📄 ewtoc.html
字号:
</B></FONT>
<DD><A HREF="ch15/15-01.html#Heading1"><FONT SIZE="4"><B>Chapter 15—Combining Block Ciphers</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch15/15-01.html#Heading2">15.1 Double Encryption</A>
<DD><A HREF="ch15/15-01.html#Heading3">15.2 Triple Encryption</A>
<DD><A HREF="ch15/15-03.html#Heading4">15.3 Doubling the Block Length</A>
<DD><A HREF="ch15/15-04.html#Heading5">15.4 Other Multiple Encryption Schemes</A>
<DD><A HREF="ch15/15-05.html#Heading6">15.5 CDMF Key Shortening</A>
<DD><A HREF="ch15/15-05.html#Heading7">15.6 Whitening</A>
<DD><A HREF="ch15/15-05.html#Heading8">15.7 Cascading Multiple Block Algorithms</A>
<DD><A HREF="ch15/15-05.html#Heading9">15.8 Combining Multiple Block Algorithms</A>
</DL>
</B></FONT>
<DD><A HREF="ch16/16-01.html#Heading1"><FONT SIZE="4"><B>Chapter 16—Pseudo-Random-Sequence Generators and Stream Ciphers</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch16/16-01.html#Heading2">16.1 Linear Congruential Generators</A>
<DD><A HREF="ch16/16-02.html#Heading3">16.2 Linear Feedback Shift Registers</A>
<DD><A HREF="ch16/16-04.html#Heading4">16.3 Design and Analysis of Stream Ciphers</A>
<DD><A HREF="ch16/16-05.html#Heading5">16.4 Stream Ciphers Using LFSRs</A>
<DD><A HREF="ch16/16-07.html#Heading6">16.5 A5</A>
<DD><A HREF="ch16/16-07.html#Heading7">16.6 Hughes XPD/KPD</A>
<DD><A HREF="ch16/16-07.html#Heading8">16.7 Nanoteq</A>
<DD><A HREF="ch16/16-08.html#Heading9">16.8 Rambutan</A>
<DD><A HREF="ch16/16-08.html#Heading10">16.9 Additive Generators</A>
<DD><A HREF="ch16/16-09.html#Heading11">16.10 Gifford</A>
<DD><A HREF="ch16/16-09.html#Heading12">16.11 Algorithm M</A>
<DD><A HREF="ch16/16-09.html#Heading13">16.12 PKZIP</A>
</DL>
</B></FONT>
<DD><A HREF="ch17/17-01.html#Heading1"><FONT SIZE="4"><B>Chapter 17—Other Stream Ciphers and Real Random-Sequence Generators</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch17/17-01.html#Heading2">17.1 RC4</A>
<DD><A HREF="ch17/17-01.html#Heading3">17.2 SEAL</A>
<DD><A HREF="ch17/17-02.html#Heading4">17.3 WAKE</A>
<DD><A HREF="ch17/17-02.html#Heading5">17.4 Feedback with Carry Shift Registers</A>
<DD><A HREF="ch17/17-03.html#Heading6">17.5 Stream Ciphers Using FCSRs</A>
<DD><A HREF="ch17/17-06.html#Heading7">17.6 Nonlinear-Feedback Shift Registers</A>
<DD><A HREF="ch17/17-06.html#Heading8">17.7 Other Stream Ciphers</A>
<DD><A HREF="ch17/17-07.html#Heading9">17.8 System-Theoretic Approach to Stream-Cipher Design</A>
<DD><A HREF="ch17/17-07.html#Heading10">17.9 Complexity-Theoretic Approach to Stream-Cipher Design</A>
<DD><A HREF="ch17/17-08.html#Heading11">17.10 Other Approaches to Stream-Cipher Design</A>
<DD><A HREF="ch17/17-08.html#Heading12">17.11 Cascading Multiple Stream Ciphers</A>
<DD><A HREF="ch17/17-09.html#Heading13">17.12 Choosing a Stream Cipher</A>
<DD><A HREF="ch17/17-09.html#Heading14">17.13 Generating Multiple Streams from a Single Pseudo-Random-Sequence Generator</A>
<DD><A HREF="ch17/17-09.html#Heading15">17.14 Real Random-Sequence Generators</A>
</DL>
</B></FONT>
