亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 02-02.html

?? 應(yīng)用密碼學(xué)電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Protocol Building Blocks</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=02//-->
<!--PAGES=023-026//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="02-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>In the real world, lawyers are often used as arbitrators. For example, Alice is selling a car to Bob, a stranger. Bob wants to pay by check, but Alice has no way of knowing if the check is good. Alice wants the check to clear before she turns the title over to Bob. Bob, who doesn&#146;t trust Alice any more than she trusts him, doesn&#146;t want to hand over a check without receiving a title.
</P>
<TABLE WIDTH="100%"><TR>
<TH CAPTION ALIGN="CENTER" COLSPAN="2">TABLE 2.1<BR>Dramatis Personae
<TR>
<TH COLSPAN="2"><HR>
<TR>
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="20%">Alice
<TD VALIGN="TOP" ALIGN="LEFT" WIDTH="80%">First participant in all the protocols
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Bob
<TD VALIGN="TOP" ALIGN="LEFT">Second participant in all the protocols
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Carol
<TD VALIGN="TOP" ALIGN="LEFT">Participant in the three- and four-party protocols
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Dave
<TD VALIGN="TOP" ALIGN="LEFT">Participant in the four-party protocols
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Eve
<TD VALIGN="TOP" ALIGN="LEFT">Eavesdropper
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Mallory
<TD VALIGN="TOP" ALIGN="LEFT">Malicious active attacker
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Trent
<TD VALIGN="TOP" ALIGN="LEFT">Trusted arbitrator
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Walter
<TD VALIGN="TOP" ALIGN="LEFT">Warden; he&#146;ll be guarding Alice and Bob in some protocols
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Peggy
<TD VALIGN="TOP" ALIGN="LEFT">Prover
<TR>
<TD VALIGN="TOP" ALIGN="LEFT">Victor
<TD VALIGN="TOP" ALIGN="LEFT">Verifier
<TR>
<TH COLSPAN="2"><HR>
<TR>
</TABLE>
<I><P><A NAME="Fig1"></A><A HREF="javascript:displayWindow('images/02-01.jpg',263,265 )"><IMG SRC="images/02-01t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/02-01.jpg',263,265)"><FONT COLOR="#000077"><B>Figure 2.1</B></FONT></A>&nbsp;&nbsp;Types of protocols.</I>
</P>
<P>Enter a lawyer trusted by both. With his help, Alice and Bob can use the following protocol to ensure that neither cheats the other:
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice gives the title to the lawyer.
<DD><B>(2)</B>&nbsp;&nbsp;Bob gives the check to Alice.
<DD><B>(3)</B>&nbsp;&nbsp;Alice deposits the check.
<DD><B>(4)</B>&nbsp;&nbsp;After waiting a specified time period for the check to clear, the lawyer gives the title to Bob. If the check does not clear within the specified time period, Alice shows proof of this to the lawyer and the lawyer returns the title to Alice.
</DL>
<P>In this protocol, Alice trusts the lawyer not to give Bob the title unless the check has cleared, and to give it back to her if the check does not clear. Bob trusts the lawyer to hold the title until the check clears, and to give it to him once it does. The lawyer doesn&#146;t care if the check clears. He will do his part of the protocol in either case, because he will be paid in either case.
</P>
<P>In the example, the lawyer is playing the part of an escrow agent. Lawyers also act as arbitrators for wills and sometimes for contract negotiations. The various stock exchanges act as arbitrators between buyers and sellers.</P>
<P>Bankers also arbitrate protocols. Bob can use a certified check to buy a car from Alice:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Bob writes a check and gives it to the bank.
<DD><B>(2)</B>&nbsp;&nbsp;After putting enough of Bob&#146;s money on hold to cover the check, the bank certifies the check and gives it back to Bob.
<DD><B>(3)</B>&nbsp;&nbsp;Alice gives the title to Bob and Bob gives the certified check to Alice.
<DD><B>(4)</B>&nbsp;&nbsp;Alice deposits the check.
</DL>
<P>This protocol works because Alice trusts the banker&#146;s certification. Alice trusts the bank to hold Bob&#146;s money for her, and not to use it to finance shaky real estate operations in mosquito-infested countries.
</P>
<P>A notary public is another arbitrator. When Bob receives a notarized document from Alice, he is convinced that Alice signed the document voluntarily and with her own hand. The notary can, if necessary, stand up in court and attest to that fact.</P>
<P>The concept of an arbitrator is as old as society. There have always been people&#151;rulers, priests, and so on&#151;who have the authority to act fairly. Arbitrators have a certain social role and position in our society; betraying the public trust would jeopardize that. Lawyers who play games with escrow accounts face almost-certain disbarment, for example. This picture of trust doesn&#146;t always exist in the real world, but it&#146;s the ideal.</P>
<P>This ideal can translate to the computer world, but there are several problems with computer arbitrators:</P>
<DL>
<DD>&#151; It is easier to find and trust a neutral third party if you know who the party is and can see his face. Two parties suspicious of each other are also likely to be suspicious of a faceless arbitrator somewhere else on the network.
<DD>&#151; The computer network must bear the cost of maintaining an arbitrator. We all know what lawyers charge; who wants to bear that kind of network overhead?
<DD>&#151; There is a delay inherent in any arbitrated protocol.
<DD>&#151; The arbitrator must deal with every transaction; he is a bottleneck in large-scale implementations of any protocol. Increasing the number of arbitrators in the implementation can mitigate this problem, but that increases the cost.
<DD>&#151; Since everyone on the network must trust the arbitrator, he represents a vulnerable point for anyone trying to subvert the network.
</DL>
<P>Even so, arbitrators still have a role to play. In protocols using a trusted arbitrator, the part will be played by Trent.
</P>
<P><FONT SIZE="+1"><B><I>Adjudicated Protocols</I></B></FONT></P>
<P>Because of the high cost of hiring arbitrators, arbitrated protocols can be subdivided into two lower-level <B>subprotocols</B>. One is a nonarbitrated subprotocol, executed every time parties want to complete the protocol. The other is an arbitrated subprotocol, executed only in exceptional circumstances&#151;when there is a dispute. This special type of arbitrator is called an <B>adjudicator</B> (see Figure 2.1b).</P>
<P>An adjudicator is also a disinterested and trusted third party. Unlike an arbitrator, he is not directly involved in every protocol. The adjudicator is called in only to determine whether a protocol was performed fairly.</P>
<P>Judges are professional adjudicators. Unlike a notary public, a judge is brought in only if there is a dispute. Alice and Bob can enter into a contract without a judge. A judge never sees the contract until one of them hauls the other into court.</P>
<P>This contract-signing protocol can be formalized in this way:</P>
<P>Nonarbitrated subprotocol (executed every time):</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice and Bob negotiate the terms of the contract.
<DD><B>(2)</B>&nbsp;&nbsp;Alice signs the contract.
<DD><B>(3)</B>&nbsp;&nbsp;Bob signs the contract.
</DL>
<P>Adjudicated subprotocol (executed only in case of a dispute):
</P>
<DL>
<DD><B>(4)</B>&nbsp;&nbsp;Alice and Bob appear before a judge.
<DD><B>(5)</B>&nbsp;&nbsp;Alice presents her evidence.
<DD><B>(6)</B>&nbsp;&nbsp;Bob presents his evidence.
<DD><B>(7)</B>&nbsp;&nbsp;The judge rules on the evidence.
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="02-01.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-03.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品一区二区三区四区| 精品国产自在久精品国产| 国产一区二区久久| 美女在线一区二区| 久久黄色级2电影| 日本成人在线看| 美女诱惑一区二区| 国产麻豆日韩欧美久久| 国产黄色91视频| 成人午夜激情片| 91在线小视频| 精品视频999| 欧美精品精品一区| 精品粉嫩aⅴ一区二区三区四区| 欧美刺激脚交jootjob| 欧美xxxx在线观看| 国产女同性恋一区二区| 综合网在线视频| 香蕉影视欧美成人| 国产一区二区成人久久免费影院| 国产一区在线不卡| 91网站最新地址| 欧美三级电影精品| 精品国产一区二区国模嫣然| 国产亚洲午夜高清国产拍精品| 国产欧美日韩精品在线| 一区二区在线看| 美女一区二区三区| 99久久精品国产一区二区三区| 欧美优质美女网站| 久久精品亚洲国产奇米99| 亚洲国产激情av| 一区二区三区欧美| 韩国欧美国产一区| 色婷婷综合久久久中文一区二区| 欧美挠脚心视频网站| 国产视频一区二区三区在线观看| 亚洲欧美一区二区久久| 免费成人在线视频观看| 91年精品国产| 欧美精品一区二区三区蜜桃| 亚洲美女在线一区| 国产成人丝袜美腿| 欧美狂野另类xxxxoooo| 国产午夜精品一区二区| 日本大胆欧美人术艺术动态| 91丨porny丨蝌蚪视频| 精品国产免费久久| 午夜久久久影院| eeuss鲁片一区二区三区在线观看| 欧美精品欧美精品系列| 亚洲欧美欧美一区二区三区| 极品少妇xxxx精品少妇| 欧美区一区二区三区| 亚洲精品久久久久久国产精华液 | 国产乱子伦视频一区二区三区| 99九九99九九九视频精品| 日韩精品资源二区在线| 狠狠网亚洲精品| 欧美日韩在线播放三区| 亚洲另类春色国产| 一本久久综合亚洲鲁鲁五月天 | 久久99蜜桃精品| 欧美日韩久久一区二区| 亚洲香肠在线观看| 欧美中文字幕一区| 亚洲精品成人悠悠色影视| 成人av电影在线观看| 国产视频不卡一区| 国产成人在线观看| 日本一区二区综合亚洲| 国产乱一区二区| 国产色婷婷亚洲99精品小说| 国产一区二区三区在线观看精品 | 亚洲一级不卡视频| 91福利国产精品| 一区二区三区精品久久久| 99视频在线观看一区三区| 中文一区一区三区高中清不卡| 国产福利视频一区二区三区| 久久久av毛片精品| 国产成人无遮挡在线视频| 中文字幕成人网| 成人精品高清在线| 亚洲美女淫视频| 欧美色区777第一页| 三级在线观看一区二区| 69堂精品视频| 狠狠色丁香婷综合久久| 国产精品久久久久婷婷| 91在线观看视频| 一区二区三区四区在线| 9191国产精品| 国产精一品亚洲二区在线视频| 国产精品网站一区| 精品视频123区在线观看| 日本91福利区| 久久综合久久99| 91色综合久久久久婷婷| 午夜私人影院久久久久| 精品乱人伦小说| 成人av在线影院| 亚洲国产aⅴ成人精品无吗| 欧美一区二区福利视频| 国产不卡一区视频| 亚洲最色的网站| 欧美本精品男人aⅴ天堂| 99久久精品国产麻豆演员表| 亚洲va韩国va欧美va精品| 久久久亚洲欧洲日产国码αv| aaa欧美色吧激情视频| 偷偷要91色婷婷| 国产三级一区二区| 欧美日韩亚洲另类| 国产精品123| 国产风韵犹存在线视精品| 一区二区三区不卡视频在线观看| 日韩色视频在线观看| 成人av在线资源| 久久国产三级精品| 亚洲一区二区3| 欧美国产激情一区二区三区蜜月| 欧美日韩中文一区| av在线不卡免费看| 看片的网站亚洲| 性欧美疯狂xxxxbbbb| 国产精品日韩精品欧美在线| 欧美一区二区三区四区高清| 一本色道亚洲精品aⅴ| 国产一区二区在线看| 婷婷久久综合九色综合伊人色| 国产欧美日韩视频一区二区| 91精品国产麻豆| 在线观看一区二区精品视频| 国产美女视频一区| 麻豆一区二区99久久久久| 亚洲18女电影在线观看| 亚洲精品少妇30p| 国产视频亚洲色图| 精品国产乱码久久久久久久 | 日日夜夜精品视频天天综合网| 国产精品福利在线播放| 2023国产精品| 7777精品伊人久久久大香线蕉| 91福利小视频| 97精品国产露脸对白| 成人av网站在线观看| 国产精品99久久久久久久女警| 免费欧美在线视频| 免费成人在线视频观看| 奇米精品一区二区三区四区| 婷婷六月综合亚洲| 日韩国产一区二| 久久国产精品99精品国产| 美女脱光内衣内裤视频久久网站| 免费成人在线影院| 韩国女主播一区| 国产成人av一区二区三区在线| 国产精品亚洲人在线观看| 国产一级精品在线| 成人av中文字幕| 91在线观看美女| 欧美视频自拍偷拍| 欧美日韩国产另类不卡| 日韩精品中文字幕在线不卡尤物 | 成人激情视频网站| 成人午夜视频在线| 91丨九色丨国产丨porny| 色呦呦网站一区| 欧美日韩一区在线| 日韩一区二区三区观看| 久久伊99综合婷婷久久伊| 国产偷国产偷亚洲高清人白洁| 亚洲国产精品黑人久久久| 成人欧美一区二区三区小说| 亚洲午夜精品17c| 免费看黄色91| 国产成人aaaa| 欧美三级日本三级少妇99| 日韩欧美成人一区二区| 欧美国产精品中文字幕| 亚洲国产精品一区二区尤物区| 欧美bbbbb| 亚洲欧美另类小说| 成人app网站| 热久久国产精品| 国产高清不卡一区| 欧美视频一区在线| 日韩欧美高清dvd碟片| 久久久久97国产精华液好用吗| 中文字幕一区在线观看视频| 精品一区二区三区免费毛片爱| 欧美午夜片在线看| 亚洲一区免费视频| 日本精品免费观看高清观看| 国产精品国产三级国产普通话99 | 日本91福利区| 亚洲欧洲精品一区二区三区不卡| 免费成人在线观看| 日韩视频在线你懂得|