亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 02-06.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Protocol Building Blocks</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=02//-->
<!--PAGES=033-035//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="02-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>A chosen-plaintext attack can be particularly effective if there are relatively few possible encrypted messages. For example, if <I>P</I> were a dollar amount less than $1,000,000, this attack would work; the cryptanalyst tries all million possible dollar amounts. (Probabilistic encryption solves the problem; see Section 23.15.) Even if <I>P</I> is not as well-defined, this attack can be very effective. Simply knowing that a ciphertext does not correspond to a particular plaintext can be useful information. Symmetric cryptosystems are not vulnerable to this attack because a cryptanalyst cannot perform trial encryptions with an unknown key.</P>
<P>In most practical implementations public-key cryptography is used to secure and distribute <B>session keys</B>; those session keys are used with symmetric algorithms to secure message traffic [879]. This is sometimes called a <B>hybrid cryptosystem</B>.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Bob sends Alice his public key.
<DD><B>(2)</B>&nbsp;&nbsp;Alice generates a random session key, <I>K</I>, encrypts it using Bob&#146;s public key, and sends it to Bob.
<DL>
<DD><I>E</I><SUB>B</SUB>(<I>K</I>)
</DL>
<DD><B>(3)</B>&nbsp;&nbsp;Bob decrypts Alice&#146;s message using his private key to recover the session key.
<DL>
<DD><I>D</I><SUB>B</SUB>(<I>E</I><SUB>B</SUB>(<I>K</I>)) = <I>K</I>
</DL>
<DD><B>(4)</B>&nbsp;&nbsp;Both of them encrypt their communications using the same session key.
</DL>
<P>Using public-key cryptography for key distribution solves a very important key-management problem. With symmetric cryptography, the data encryption key sits around until it is used. If Eve ever gets her hands on it, she can decrypt messages encrypted with it. With the previous protocol, the session key is created when it is needed to encrypt communications and destroyed when it is no longer needed. This drastically reduces the risk of compromising the session key. Of course, the private key is vulnerable to compromise, but it is at less risk because it is only used once per communication to encrypt a session key. This is further discussed in Section 3.1.
</P>
<P><FONT SIZE="+1"><B><I>Merkle&#146;s Puzzles</I></B></FONT></P>
<P>Ralph Merkle invented the first construction of public-key cryptography. In 1974 he registered for a course in computer security at the University of California, Berkeley, taught by Lance Hoffman. His term paper topic, submitted early in the term, addressed the problem of &#147;Secure Communication over Insecure Channels&#148; [1064]. Hoffman could not understand Merkle&#146;s proposal and eventually Merkle dropped the course. He continued to work on the problem, despite continuing failure to make his results understood.
</P>
<P>Merkle&#146;s technique was based on &#147;puzzles&#148; that were easier to solve for the sender and receiver than for an eavesdropper. Here&#146;s how Alice sends an encrypted message to Bob without first having to exchange a key with him.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Bob generates 2<SUP>20</SUP>, or about a million, messages of the form: &#147;This is puzzle number <I>x</I>. This is the secret key number <I>y</I>,&#148; where <I>x</I> is a random number and <I>y</I> is a random secret key. Both <I>x</I> and <I>y</I> are different for each message. Using a symmetric algorithm, he encrypts each message with a different 20-bit key and sends them all to Alice.
<DD><B>(2)</B>&nbsp;&nbsp;Alice chooses one message at random and performs a brute-force attack to recover the plaintext. This is a large, but not impossible, amount of work.
<DD><B>(3)</B>&nbsp;&nbsp;Alice encrypts her secret message with the key she recovered and some symmetric algorithm, and sends it to Bob along with <I>x</I>.
<DD><B>(4)</B>&nbsp;&nbsp;Bob knows which secret key <I>y</I> he encrypts in message <I>x</I>, so he can decrypt the message.
</DL>
<P>Eve can break this system, but she has to do far more work than either Alice or Bob. To recover the message in step (3), she has to perform a brute-force attack against each of Bob&#146;s 2<SUP>20</SUP> messages in step (1); this attack has a complexity of 2<SUP>40</SUP>. The <I>x</I> values won&#146;t help Eve either; they were assigned randomly in step (1). In general, Eve has to expend approximately the square of the effort that Alice expends.</P>
<P>This <I>n</I> to <I>n</I><SUP>2</SUP> advantage is small by cryptographic standards, but in some circumstances it may be enough. If Alice and Bob can try ten thousand keys per second, it will take them a minute each to perform their steps and another minute to communicate the puzzles from Bob to Alice on a 1.544 MB link. If Eve had comparable computing facilities, it would take her about a year to break the system. Other algorithms are even harder to break.</P>
<H3><A NAME="Heading7"></A><FONT COLOR="#000077">2.6 Digital Signatures</FONT></H3>
<P>Handwritten signatures have long been used as proof of authorship of, or at least agreement with, the contents of a document. What is it about a signature that is so compelling [1392]?
</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;The signature is authentic. The signature convinces the document&#146;s recipient that the signer deliberately signed the document.
<DD><B>2.</B>&nbsp;&nbsp;The signature is unforgeable. The signature is proof that the signer, and no one else, deliberately signed the document.
<DD><B>3.</B>&nbsp;&nbsp;The signature is not reusable. The signature is part of the document; an unscrupulous person cannot move the signature to a different document.
<DD><B>4.</B>&nbsp;&nbsp;The signed document is unalterable. After the document is signed, it cannot be altered.
<DD><B>5.</B>&nbsp;&nbsp;The signature cannot be repudiated. The signature and the document are physical things. The signer cannot later claim that he or she didn&#146;t sign it.
</DL>
<P>In reality, none of these statements about signatures is completely true. Signatures can be forged, signatures can be lifted from one piece of paper and moved to another, and documents can be altered after signing. However, we are willing to live with these problems because of the difficulty in cheating and the risk of detection.
</P>
