国产精品| 国产亚洲一区二区在线观看| 久久成人18免费观看| 日韩一区二区在线看片| 青青青伊人色综合久久| 欧美三区免费完整视频在线观看| 国产精品免费视频观看| 国产寡妇亲子伦一区二区| 精品国产一区二区三区久久久蜜月| 亚洲电影激情视频网站| 在线观看欧美日本| 一区二区三区精品视频| 在线视频一区二区三| 夜夜精品视频一区二区| 色久综合一二码| 亚洲香肠在线观看| 欧美男男青年gay1069videost|