⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ewtoc.html

📁 Wiley - Applied Cryptography, Protocols, Algorthms, and Source Code in C
💻 HTML
📖 第 1 页 / 共 3 页
字号:
<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471128457/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=0//-->
<!--PAGES=0//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<DL>
<FONT SIZE="4"><B>
<DD><A HREF="index.html">Foreword by Whitfield Diffie</A>
<DD><A HREF="about.html">Preface</A>
<DD><A HREF="about_author.html">About the Author</A>
</B></FONT>
<DL>
<BR><DD><A HREF="ch01/01-01.html#Heading1"><FONT SIZE="4"><B>Chapter 1&#151;Foundations</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch01/01-01.html#Heading2">1.1 Terminology</A>
<DD><A HREF="ch01/01-04.html#Heading3">1.2 Steganography</A>
<DD><A HREF="ch01/01-04.html#Heading4">1.3 Substitution Ciphers and Transposition Ciphers</A>
<DD><A HREF="ch01/01-05.html#Heading5">1.4 Simple XOR</A>
<DD><A HREF="ch01/01-05.html#Heading6">1.5 One-Time Pads</A>
<DD><A HREF="ch01/01-06.html#Heading7">1.6 Computer Algorithms</A>
<DD><A HREF="ch01/01-06.html#Heading8">1.7 Large Numbers</A>
</DL>
</DL>
</B></FONT>
<BR>
<DD><A HREF="ch02/02-01.html"><FONT SIZE="4"><B>Part I&#151;Cryptographic Protocols</B></FONT></A>
<DL>
<DD><A HREF="ch02/02-01.html#Heading1"><FONT SIZE="4"><B>Chapter 2&#151;Protocol Building Blocks</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch02/02-01.html#Heading2">2.1 Introduction to Protocols</A>
<DD><A HREF="ch02/02-03.html#Heading3">2.2 Communications Using Symmetric Cryptography</A>
<DD><A HREF="ch02/02-04.html#Heading4">2.3 One-Way Functions</A>
<DD><A HREF="ch02/02-04.html#Heading5">2.4 One-Way Hash Functions</A>
<DD><A HREF="ch02/02-05.html#Heading6">2.5 Communications Using Public-Key Cryptography</A>
<DD><A HREF="ch02/02-06.html#Heading7">2.6 Digital Signatures</A>
<DD><A HREF="ch02/02-09.html#Heading8">2.7 Digital Signatures with Encryption</A>
<DD><A HREF="ch02/02-10.html#Heading9">2.8 Random and Pseudo-Random-Sequence Generation</A>
</DL>
</B></FONT>
<DD><A HREF="ch03/03-01.html#Heading1"><FONT SIZE="4"><B>Chapter 3&#151;Basic Protocols</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch03/03-01.html#Heading2">3.1 Key Exchange</A>
<DD><A HREF="ch03/03-02.html#Heading3">3.2 Authentication</A>
<DD><A HREF="ch03/03-05.html#Heading4">3.3 Authentication and Key Exchange</A>
<DD><A HREF="ch03/03-08.html#Heading5">3.4 Formal Analysis of Authentication and Key-Exchange Protocols</A>
<DD><A HREF="ch03/03-10.html#Heading6">3.5 Multiple-Key Public-Key Cryptography</A>
<DD><A HREF="ch03/03-11.html#Heading7">3.6 Secret Splitting</A>
<DD><A HREF="ch03/03-11.html#Heading8">3.7 Secret Sharing</A>
<DD><A HREF="ch03/03-13.html#Heading9">3.8 Cryptographic Protection of Databases</A>
</DL>
</B></FONT>
<DD><A HREF="ch04/04-01.html#Heading1"><FONT SIZE="4"><B>Chapter 4&#151;Intermediate Protocols</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch04/04-01.html#Heading2">4.1 Timestamping Services</A>
<DD><A HREF="ch04/04-02.html#Heading3">4.2 Subliminal Channel</A>
<DD><A HREF="ch04/04-03.html#Heading4">4.3 Undeniable Digital Signatures</A>
<DD><A HREF="ch04/04-04.html#Heading5">4.4 Designated Confirmer Signatures</A>
<DD><A HREF="ch04/04-04.html#Heading6">4.5 Proxy Signatures</A>
<DD><A HREF="ch04/04-05.html#Heading7">4.6 Group Signatures</A>
<DD><A HREF="ch04/04-05.html#Heading8">4.7 Fail-Stop Digital Signatures</A>
<DD><A HREF="ch04/04-05.html#Heading9">4.8 Computing with Encrypted Data</A>
<DD><A HREF="ch04/04-05.html#Heading10">4.9 Bit Commitment</A>
<DD><A HREF="ch04/04-07.html#Heading11">4.10 Fair Coin Flips</A>
<DD><A HREF="ch04/04-08.html#Heading12">4.11 Mental Poker</A>
<DD><A HREF="ch04/04-10.html#Heading13">4.12 One-Way Accumulators</A>
<DD><A HREF="ch04/04-10.html#Heading14">4.13 All-or-Nothing Disclosure of Secrets</A>
<DD><A HREF="ch04/04-10.html#Heading15">4.14 Key Escrow</A>
</DL>
</B></FONT>
<DD><A HREF="ch05/05-01.html#Heading1"><FONT SIZE="4"><B>Chapter 5&#151;Advanced Protocols</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch05/05-01.html#Heading2">5.1 Zero-Knowledge Proofs</A>
<DD><A HREF="ch05/05-03.html#Heading3">5.2 Zero-Knowledge Proofs of Identity</A>
<DD><A HREF="ch05/05-05.html#Heading4">5.3 Blind Signatures</A>
<DD><A HREF="ch05/05-06.html#Heading5">5.4 Identity-Based Public-Key Cryptography</A>
<DD><A HREF="ch05/05-06.html#Heading6">5.5 Oblivious Transfer</A>
<DD><A HREF="ch05/05-07.html#Heading7">5.6 Oblivious Signatures</A>
<DD><A HREF="ch05/05-07.html#Heading8">5.7 Simultaneous Contract Signing</A>
<DD><A HREF="ch05/05-09.html#Heading9">5.8 Digital Certified Mail</A>
<DD><A HREF="ch05/05-09.html#Heading10">5.9 Simultaneous Exchange of Secrets</A>
</DL>
</B></FONT>
<DD><A HREF="ch06/06-01.html#Heading1"><FONT SIZE="4"><B>Chapter 6&#151;Esoteric Protocols</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch06/06-01.html#Heading2">6.1 Secure Elections</A>
<DD><A HREF="ch06/06-04.html#Heading3">6.2 Secure Multiparty Computation</A>
<DD><A HREF="ch06/06-06.html#Heading4">6.3 Anonymous Message Broadcast</A>
<DD><A HREF="ch06/06-06.html#Heading5">6.4 Digital Cash</A>
</DL>
</DL>
</DL>
</B></FONT>
<DL>
<DD><A HREF="ch07/07-01.html"><FONT SIZE="4"><B>Part II&#151;Cryptographic Techniques</B></FONT></A>
<DL>
<DD><A HREF="ch07/07-01.html#Heading1"><FONT SIZE="4"><B>Chapter 7&#151;Key Length</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch07/07-01.html#Heading2">7.1 Symmetric Key Length</A>
<DD><A HREF="ch07/07-04.html#Heading3">7.2 Public-Key Key Length</A>
<DD><A HREF="ch07/07-07.html#Heading4">7.3 Comparing Symmetric and Public-Key Key Length</A>
<DD><A HREF="ch07/07-07.html#Heading5">7.4 Birthday Attacks against One-Way Hash Functions</A>
<DD><A HREF="ch07/07-08.html#Heading6">7.5 How Long Should a Key Be?</A>
<DD><A HREF="ch07/07-08.html#Heading7">7.6 Caveat Emptor</A>
</DL>
</DL>
</B></FONT>
<DL>
<DD><A HREF="ch08/08-01.html#Heading1"><FONT SIZE="4"><B>Chapter 8&#151;Key Management</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch08/08-01.html#Heading2">8.1 Generating Keys</A>
<DD><A HREF="ch08/08-03.html#Heading3">8.2 Nonlinear Keyspaces</A>
<DD><A HREF="ch08/08-03.html#Heading4">8.3 Transferring Keys</A>
<DD><A HREF="ch08/08-04.html#Heading5">8.4 Verifying Keys</A>
<DD><A HREF="ch08/08-04.html#Heading6">8.5 Using Keys</A>
<DD><A HREF="ch08/08-05.html#Heading7">8.6 Updating Keys</A>
<DD><A HREF="ch08/08-05.html#Heading8">8.7 Storing Keys</A>
<DD><A HREF="ch08/08-05.html#Heading9">8.8 Backup Keys</A>
<DD><A HREF="ch08/08-06.html#Heading10">8.9 Compromised Keys</A>
<DD><A HREF="ch08/08-06.html#Heading11">8.10 Lifetime of Keys</A>
<DD><A HREF="ch08/08-06.html#Heading12">8.11 Destroying Keys</A>
<DD><A HREF="ch08/08-06.html#Heading13">8.12 Public-Key Key Management</A>
</DL>
</B></FONT>
<DD><A HREF="ch09/09-01.html#Heading1"><FONT SIZE="4"><B>Chapter 9&#151;Algorithm Types and Modes</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch09/09-01.html#Heading2">9.1  Electronic Codebook Mode</A>
<DD><A HREF="ch09/09-01.html#Heading3">9.2  Block Replay</A>
<DD><A HREF="ch09/09-02.html#Heading4">9.3  Cipher Block Chaining Mode</A>
<DD><A HREF="ch09/09-04.html#Heading5">9.4 Stream Ciphers</A>
<DD><A HREF="ch09/09-04.html#Heading6">9.5  Self-Synchronizing Stream Ciphers</A>
<DD><A HREF="ch09/09-04.html#Heading7">9.6  Cipher-Feedback Mode</A>
<DD><A HREF="ch09/09-05.html#Heading8">9.7  Synchronous Stream Ciphers</A>
<DD><A HREF="ch09/09-06.html#Heading9">9.8 Output-Feedback Mode</A>
<DD><A HREF="ch09/09-07.html#Heading10">9.9  Counter Mode</A>
<DD><A HREF="ch09/09-07.html#Heading11">9.10 Other Block-Cipher Modes</A>
<DD><A HREF="ch09/09-08.html#Heading12">9.11  Choosing a Cipher Mode</A>
<DD><A HREF="ch09/09-09.html#Heading13">9.12  Interleaving</A>
<DD><A HREF="ch09/09-09.html#Heading14">9.13  Block Ciphers versus Stream Ciphers</A>
</DL>
</B></FONT>
<DD><A HREF="ch10/10-01.html#Heading1"><FONT SIZE="4"><B>Chapter 10&#151;Using Algorithms</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch10/10-01.html#Heading2">10.1 Choosing an Algorithm</A>
<DD><A HREF="ch10/10-02.html#Heading3">10.2 Public-Key Cryptography versus Symmetric Cryptography</A>
<DD><A HREF="ch10/10-02.html#Heading4">10.3 Encrypting Communications Channels</A>
<DD><A HREF="ch10/10-03.html#Heading5">10.4 Encrypting Data for Storage</A>
<DD><A HREF="ch10/10-04.html#Heading6">10.5 Hardware Encryption versus Software Encryption</A>
<DD><A HREF="ch10/10-06.html#Heading7">10.6 Compression, Encoding, and Encryption</A>
<DD><A HREF="ch10/10-06.html#Heading8">10.7 Detecting Encryption</A>
<DD><A HREF="ch10/10-06.html#Heading9">10.8 Hiding Ciphertext in Ciphertext</A>
<DD><A HREF="ch10/10-07.html#Heading10">10.9 Destroying Information</A>
</DL>
</DL>
</DL>
</B></FONT>
<DL>
<DD><A HREF="ch11/11-01.html"><FONT SIZE="4"><B>Part III&#151;Cryptographic Algorithms</B></FONT></A>
<DL>
<DD><A HREF="ch11/11-01.html#Heading1"><FONT SIZE="4"><B>Chapter 11&#151;Mathematical Background</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch11/11-01.html#Heading2">11.1 Information Theory</A>
<DD><A HREF="ch11/11-02.html#Heading3">11.2 Complexity Theory</A>
<DD><A HREF="ch11/11-05.html#Heading4">11.3 Number Theory</A>
<DD><A HREF="ch11/11-10.html#Heading5">11.4 Factoring</A>
<DD><A HREF="ch11/11-11.html#Heading6">11.5 Prime Number Generation</A>
<DD><A HREF="ch11/11-13.html#Heading7">11.6 Discrete Logarithms in a Finite Field</A>
</DL>
</B></FONT>
<DD><A HREF="ch12/12-01.html#Heading1"><FONT SIZE="4"><B>Chapter 12&#151;Data Encryption Standard (DES)</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch12/12-01.html#Heading2">12.1 Background</A>
<DD><A HREF="ch12/12-03.html#Heading3">12.2 Description of DES</A>
<DD><A HREF="ch12/12-07.html#Heading4">12.3 Security of DES</A>
<DD><A HREF="ch12/12-11.html#Heading5">12.4 Differential and Linear Cryptanalysis</A>
<DD><A HREF="ch12/12-14.html#Heading6">12.5 The Real Design Criteria</A>
<DD><A HREF="ch12/12-14.html#Heading7">12.6 DES Variants</A>
<DD><A HREF="ch12/12-16.html#Heading8">12.7 How Secure Is DES Today?</A>
</DL>
</B></FONT>
<DD><A HREF="ch13/13-01.html#Heading1"><FONT SIZE="4"><B>Chapter 13&#151;Other Block Ciphers</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch13/13-01.html#Heading2">13.1 Lucifer</A>
<DD><A HREF="ch13/13-01.html#Heading3">13.2 Madryga</A>
<DD><A HREF="ch13/13-02.html#Heading4">13.3 NewDES</A>
<DD><A HREF="ch13/13-02.html#Heading5">13.4 FEAL</A>
<DD><A HREF="ch13/13-02.html#Heading6">13.5 REDOC</A>
<DD><A HREF="ch13/13-03.html#Heading7">13.6 LOKI</A>
<DD><A HREF="ch13/13-04.html#Heading8">13.7 Khufu and Khafre</A>
<DD><A HREF="ch13/13-04.html#Heading9">13.8 RC2</A>
<DD><A HREF="ch13/13-05.html#Heading10">13.9 IDEA</A>
<DD><A HREF="ch13/13-07.html#Heading11">13.10 MMB</A>
<DD><A HREF="ch13/13-08.html#Heading12">13.11 CA-1.1</A>
<DD><A HREF="ch13/13-08.html#Heading13">13.12 Skipjack</A>
</DL>
</B></FONT>
<DD><A HREF="ch14/14-01.html#Heading1"><FONT SIZE="4"><B>Chapter 14&#151;Still Other Block Ciphers</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch14/14-01.html#Heading2">14.1 GOST</A>
<DD><A HREF="ch14/14-03.html#Heading3">14.2 CAST</A>
<DD><A HREF="ch14/14-03.html#Heading4">14.3 Blowfish</A>
<DD><A HREF="ch14/14-04.html#Heading5">14.4 SAFER</A>
<DD><A HREF="ch14/14-05.html#Heading6">14.5 3-Way</A>
<DD><A HREF="ch14/14-05.html#Heading7">14.6 Crab</A>
<DD><A HREF="ch14/14-06.html#Heading8">14.7 SXAL8/MBAL</A>
<DD><A HREF="ch14/14-06.html#Heading9">14.8 RC5</A>
<DD><A HREF="ch14/14-07.html#Heading10">14.9 Other Block Algorithms</A>
<DD><A HREF="ch14/14-07.html#Heading11">14.10 Theory of Block Cipher Design</A>
<DD><A HREF="ch14/14-10.html#Heading12">14.11 Using one-Way Hash Functions</A>
<DD><A HREF="ch14/14-11.html#Heading13">14.12 Choosing a Block Algorithm</A>
</DL>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -