⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 12-07.html

📁 Wiley - Applied Cryptography, Protocols, Algorthms, and Source Code in C
💻 HTML
📖 第 1 页 / 共 2 页
字号:
<HTML>
<HEAD>
<META name=vscategory content="Security Programming Languages"><META name=vsisbn content="0471128457"><META name=vstitle content="Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)"><META name=vsauthor content="Bruce Schneier"><META name=vsimprint  content="Wiley Computer Publishing "><META name=vspublisher content="John Wiley & Sons, Inc."><META name=vspubdate content="1/1/96"><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Data Encryption Standard (DES)</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666">	<table width="640" border="0" cellpadding="0" cellspacing="0">		<tr valign="top">		<td><!--  Begin Ads ITKBAN.BOOKS //--><CENTER><A HREF="/adclick.html/CID=000009b933d6f71200000000/site=itknowledge/area=itk.books/aamsz=468x60" TARGET=_top><IMG BORDER=0 SRC="http://adimages.earthweb.com/images/ads/Iaxf-001.gif" ALT="Click Here!" ></A><BR><A HREF="/adclick.html/CID=000009b933d6f71200000000/site=itknowledge/area=itk.books/aamsz=468x60" TARGET=_top>Click Here!</A></CENTER><BR><!-- ITKBAN.BOOKS End Ads //--></td>		<td><!--  Begin Ads ITKBAN //--><CENTER><A HREF="/adclick.html/CID=00000b452954e8a400000000/site=itknowledge/area=itk/aamsz=160x60/position=top" TARGET=_top><IMG BORDER=0 SRC="http://adimages.earthweb.com/images/ads/160x60/compaq_dtm_sponsor.gif" ALT="" ></A><BR><A HREF="/adclick.html/CID=00000b452954e8a400000000/site=itknowledge/area=itk/aamsz=160x60/position=top" TARGET=_top></A></CENTER><BR><!-- ITKBAN End Ads //--></td>		</tr>		<tr><td height="1" colspan="2" bgcolor="#CCCCCC"><img src="/images/white.gif" border=0 alt=""></td></tr>	</TABLE><!-- END HEADER --><!-- BEGIN SUB HEADER -->		<table bgcolor="#FFFFFF" cellpadding="0" cellspacing="0" border="0" width="100%"> 				<!-- ITK LOGO Banner -->		<tr>		<td align="left" valign="top" bgcolor="#FFFFFF"><script>function GetCookie (name){   var arg = name + "=";   var alen = arg.length;   var clen = document.cookie.length;   var i = 0;   while (i < clen)   {      var j = i + alen;      if (document.cookie.substring(i, j) == arg) {         var end = document.cookie.indexOf (";", j);         if (end == -1)            end = document.cookie.length;         return unescape(document.cookie.substring(j, end));      }      i = document.cookie.indexOf(" ", i) + 1;      if (i == 0) break;   }   return null;}var m1='<IMG SRC="';var m2='/images/itk-logo.gif';var m3='" VSPACE="10" WIDTH=434 HEIGHT=58 ALT="ITKnowledge" border="0">';var gifstr=GetCookie("UsrType");if((gifstr!=0 )  && (gifstr!=null)) { m2=gifstr; }document.write(m1+m2+m3);</script></td>	</tr><!-- END of ITK LOGO Banner -->	<!-- ITK TOPNAV -->		<tr>		<td align="left" valign="top" nowrap><a href="/"><img src="/images/home1.gif" width=38 height=37 alt="home" border="0"></a>&nbsp;<a href="/pick-account.html"><img src="/images/accountinfo.gif" width=70 height=37 alt="account info" border="0"></a>&nbsp;<a href="/PSUser/usrreg.htm?AdminAction=InitAdd&Locale=en&URI=/"><img src="/images/subscribe2.gif" width=56 height=37 alt="subscribe" border="0" hspace="6"></a>&nbsp;<a href="/PSUser/psuserauth.htm?cmd=login&URI=/"><img src="/images/login1.gif" width=33 height=37 alt="login" hspace="5" border="0"></a>&nbsp;<a href="/search/"><img src="/images/search1.gif" width=43 height=37 alt="search" border="0" hspace="10"></a>&nbsp;<a href="/faq/faq.html"><img src="/images/faqs1.gif" width=40 height=37 alt="FAQ/help" border="0" hspace="0"></a>&nbsp;<a href="/sitemap.html"><img src="/images/sitemap1.gif" width=46 height=37 alt="site map" border="0" hspace="2"></a>&nbsp;<a href="/contactus.html"><img src="/images/contact1.gif" width=61 height=37 alt="contact us" border="0" hspace="4"></a><br>		<img src="/images/white.gif" width="1" height="5" alt="" border="0"></td>  		</tr></table><!-- END of ITK TOPNAV -->				<!-- begin of ITK left NAV --><!-- BEGIN LEFT NAV -->	<table width=99% border="0" cellpadding="2" cellspacing="0">		<tr>		<td bgcolor="#ffffff" width=120 valign="top" rowspan=8>								<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">			<INPUT TYPE="hidden" NAME="Action" VALUE="Search">			<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">			<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">			<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">														<img src="/images/search5.gif" width=115 height=27 alt="" border="0"><br>			<img src="/images/white.gif" width="1" height="5" alt="" border="0"><br>		<table width="116" height="135"  bgcolor="#e0e0e0" border="1" bordercolor="#006666" cellpadding="3" cellspacing="0">		<tr>		<td width="116"><input type="text" name="metaqueryText" value="" size="8">&nbsp;<input type="submit" name="submitbutton" value="Go!">			<INPUT type="hidden" NAME="section_on" VALUE="on">			<font face="Arial,helvetica" size="1">			<SELECT NAME="metatags" style="font-size: 10; font-family: sans-serif;" size="1">			<option value="keyword" SELECTED>Keyword			<option value="vstitle">Title			<option value="vsauthor">Author			<option value="vsisbn">ISBN			<option value="vspublisher">Publisher			<option value="vsimprint">Imprint			</SELECT></font><br>			<input type="radio" name="ResultTemplate" value="itk-brief.hts" checked style="background-color: #e0e0e0;"><font face="arial, helvetica" color="#006666" size="1">Brief</font>			<input type="radio" name="ResultTemplate" value="itk-full.hts" style="background-color: #e0e0e0;"><font face="arial, helvetica" color="#006666" size="1">Full</font><br>			<font face="arial, helvetica" size="1">			<img src="/images/bullet.gif" width=5 height=5 hspace="5" alt="" border="0">&nbsp;<a href="/search/"><font color="#006666">Advanced</font></a><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a href="/search/"><font color="#006666">Search</font></a><br>			<img src="/images/bullet.gif" width=5 height=5 hspace="5" alt="" border="0">&nbsp;<a href="/search/search-tips.html"><font color="#006666">Search Tips</font></a>			</font></td></tr></table>	</form><!-- BROWSE BY TOPIC -->				<form action="" name="catlist">					<img src="/images/browse5.gif" width=115 height=34 alt="" border="0"><table width="120" height="32" border="1" cellspacing="0" cellpadding="3" bordercolor="#006666" bgcolor="#e0e0e0">				<tr>				<td width="117" align="center">			<font face="Arial,helvetica" size="1">			<SELECT NAME="cat" onChange='top.location.href=this.options[selectedIndex].value;' style="font-size: 10; font-family: sans-serif;">			<option value="" selected>Please Select			<option value="">-----------			<option value="/reference/dir.components.html">Components			<option value="/reference/dir.contentmanagement.html">Content Mgt			<option value="/reference/dir.certification1.html">Certification			<option value="/reference/dir.databases.html">Databases			<option value="/reference/dir.enterprisemanagement1.html">Enterprise Mgt			<option value="/reference/dir.funandgames1.html">Fun/Games			<option value="/reference/dir.groupwareandcollaboration1.html">Groupware			<option value="/reference/dir.hardware1.html">Hardware			<option value="/reference/dir.intranetandextranetdevelopment1.html">Intranet Dev			<option value="/reference/dir.middleware.html">Middleware			<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia			<option value="/reference/dir.networkservices1.html">Networks 			<option value="/reference/dir.operatingsystems.html">OS			<option value="/reference/dir.productivityapplications1.html">Prod Apps			<option value="/reference/dir.programminglanguages.html">Programming			<option value="/reference/dir.security1.html">Security				<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->			<option value="/reference/dir.userinterfaces.html">UI			<option value="/reference/dir.webservices.html">Web Services			<option value="/reference/dir.webmasterskills1.html">Webmaster			<option value="/reference/dir.y2k1.html">Y2K			<option value="">-----------			<option value="/reference/whatsnew.html">New Titles			<option value="">-----------			<option value="/reference/dir.archive1.html">Free Archive					</SELECT>			</font></td>	</tr>	</table>	</form><!-- LEFT NAV SEARCH END -->		</td>		<!-- PUB PARTNERS END --><!-- END LEFT NAV --><td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td><td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td><!-- end of ITK left NAV --><!-- begin main content --><td width="100%" valign="top" align="left"><!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471128457/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=12//-->
<!--PAGES=278-280//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="12-06.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="12-08.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">12.3 Security of DES</FONT></H3>
<P>People have long questioned the security of DES [458]. There has been much speculation on the key length, number of iterations, and design of the S-boxes. The S-boxes were particularly mysterious&#151;all those constants, without any apparent reason as to why or what they&#146;re for. Although IBM claimed that the inner workings were the result of 17 man-years of intensive cryptanalysis some people feared that the NSA embedded a trapdoor into the algorithm so they would have an easy means of decrypting messages.
</P>
<P>The U.S. Senate Select Committee on Intelligence, with full top-secret clearances, investigated the matter in 1978. The findings of the committee are classified, but an unclassified summary of those findings exonerated the NSA from any improper involvement in the algorithm&#146;s design [1552]. &#147;It was said to have convinced IBM that a shorter key was adequate, to have indirectly assisted in the development of the S-box structures and to have certified that the final DES algorithm was, to the best of their knowledge, free of any statistical or mathematical weaknesses&#148; [435]. However, since the government never made the details of the investigation public, many people remained unconvinced.</P>
<P>Tuchman and Meyer, two of the IBM cryptographers who designed DES, said the NSA did not alter the design [841]:</P>
<BLOCKQUOTE><P>Their basic approach was to look for strong substitution, permutation, and key scheduling functions.... IBM has classified the notes containing the selection criteria at the request of the NSA.... &#147;The NSA told us we had inadvertently reinvented some of the deep secrets it uses to make its own algorithms,&#148; explains Tuchman.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -