亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 02-03.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Protocol Building Blocks</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=02//-->
<!--PAGES=026-028//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="02-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>The difference between an adjudicator and an arbitrator (as used in this book) is that the adjudicator is not always necessary. In a dispute, a judge is called in to adjudicate. If there is no dispute, using a judge is unnecessary.
</P>
<P>There are adjudicated computer protocols. These protocols rely on the parties to be honest; but if someone suspects cheating, a body of data exists so that a trusted third party could determine if someone cheated. In a good adjudicated protocol, the adjudicator could also determine the cheater&#146;s identity. Instead of preventing cheating, adjudicated protocols detect cheating. The inevitability of detection acts as a preventive and discourages cheating.</P>
<P><FONT SIZE="+1"><B><I>Self-Enforcing Protocols</I></B></FONT></P>
<P>A <B>self-enforcing protocol</B> is the best type of protocol. The protocol itself guarantees fairness (see Figure 2.1c). No arbitrator is required to complete the protocol. No adjudicator is required to resolve disputes. The protocol is constructed so that there cannot be any disputes. If one of the parties tries to cheat, the other party immediately detects the cheating and the protocol stops. Whatever the cheating party hoped would happen by cheating, doesn&#146;t happen.</P>
<P>In the best of all possible worlds, every protocol would be self-enforcing. Unfortunately, there is not a self-enforcing protocol for every situation.</P>
<P><FONT SIZE="+1"><B><I>Attacks against Protocols</I></B></FONT></P>
<P>Cryptographic attacks can be directed against the cryptographic algorithms used in protocols, against the cryptographic techniques used to implement the algorithms and protocols, or against the protocols themselves. Since this section of the book discusses protocols, I will assume that the cryptographic algorithms and techniques are secure. I will only examine attacks against the protocols.
</P>
<P>People can try various ways to attack a protocol. Someone not involved in the protocol can eavesdrop on some or all of the protocol. This is called a <B>passive attack</B>, because the attacker does not affect the protocol. All he can do is observe the protocol and attempt to gain information. This kind of attack corresponds to a ciphertext-only attack, as discussed in Section 1.1. Since passive attacks are difficult to detect, protocols try to prevent passive attacks rather than detect them. In these protocols, the part of the eavesdropper will be played by Eve.</P>
<P>Alternatively, an attacker could try to alter the protocol to his own advantage. He could pretend to be someone else, introduce new messages in the protocol, delete existing messages, substitute one message for another, replay old messages, interrupt a communications channel, or alter stored information in a computer. These are called <B>active attacks</B>, because they require active intervention. The form of these attacks depends on the network.</P>
<P>Passive attackers try to gain information about the parties involved in the protocol. They collect messages passing among various parties and attempt to cryptanalyze them. Active attacks, on the other hand, can have much more diverse objectives. The attacker could be interested in obtaining information, degrading system performance, corrupting existing information, or gaining unauthorized access to resources.</P>
<P>Active attacks are much more serious, especially in protocols in which the different parties don&#146;t necessarily trust one another. The attacker does not have to be a complete outsider. He could be a legitimate system user. He could be the system administrator. There could even be many active attackers working together. Here, the part of the malicious active attacker will be played by Mallory.</P>
<P>It is also possible that the attacker could be one of the parties involved in the protocol. He may lie during the protocol or not follow the protocol at all. This type of attacker is called a <B>cheater</B>. <B>Passive cheaters</B> follow the protocol, but try to obtain more information than the protocol intends them to. <B>Active cheaters</B> disrupt the protocol in progress in an attempt to cheat.</P>
<P>It is very difficult to maintain a protocol&#146;s security if most of the parties involved are active cheaters, but sometimes it is possible for legitimate parties to detect that active cheating is going on. Certainly, protocols should be secure against passive cheating.</P>
<H3><A NAME="Heading3"></A><FONT COLOR="#000077">2.2 Communications Using Symmetric Cryptography</FONT></H3>
<P>How do two parties communicate securely? They encrypt their communications, of course. The complete protocol is more complicated than that. Let&#146;s look at what must happen for Alice to send an encrypted message to Bob.
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice and Bob agree on a cryptosystem.
<DD><B>(2)</B>&nbsp;&nbsp;Alice and Bob agree on a key.
<DD><B>(3)</B>&nbsp;&nbsp;Alice takes her plaintext message and encrypts it using the encryption algorithm and the key. This creates a ciphertext message.
<DD><B>(4)</B>&nbsp;&nbsp;Alice sends the ciphertext message to Bob.
<DD><B>(5)</B>&nbsp;&nbsp;Bob decrypts the ciphertext message with the same algorithm and key and reads it.
</DL>
<P>What can Eve, sitting between Alice and Bob, learn from listening in on this protocol? If all she hears is the transmission in step (4), she must try to cryptanalyze the ciphertext. This passive attack is a ciphertext-only attack; we have algorithms that are resistant (as far as we know) to whatever computing power Eve could realistically bring to bear on the problem.
</P>
<P>Eve isn&#146;t stupid, though. She also wants to listen in on steps (1) and (2). Then, she would know the algorithm and the key&#151;just as well as Bob. When the message comes across the communications channel in step (4), all she has to do is decrypt it herself.</P>
<P>A good cryptosystem is one in which all the security is inherent in knowledge of the key and none is inherent in knowledge of the algorithm. This is why key management is so important in cryptography. With a symmetric algorithm, Alice and Bob can perform step (1) in public, but they must perform step (2) in secret. The key must remain secret before, during, and after the protocol&#151;as long as the message must remain secret&#151;otherwise the message will no longer be secure. (Public-key cryptography solves this problem another way, and will be discussed in Section 2.5.)</P>
<P>Mallory, an active attacker, could do a few other things. He could attempt to break the communications path in step (4), ensuring that Alice could not talk to Bob at all. Mallory could also intercept Alice&#146;s messages and substitute his own. If he knew the key (by intercepting the communication in step (2), or by breaking the cryptosystem), he could encrypt his own message and send it to Bob in place of the intercepted message. Bob would have no way of knowing that the message had not come from Alice. If Mallory didn&#146;t know the key, he could only create a replacement message that would decrypt to gibberish. Bob, thinking the message came from Alice, might conclude that either the network or Alice had some serious problems.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="02-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="02-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91麻豆免费观看| 99久久婷婷国产| 中文字幕一区二区三区不卡| 91精品欧美综合在线观看最新| 国产精品香蕉一区二区三区| 图片区日韩欧美亚洲| 中文字幕在线不卡| 精品成人佐山爱一区二区| 欧美揉bbbbb揉bbbbb| av一区二区三区| 国产精品夜夜爽| 蜜臀va亚洲va欧美va天堂| 日韩一区欧美一区| 久久久久国色av免费看影院| 91精品国产综合久久蜜臀| 色综合天天视频在线观看| 国产精品一二三区| 国产一区二区成人久久免费影院| 天天综合网 天天综合色| 亚洲精品国产一区二区精华液| 久久久国产精品午夜一区ai换脸| 日韩欧美另类在线| 欧美人与性动xxxx| 欧亚一区二区三区| 一本一道久久a久久精品| 91亚洲永久精品| 成人av影视在线观看| 粉嫩蜜臀av国产精品网站| 韩国女主播成人在线观看| 男人的j进女人的j一区| 三级在线观看一区二区| 香蕉加勒比综合久久 | 亚洲欧美日韩国产另类专区| 国产清纯白嫩初高生在线观看91| 欧美成人在线直播| 日韩精品中文字幕在线一区| 日韩女同互慰一区二区| 日韩一区二区三区高清免费看看| 欧美视频一区二区三区四区| 欧美亚洲一区三区| 在线观看欧美黄色| 欧美日韩在线一区二区| 欧美色窝79yyyycom| 欧美日韩亚洲不卡| 911精品国产一区二区在线| 欧美日韩和欧美的一区二区| 欧美视频在线播放| 91精品免费观看| 日韩欧美在线一区二区三区| 日韩午夜小视频| 精品国内二区三区| xf在线a精品一区二区视频网站| 精品免费视频.| 日本一区二区三区dvd视频在线| 欧美激情中文不卡| 亚洲欧美视频一区| 亚洲一区二区三区中文字幕在线| 亚洲第四色夜色| 免费观看在线综合色| 久久电影国产免费久久电影| 国产精品乡下勾搭老头1| av电影一区二区| 欧美色男人天堂| 日韩午夜电影在线观看| 久久久久久久国产精品影院| 国产精品成人免费在线| 亚洲午夜在线电影| 久久国产精品无码网站| 波多野洁衣一区| 欧美日韩在线播| 欧美本精品男人aⅴ天堂| 国产亚洲欧美在线| 有码一区二区三区| 天天av天天翘天天综合网色鬼国产| 天涯成人国产亚洲精品一区av| 久久99精品久久久久久国产越南 | 亚洲特黄一级片| 亚洲自拍欧美精品| 国产一区二区三区日韩| 色综合久久久久| xvideos.蜜桃一区二区| 一区二区三区免费观看| 国产综合色视频| 91激情五月电影| 精品成人一区二区| 亚洲影院免费观看| 国内精品免费**视频| 色综合一个色综合| 日韩理论电影院| 蜜臀精品一区二区三区在线观看| www.在线成人| 欧美大片一区二区| 亚洲精品视频在线| 国产一区二区在线视频| 欧美理论在线播放| 欧美国产成人精品| 美女一区二区三区| 91丨九色丨尤物| 久久这里只有精品视频网| 亚洲一区日韩精品中文字幕| 国产成人综合亚洲网站| 91精品国产欧美一区二区18 | 免费av网站大全久久| 91在线免费视频观看| 欧美成人乱码一区二区三区| 亚洲一区二区三区中文字幕| 成人免费毛片高清视频| 欧美v日韩v国产v| 首页国产欧美日韩丝袜| 91一区二区三区在线观看| 久久久久久久国产精品影院| 蜜臀av一区二区在线免费观看| 色就色 综合激情| 中文字幕在线观看一区二区| 国产剧情av麻豆香蕉精品| 欧美一区二区视频观看视频| 亚洲欧美福利一区二区| 福利91精品一区二区三区| 欧美成人一区二区三区片免费| 亚洲图片自拍偷拍| 一本色道久久综合亚洲精品按摩| 欧美国产一区在线| 懂色av一区二区在线播放| 26uuuu精品一区二区| 精品一区二区免费| 欧美一区二区三区免费在线看 | 久久精品日产第一区二区三区高清版 | 美日韩黄色大片| 6080国产精品一区二区| 午夜欧美在线一二页| 欧美日本一道本| 日韩电影网1区2区| 日韩一级完整毛片| 毛片av中文字幕一区二区| 日韩欧美国产成人一区二区| 蜜桃传媒麻豆第一区在线观看| 欧美精品成人一区二区三区四区| 天堂va蜜桃一区二区三区漫画版| 欧美日韩一区三区| 日韩精品成人一区二区在线| 6080亚洲精品一区二区| 精品伊人久久久久7777人| 精品国产123| 国产精品99久久久久久宅男| 久久久噜噜噜久噜久久综合| 国产成人在线观看| 亚洲欧美在线观看| 欧美日韩综合色| 毛片一区二区三区| 国产欧美日韩激情| 91女厕偷拍女厕偷拍高清| 亚洲色大成网站www久久九九| 色婷婷综合久久久久中文| 亚洲成人www| 精品精品国产高清a毛片牛牛| 国产精品白丝jk白祙喷水网站| 国产精品高清亚洲| 欧美性视频一区二区三区| 日本在线不卡视频| 久久久精品黄色| 9色porny自拍视频一区二区| 一区二区三区日韩在线观看| 这里只有精品视频在线观看| 激情五月婷婷综合网| 中文字幕一区二区三中文字幕| 色狠狠av一区二区三区| 麻豆精品视频在线| 国产精品免费视频网站| 在线不卡的av| 成人一级片网址| 午夜久久久久久| 久久精品人人爽人人爽| 在线观看亚洲精品| 狠狠久久亚洲欧美| 亚洲精品视频在线观看网站| 日韩视频123| 91女神在线视频| 狠狠网亚洲精品| 一区二区三区中文免费| 亚洲精品一区二区三区精华液| a4yy欧美一区二区三区| 久久国产欧美日韩精品| 亚洲日本在线观看| 精品久久国产字幕高潮| 在线观看成人小视频| 国产一区久久久| 亚洲第一av色| 中文字幕一区二区5566日韩| 91精品国产综合久久久蜜臀粉嫩 | 麻豆精品一二三| 亚洲裸体xxx| 久久综合色8888| 欧美美女激情18p| 99麻豆久久久国产精品免费| 日本视频中文字幕一区二区三区| 日本一区二区久久| 日韩美女视频一区二区在线观看| 在线亚洲精品福利网址导航| 国产精品69久久久久水密桃| 亚洲mv在线观看|