<P>We would like to do this sort of thing on computers, but there are problems. First, computer files are trivial to copy. Even if a person&#146;s signature were difficult to forge (a graphical image of a written signature, for example), it would be easy to cut and paste a valid signature from one document to another document. The mere presence of such a signature means nothing. Second, computer files are easy to modify after they are signed, without leaving any evidence of modification.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="02-05.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-07.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲精品一卡二卡| 日本午夜精品视频在线观看| 污片在线观看一区二区| 成人深夜视频在线观看| 欧美理论片在线| 国产精品麻豆久久久| 久久99精品国产麻豆婷婷洗澡| www.av亚洲| 久久久久久一二三区| 日韩不卡手机在线v区| 91久久奴性调教| 国产日本欧美一区二区| 中文字幕一区二区三区在线不卡| 日韩激情av在线| 蜜桃久久久久久久| 欧美性一级生活| 亚洲三级在线播放| 成人18视频在线播放| 久久久久青草大香线综合精品| 麻豆精品在线看| 欧美一级精品在线| 美国十次了思思久久精品导航| 91精品国产品国语在线不卡| 亚洲妇熟xx妇色黄| 欧美日韩一区二区三区视频| 一区二区视频在线看| 一本久久a久久免费精品不卡| 中文字幕一区二区三区精华液| 丰满白嫩尤物一区二区| 国产女人18毛片水真多成人如厕| 国产成人aaa| 国产精品热久久久久夜色精品三区 | 午夜视频在线观看一区二区三区| av综合在线播放| 国产欧美日韩精品在线| 国产精品一区二区男女羞羞无遮挡| 精品日韩av一区二区| 国产一区二区三区综合| 久久久久久麻豆| www.亚洲精品| 亚洲国产日韩一区二区| 7777精品伊人久久久大香线蕉最新版| 亚洲精品国产一区二区精华液 | 狠狠狠色丁香婷婷综合激情 | 欧美一区二区久久久| 蜜臀av在线播放一区二区三区| 日韩精品中文字幕在线一区| 久久99最新地址| 国产精品久久久久久户外露出 | 26uuu成人网一区二区三区| 国产一区二区三区国产| 久久久www免费人成精品| 成人av在线播放网站| 亚洲精品视频免费观看| 欧美日韩国产中文| 久久国产麻豆精品| 中文av一区二区| 欧美日韩午夜精品| 精品在线播放免费| 最近日韩中文字幕| 在线电影国产精品| 国产乱国产乱300精品| 亚洲女同一区二区| 精品国产成人在线影院 | 国产一区二区三区黄视频 | 国产亚洲女人久久久久毛片| 色综合色综合色综合色综合色综合 | 国产成人福利片| 一区二区三区在线看| 日韩一区二区三区电影| av高清不卡在线| 蜜臀av性久久久久蜜臀aⅴ | a级高清视频欧美日韩| 丝袜美腿亚洲一区| 国产精品久久久久久久久快鸭| 91美女精品福利| 黄色日韩网站视频| 亚洲午夜久久久久久久久电影院| 26uuu久久天堂性欧美| 在线精品视频小说1| 国产老肥熟一区二区三区| 一个色在线综合| 欧美激情在线一区二区| 91精品在线免费观看| 99久久免费精品| 激情文学综合丁香| 日韩中文字幕1| 国产精品成人一区二区艾草 | 欧美日韩一级视频| 99久久精品99国产精品 | 国产精品盗摄一区二区三区| 日韩精品在线一区二区| 欧洲精品一区二区| 不卡视频在线看| 国产精品自拍一区| 美女一区二区久久| 午夜一区二区三区在线观看| 成人免费小视频| 欧美激情一区二区三区全黄 | 91精品国产入口| 欧美在线一二三四区| 97精品久久久午夜一区二区三区| 激情小说亚洲一区| 狠狠色狠狠色合久久伊人| 蜜臀a∨国产成人精品| 免费久久精品视频| 免费成人av资源网| 麻豆传媒一区二区三区| 日韩影院精彩在线| 日韩和的一区二区| 日韩av在线免费观看不卡| 图片区小说区区亚洲影院| 亚洲福利电影网| 五月天网站亚洲| 五月天激情小说综合| 日韩电影免费在线观看网站| 天堂蜜桃91精品| 男人的天堂亚洲一区| 青娱乐精品视频在线| 老司机免费视频一区二区| 久久66热re国产| 国产精品888| 成人av高清在线| 91亚洲精品乱码久久久久久蜜桃 | 欧洲一区二区三区免费视频| zzijzzij亚洲日本少妇熟睡| 99视频超级精品| 在线一区二区视频| 欧美日韩在线三区| 日韩午夜激情电影| 久久免费视频一区| 亚洲欧美日韩系列| 五月激情六月综合| 国产米奇在线777精品观看| 成人精品高清在线| 欧美亚洲国产bt| 91精品久久久久久蜜臀| 国产日本一区二区| 一区二区三区丝袜| 日本女优在线视频一区二区| 国产高清不卡一区| 欧美在线观看视频在线| 日韩久久精品一区| 国产精品久久久久一区二区三区共| 亚洲男人天堂一区| 精品在线播放免费| 色视频成人在线观看免| 精品久久久久久久久久久院品网 | 日本一区二区三区电影| 一区二区在线观看视频在线观看| 日韩电影一二三区| 成人高清视频在线| 日韩三级免费观看| 亚洲黄色av一区| 久久99精品久久久久久国产越南| 91免费看片在线观看| 日韩午夜在线影院| 一区二区三区中文字幕精品精品| 日韩专区中文字幕一区二区| 国产精品中文有码| 亚洲日本在线视频观看| 中文字幕在线观看不卡| 日本亚洲电影天堂| 成人动漫一区二区| 日韩欧美国产一区二区在线播放| 亚洲精选视频在线| 高清shemale亚洲人妖| 91精品国产乱码久久蜜臀| 亚洲免费在线观看视频| 国产一区二区剧情av在线| 欧美久久久久久蜜桃| 亚洲欧洲99久久| 国产成人在线观看免费网站| 91麻豆精品国产91久久久久久| 日本一区二区免费在线观看视频| 欧美aaaaa成人免费观看视频| 日本国产一区二区| 国产精品美女久久久久久| 美日韩一区二区| 欧美日精品一区视频| 亚洲色图在线看| 99久久久无码国产精品| 国产亚洲综合色| 国产一区二区精品久久91| 欧美成人a∨高清免费观看| 日韩va亚洲va欧美va久久| 欧美色图天堂网| 一区二区三区四区精品在线视频| 国产成人在线观看免费网站| 久久蜜桃香蕉精品一区二区三区| 蜜桃av噜噜一区| 精品国产一区二区精华| 秋霞av亚洲一区二区三| 日韩一区二区麻豆国产| 日本伊人色综合网| 欧美一区二区三区成人| 蜜臀av一区二区三区| 日韩美女一区二区三区| 久久精品国产精品亚洲精品| 欧美一级一区二区|