<DD><A HREF="ch18/18-01.html#Heading1"><FONT SIZE="4"><B>Chapter 18—One-Way Hash Functions</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch18/18-01.html#Heading2">18.1 Background</A>
<DD><A HREF="ch18/18-01.html#Heading3">18.2 Snefru</A>
<DD><A HREF="ch18/18-02.html#Heading4">18.3 N- Hash</A>
<DD><A HREF="ch18/18-02.html#Heading5">18.4 MD4</A>
<DD><A HREF="ch18/18-02.html#Heading6">18.5 MD5</A>
<DD><A HREF="ch18/18-03.html#Heading7">18.6 MD2</A>
<DD><A HREF="ch18/18-04.html#Heading8">18.7 Secure Hash Algorithm (SHA)</A>
<DD><A HREF="ch18/18-05.html#Heading9">18.8 RIPE-MD</A>
<DD><A HREF="ch18/18-05.html#Heading10">18.9 HAVAL</A>
<DD><A HREF="ch18/18-05.html#Heading11">18.10 Other One-Way Hash Functions</A>
<DD><A HREF="ch18/18-05.html#Heading12">18.11 One-Way Hash Functions Using Symmetric Block Algorithms</A>
<DD><A HREF="ch18/18-08.html#Heading13">18.12 Using Public-Key Algorithms</A>
<DD><A HREF="ch18/18-08.html#Heading14">18.13 Choosing a One-Way Hash Function</A>
<DD><A HREF="ch18/18-08.html#Heading15">18.14 Message Authentication Codes</A>
</DL>
</B></FONT>
<DD><A HREF="ch19/19-01.html#Heading1"><FONT SIZE="4"><B>Chapter 19—Public-Key Algorithms</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch19/19-01.html#Heading2">19.1 Background</A>
<DD><A HREF="ch19/19-01.html#Heading3">19.2 Knapsack Algorithms</A>
<DD><A HREF="ch19/19-03.html#Heading4">19.3 RSA</A>
<DD><A HREF="ch19/19-06.html#Heading5">19.4 Pohlig-Hellman</A>
<DD><A HREF="ch19/19-07.html#Heading6">19.5 Rabin</A>
<DD><A HREF="ch19/19-07.html#Heading7">19.6 ElGamal</A>
<DD><A HREF="ch19/19-08.html#Heading8">19.7 McEliece</A>
<DD><A HREF="ch19/19-09.html#Heading9">19.8 Elliptic Curve Cryptosystems</A>
<DD><A HREF="ch19/19-09.html#Heading10">19.9 LUC</A>
<DD><A HREF="ch19/19-09.html#Heading11">19.10 Finite Automaton Public-Key Cryptosystems</A>
</DL>
</B></FONT>
<DD><A HREF="ch20/20-01.html#Heading1"><FONT SIZE="4"><B>Chapter 20—Public-Key Digital Signature Algorithms</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch20/20-01.html#Heading2">20.1 Digital Signature Algorithm (DSA)</A>
<DD><A HREF="ch20/20-06.html#Heading3">20.2 DSA Variants</A>
<DD><A HREF="ch20/20-06.html#Heading4">20.3 Gost Digital Signature Algorithm</A>
<DD><A HREF="ch20/20-07.html#Heading5">20.4 Discrete Logarithm Signature Schemes</A>
<DD><A HREF="ch20/20-08.html#Heading6">20.5 Ong-Schnorr-Shamir</A>
<DD><A HREF="ch20/20-08.html#Heading7">20.6 ESIGN</A>
<DD><A HREF="ch20/20-09.html#Heading8">20.7 Cellular Automata</A>
<DD><A HREF="ch20/20-09.html#Heading9">20.8 Other Public-Key Algorithms</A>
</DL>
</B></FONT>
<DD><A HREF="ch21/21-01.html#Heading1"><FONT SIZE="4"><B>Chapter 21—Identification Schemes</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch21/21-01.html#Heading2">21.1 Feige-Fiat-Shamir</A>
<DD><A HREF="ch21/21-03.html#Heading3">21.2 Guillou-Quisquater</A>
<DD><A HREF="ch21/21-04.html#Heading4">21.3 Schnorr</A>
<DD><A HREF="ch21/21-04.html#Heading5">21.4 Converting Identification Schemes to Signature Schemes</A>
</DL>
</B></FONT>
<DD><A HREF="ch22/22-01.html#Heading1"><FONT SIZE="4"><B>Chapter 22—Key-Exchange Algorithms</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch22/22-01.html#Heading2">22.1 Diffie-Hellman</A>
<DD><A HREF="ch22/22-02.html#Heading3">22.2 Station-to-Station Protocol</A>
<DD><A HREF="ch22/22-02.html#Heading4">22.3 Shamir’s Three-Pass Protocol</A>
<DD><A HREF="ch22/22-02.html#Heading5">22.4 COMSET</A>
<DD><A HREF="ch22/22-02.html#Heading6">22.5 Encrypted Key Exchange</A>
<DD><A HREF="ch22/22-04.html#Heading7">22.6 Fortified Key Negotiation</A>
<DD><A HREF="ch22/22-04.html#Heading8">22.7 Conference Key Distribution and Secret Broadcasting</A>
</DL>
</B></FONT>
<DD><A HREF="ch23/23-01.html#Heading1"><FONT SIZE="4"><B>Chapter 23—Special Algorithms for Protocols</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch23/23-01.html#Heading2">23.1 Multiple-Key Public-Key Cryptography</A>
<DD><A HREF="ch23/23-01.html#Heading3">23.2 Secret-Sharing Algorithms</A>
<DD><A HREF="ch23/23-02.html#Heading4">23.3 Subliminal Channel</A>
<DD><A HREF="ch23/23-04.html#Heading5">23.4 Undeniable Digital Signatures</A>
<DD><A HREF="ch23/23-05.html#Heading6">23.5 Designated Confirmer Signatures</A>
<DD><A HREF="ch23/23-06.html#Heading7">23.6 Computing with Encrypted Data</A>
<DD><A HREF="ch23/23-06.html#Heading8">23.7 Fair Coin Flips</A>
<DD><A HREF="ch23/23-06.html#Heading9">23.8 One-Way Accumulators</A>
<DD><A HREF="ch23/23-07.html#Heading10">23.9 All-or-Nothing Disclosure of Secrets</A>
<DD><A HREF="ch23/23-08.html#Heading11">23.10 Fair and Failsafe Cryptosystems</A>
<DD><A HREF="ch23/23-08.html#Heading12">23.11 Zero-Knowledge Proofs of Knowledge</A>
<DD><A HREF="ch23/23-09.html#Heading13">23.12 Blind Signatures</A>
<DD><A HREF="ch23/23-09.html#Heading14">23.13 Oblivious Transfer</A>
<DD><A HREF="ch23/23-09.html#Heading15">23.14 Secure Multiparty Computation</A>
<DD><A HREF="ch23/23-10.html#Heading16">23.15 Probabilistic Encryption</A>
<DD><A HREF="ch23/23-11.html#Heading17">23.16 Quantum Cryptography</A>
</DL>
</DL>
</DL>
</B></FONT>
<DL>
<DD><A HREF="ch24/24-01.html"><FONT SIZE="4"><B>Part IV—The Real World</B></FONT></A>
<DL>
<DD><A HREF="ch24/24-01.html#Heading1"><FONT SIZE="4"><B>Chapter 24—Example Implementations</B></FONT></A>
<FONT SIZE="3"><B>
<DL>
<DD><A HREF="ch24/24-01.html#Heading2">24.1 IBM Secret-Key Management Protocol</A>
<DD><A HREF="ch24/24-01.html#Heading3">24.2 MITRENET</A>
<DD><A HREF="ch24/24-02.html#Heading4">24.3 ISDN</A>
<DD><A HREF="ch24/24-02.html#Heading5">24.4 STU-III</A>
<DD><A HREF="ch24/24-02.html#Heading6">24.5 Kerberos</A>
<DD><A HREF="ch24/24-05.html#Heading7">24.6 KryptoKnight</A>
<DD><A HREF="ch24/24-05.html#Heading8">24.7 SESAME</A>
<DD><A HREF="ch24/24-05.html#Heading9">24.8 IBM Common Cryptographic Architecture</A>
<DD><A HREF="ch24/24-05.html#Heading10">24.9 ISO Authentication Framework</A>
<DD><A HREF="ch24/24-06.html#Heading11">24.10 Privacy-Enhanced Mail (PEM)</A>
<DD><A HREF="ch24/24-09.html#Heading12">24.11 Message Security Protocol (MSP)</A>
<DD><A HREF="ch24/24-09.html#Heading13">24.12 Pretty Good Privacy (PGP)</A>
<DD><A HREF="ch24/24-09.html#Heading14">24.13 Smart Cards</A>
<DD><A HREF="ch24/24-10.html#Heading15">24.14 Public-Key Cryptography Standards (PKCS)</A>
<DD><A HREF="ch24/24-11.html#Heading16">24.15 Universal Electronic Payment System (UEPS)</A>
<DD><A HREF="ch24/24-11.html#Heading17">24.16 Clipper</A>
<DD><A HREF="ch24/24-12.html#Heading18">24.17 Capstone</A>
<DD><A HREF="ch24/24-12.html#Heading19">24.18 AT&T Model 3600 Telephone Security Device (TSD)</A>
</DL>
</DL>
</B></FONT>
<DL><DD><A HREF="ch25/25-01.html#Heading1"><FONT SIZE="4"><B>Chapter 25—Politics</B></FONT></A>
<FONT SIZE="3"><B>
<DL><DD><A HREF="ch25/25-01.html#Heading2">25.1 National Security Agency (NSA)</A>
<DD><A HREF="ch25/25-02.html#Heading3">25.2 National Computer Security Center (NCSC)</A>
<DD><A HREF="ch25/25-02.html#Heading4">25.3 National Institute of Standards and Technology (NIST)</A>
<DD><A HREF="ch25/25-04.html#Heading5">25.4 RSA Data Security, Inc.</A>
<DD><A HREF="ch25/25-04.html#Heading6">25.5 Public Key Partners</A>
<DD><A HREF="ch25/25-04.html#Heading7">25.6 International Association for Cryptologic Research (IACR)</A>
<DD><A HREF="ch25/25-05.html#Heading8">25.7 RACE Integrity Primitives Evaluation (RIPE)</A>
<DD><A HREF="ch25/25-05.html#Heading9">25.8 Conditional Access for Europe (CAFE)</A>
<DD><A HREF="ch25/25-05.html#Heading10">25.9 ISO/IEC 9979</A>
<DD><A HREF="ch25/25-05.html#Heading11">25.10 Professional, Civil Liberties, and Industry Groups</A>
<DD><A HREF="ch25/25-06.html#Heading12">25.11 Sci.crypt</A>
<DD><A HREF="ch25/25-06.html#Heading13">25.12 Cypherpunks</A>
<DD><A HREF="ch25/25-06.html#Heading14">25.13 Patents</A>
<DD><A HREF="ch25/25-06.html#Heading15">25.14 U.S. Export Rules</A>
<DD><A HREF="ch25/25-10.html#Heading16">25.15 Foreign Import and Export of Cryptography</A>
<DD><A HREF="ch25/25-10.html#Heading17">25.16 Legal Issues</A>
</DL>
</DL>
</DL>
<B></FONT>
<FONT SIZE="4"><B>
<DD><A HREF="appendix-a.html">Afterword by Matt Blaze</A>
<DD><A HREF="appendix-b.html"><FONT SIZE="4"><B>Part V—Source Code</B></FONT></A>
<DD><A HREF="appendix-b.html">References</A>
<DD><A HREF="book-index.html">Index</A>
</B></FONT>
</DL>
[an error occurred while processing this directive]
<!-- all of the reference materials (books) have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- BEGIN SUB FOOTER --> <br><br> </TD> </TR> </TABLE> <table width="640" border=0 cellpadding=0 cellspacing=0> <tr> <td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td> <!-- END SUB FOOTER -->
<!-- all of the books have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- FOOTER --> <td width="515" align="left" bgcolor="#FFFFFF"><font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a> | <a href="/contactus.html"><font color="#006666">Contact Us</font></a> | <a href="/aboutus.html"><font color="#006666">About Us</font></a> | <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> | <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> | <a href="/"><font color="#006666">Home</font></a></b> <br><br> Use of this site is subject to certain <a href="/agreement.html">Terms & Conditions</a>, <a href="/copyright.html">Copyright © 1996-1999 EarthWeb Inc.</a><br> All rights reserved. Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p></td> </tr></table></BODY></HTML><!-- END FOOTER -->
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -