📄 book-index.html
字号:
<DD>IBM Common Cryptographic Architecture, 573–574
<DD>IBM secret-key management protocol, 561–562
<DD>IDEA, 319–325, 354
<DL>
<DD>cryptanalysis, 323
<DD>description, 320–322
<DD>modes of operation, 323–325
<DD>overview, 320–321
<DD>patents, 325
<DD>S-boxes, 349
<DD>source code, 637–643
<DD>speed, 322–323
<DD>strength against differential cryptanalysis, 348
<DD>variants, 325
</DL>
<DD>Ideal secrecy, 236
<DD>Identification schemes:
<DL>
<DD>converting to signature schemes, 512
<DD>Feige-Fiat-Shamir, 503–508
<DD>Guillou-Quisquater, 508–510
<DD>Ohta-Okamoto, 508
<DD>Schnorr authentication and signature scheme, 510–512
</DL>
<DD>Identity-based cryptosystems, 115
<DD>Ignition key, 564
<DD>Import, foreign, 617
<DD>Index of coincidence, 14
<DD>Information:
<DL>
<DD>amount, information theory definition, 233
<DD>deduction, 8
<DD>destruction, 228–229
</DL>
<DD>Information-theoretic approach, 418
<DL>
<DD>stream ciphers, 415
</DL>
<DD>Information theory, 233–237
<DL>
<DD>cryptosystem security, 234–235
<DD>entropy and uncertainty, 233–234
<DD>in practice, 236–237
<DD>rate of the language, 234
<DD>unicity distance, 235–236
</DL>
<DD>Ingemarsson, Ingemar, 418
<DD>Initialization vector:
<DL>
<DD>cipher block chaining mode, 194
<DD>cipher-feedback mode, 201
<DD>output-feedback mode, 204
</DL>
<DD>Inner-CBC, 360, 363
<DD>Insertion attack, synchronous stream ciphers, 203
<DD>Instance deduction, 8
<DD>Institute of Electrical and Electronics Engineers, 608
<DD>Integrated Services Digital Network, 563–565
<DD>Integrity, 2
<DD>Interactive protocol, 103
<DD>Interchange Key, 581
<DD>Interleave, 210–211
<DD>Interlock protocol, mutual authentication using, 54–55
<DD>Internal feedback, 203
<DD>International Association for Cryptologic Research, 605
<DD>International Standards Organization:
<DL>
<DD>authentication framework, 574–577
<DD>DES adoption, 268
</DL>
<DD>International Traffic in Arms Regulations, 610–614
<DD>Internet, Privacy-Enhanced Mail, 577–584
<DD>Introducers, 187
<DD>Inverses modulo a number, 246–248
<DD>IPES, 319
<DD>ISDN, 563–565
<DD>ISO 8732, 359
<DD>ISO 9796, 472, 474, 486
<DD>ISO/IEC 9979, 607
<DD>ISO X.509 protocols, 574–577
<DD>Iterated block cipher, 347
<DD>Jacobi symbol, 252–253
<DD>J-algebras, 501
<DD>Jam, 414
<DD>Jennings generator, 383–384
<DD>Johnson, David, 241
<DD>Jueneman’s methods, 457
<DD>Kaliski, Burt, 342
<DD>Karn, 351–352
<DD>Karn, Phil, 351
<DD>Karnin-Greene-Hellman, 530
<DD>Kerberos, 60, 566–571
<DL>
<DD>abbreviations, 567
<DD>authentication steps, 567
<DD>credentials, 568
<DD>getting initial ticket, 569
<DD>getting server tickets, 569–570
<DD>licenses, 571
<DD>model, 566
<DD>requesting services, 570
<DD>security, 571
<DD>Version 4, 570–571
<DD>Version 5 messages, 568
</DL>
<DD>Kerckhoffs, A., 5
<DD>Kerckhoffs’s assumption, 7
<DD>Key, 3
<DL>
<DD>backup, 181–182
<DD>CDMF shortening, 366
<DD>complement, DES, 281–282
<DD>compromised, 182–183
<DD>controlling usage, 180
<DD>dereferencing, 221–222
<DD>destroying, 184–185
<DD>distribution in large networks, 177
<DD>generating, 170–175
<DL>
<DD>ANSI X9.17 standard, 175
<DD>DoD, 175
<DD>pass phrases, 174–175
<DD>poor choices, 171–173
<DD>random keys, 173–174
<DD>reduced keyspaces, 170–171
</DL>
<DD>ISDN, 563–564
<DD>lifetime, 183–184
<DD>possibly weak, DES, 281–282
<DD>semiweak, DES, 280–281
<DD>session, 33, 180
<DD>storing, 180–181
<DD>transferring, 176–177
<DD>transmission, error detection, 178
<DD>updating, 180
<DD>using, 179–180
<DD>verification, 178–179
<DD>weak
<DL>
<DD>block ciphers design theory, 348DES, 280–281
</DL>
</DL>
<DD>Key and message broadcast, 51–52
<DD>Key and message transmission, 51
<DD>Key Auto-Key, 202
<DD>Keyboard latency, as random-sequence generator, 424–425
<DD>Key Certification Authority, 43
<DD>Key control vectors, 562
<DD>Key distribution:
<DL>
<DD>anonymous, 94–95
<DD>conference, 524
</DL>
<DD>Key Distribution Center, 43–44
<DD>Key-Encryption Keys, 176, 184
<DD>Key escrow, 97–100, 181–182, 591
<DL>
<DD>politics, 98–100
</DL>
<DD>Key exchange, 47–52
<DL>
<DD>DASS, 62
<DD>Denning-Sacco protocol, 63
<DD>with digital signatures, 50
<DD>interlock protocol, 49–50
<DD>Kerberos, 60
<DD>key and message broadcast, 51–52
<DD>key and message transmission, 51
<DD>man-in-the-middle attack, 48–49
<DD>Needham-Schroeder protocol, 58–59
<DD>Neuman-Stubblebine protocol, 60–62
<DD>Otway-Rees protocol, 59–60
<DD>protocols, formal analysis, 65–68
<DD>with public-key cryptography, 48
<DD>with symmetric cryptography, 47–48
<DD>Wide-Mouth Frog protocol, 56–57
<DD>without exchanging keys, 515
<DD>Woo-Lam protocol, 63–64
<DD>Yahalom, 57–58
</DL>
<DD>Key-exchange algorithms:
<DL>
<DD>COMSET, 517–518
<DD>conference key distribution and secret broadcasting, 523–525
<DD>Diffie-Hellman, 513–516
<DD>Encrypted Key Exchange, 518–522
<DD>fortified key negotiation, 522
<DD>Shamir’s three-pass protocol, 516–517
<DD>station-to-station protocol, 516
<DD>Tatebayashi-Matsuzaki-Newman, 524–525
</DL>
<DD>Key generation, using coin flipping, 92
<DD>Key length:
<DL>
<DD>comparing symmetric and public-key, 165–166
<DD>deciding on, 166–167
<DD>DES, 283–284
<DD>public-key, 158–165
<DL>
<DD>DNA computing, 163–164
<DD>quantum computing, 164–165
<DD>recommended lengths, 161–163
</DL>
<DD>symmetric, 151–158
<DL>
<DD>biotechnology as cryptanalysis tool, 156–157
<DD>brute-force attack, 151–154
<DD>Chinese Lottery, 156–157
<DD>neural networks, 155
<DD>software-based brute-force attacks, 154–155
<DD>thermodynamic limitations on brute-force attacks, 157–158
<DD>using viruses to spread cracking program, 155–156
</DL>
</DL>
<DD>Key management, 169–187
<DL>
<DD>distributed, 187
<DD>public-key, 185–187
</DL>
<DD>Key negotiation, fortified, 522
<DD>Key notarization, 562
<DD>Key revocation certificate, 585
<DD>Keyspace, 3
<DL>
<DD>flat, 176
<DD>nonlinear, 175–176
<DD>reduced, 170–171
</DL>
<DD>Keystream generator, 197–198
<DL>
<DD>counter mode, 206
<DD>periodic, 202
</DL>
<DD>Khafre, 317–318, 349
<DD>Khufu, 317, 349
<DD>Kilian, Joe, 116
<DD>Kim, Kwangjo, 298, 350
<DD>Kinetic Protection Device, 389–390
<DD>Klapper, Andy, 404
<DD>Klein, Daniel, 53, 171
<DD>Knapsack algorithms, 462–466
<DL>
<DD>decryption, 465
<DD>encryption, 464
<DD>implementations, 465
<DD>patents, 466
<DD>public key created from private key, 464
<DD>security, 465
<DD>superincreasing, 463–464
<DD>variants, 465–466
</DL>
<DD>Knapsack problem, 501
<DD>Known-plaintext attack, 6–7, 151, 359
<DD>Knudsen, Lars, 8, 293, 314, 316, 348–349
<DD>Knuth, 393, 501
<DD>Koblitz, Neal, 480
<DD>Konheim, Alan, 266, 280
<DD>Kravitz, David, 493
<DD>Kravitz-Reed, 481
<DD>KryptoKnight, 571–572
<DD>Lagged Fibonacci generators, 390
<DD>LaGrange interpolating polynomial scheme, 528–529
<DD>Lai, Xuejia, 319, 449
<DD>Langford, Susan, 293
<DD>Law Enforcement Access Field, 591
<DD>Legal issues, 618
<DD>Legendre symbol, 251
<DD>Lehmann, 259
<DD>Lehmann algorithm, 259
<DD>Length, shift register, 373
<DD>Lenstra, Arjen, 159, 162, 257, 485, 488
<DD>LFSR/FCSR summation/parity cascade, 410–411
<DD>Lidl, Rudolph, 481
<DD>Linear complexity:
<DL>
<DD>profile, 380
<DD>stream ciphers, 380
</DL>
<DD>Linear congruential generators, 369–372
<DL>
<DD>combining, 371–372
<DD>constants, 370
</DL>
<DD>Linear consistency test, 381
<DD>Linear cryptanalysis:
<DL>
<DD>DES, 290–293
<DD>strength against, block cipher design theory, 348–349
</DL>
<DD>Linear error-correcting codes, algorithms based on, 480
<DD>Linear feedback shift registers, 372–379
<DL>
<DD>Galois, 378–379
<DD>primitive polynomials mod 2, 376–377
<DD>software, 378–379
<DD>stream ciphers using, <I>see</I> Stream ciphers
</DL>
<DD>Linear syndrome algorithm, 381
<DD>Link-by-link encryption, 216–218
<DL>
<DD>combined with end-to-end, 219–221
</DL>
<DD>Linking protocol, timestamping, 76–77
<DD>Li-Wang algorithm, 346
<DD>Local deduction, 8
<DD>Lock-in, 388
<DD>Logarithms, discrete, <I>see</I> Discrete logarithm
<DD>LOKI, 314–316
<DL>
<DD>S-boxes, 349
<DD>source code, 632–637
</DL>
<DD>LOKI Double-Block, 451
<DD>Low decryption exponent attack, RSA, 473
<DD>Low encryption exponent attack, RSA, 472–473
<DD>Luby, Michael, 352
<DD>Luby-Rackoff, 352–353
<DL>
<DD>xDES<SUP>1</SUP>, 365
</DL>
<DD>LUC, 481
<DD>Lucas number, 481
<DD>Luccio-Mazzone, 501
<DD>Lucifer, 266, 303–304
<DD>Lu-Lee cryptosystem, 466
<DD>Lyndon words, 501
<DD>MacGuffin, 346
<DD>Madryga, W. E., 304
<DD>Mafia Fraud, 110
<DD>Magic numbers, 423
<DD>Manasse, Mark, 159, 257
<DD>Man-in-the-middle attack, 48–49
<DD>Masks, REDOC II, 312
<DD>Massey, James, 319, 339, 386, 418, 449
<DD>Master Key, 561
<DD>Master Terminal Key, 561
<DD>Matsui, Mitsuru, 290–291
<DD>Matsumoto-Imai algorithm, 500
<DD>Mauborgne, Joseph, 15
<DD>Maurer, Ueli, 419
<DD>Maurer’s randomized stream cipher, 419
<DD>Maximal period generator, 369
<DD>MBAL, 344
<DD>McEliece, Robert, 479
<DD>McEliece algorithm, 346, 479–480
<DD>MD2, 441
<DD>MD3, 446
<DD>MD4, 435–436
<DD>MD5, 436–441
<DD>MDC, 353–354
<DD>MDC-2, 452–453
<DD>MDC-4, 452–454
<DD>MD-strengthening, 431
<DD>Meet-in-the-middle attack, 358, 381
<DD>Mental poker, 92–95
<DD>Merkle, Ralph, 34, 316–318, 358–359, 432, 455, 461–462
<DD>Merkle’s puzzles, 34
<DD>Merritt, Michael, 67, 518, 520–521, 571
<DD>Message:
<DL>
<DD>authentication, 56
<DD>broadcasting, 69
<DD>Privacy-Enhanced Mail, 579–582
<DD>recovery, 497–498
<DD>resending as receipt, 42–43
</DL>
<DD>Message authentication codes, 31, 455–459
<DL>
<DD>bidirectional, 457
<DD>CBC-MAC, 456
<DD>IBC-Hash, 458
<DD>Jueneman’s methods, 457
<DD>message authenticator algorithm, 456–457
<DD>one-way hash functions as, 458–459
<DD>RIPE-MAC, 457–458
<DD>stream ciphers, 459
</DL>
<DD>Message authenticator algorithm, 456–457
<DD>Message broadcast, anonymous, 137–139
<DD>Message Digest, 435–436
<DD>Message Digest Cipher, 353
<DD>Message Integrity Check, 578
<DD>Message-meaning rule, 66
<DD>Message Security Protocol, 584
<DD>Meyer, Carl, 266, 278
<DD>Meyer, Joseph A., 614
<DD>Meyer-Schilling, 452
<DD>Micali, Silvio, 94, 508, 546–547, 552
<DD>Miller, Gary, 259
<DD>Miller, V. S., 480
<DD>Mimic functions, 10
<DD>Minimum-disclosure proofs, 108
<DD>MITRENET, 562–563
<DD>Miyaguchi, Shoji, 308
<DD>MMB, 325–327
<DD>m*n-bit S box, 349
<DD>Modular arithmetic, 242–245
<DD>Modular Multiplication-based Block cipher, 325–327
<DD>Modular reduction, 242
<DD>Modulo, inverses, 246–248
<DD>Monoalphabetic cipher, 10
<DD>Montgomery’s method, 244
<DD>Moore’s Law, 153
<DD>m-sequence, 374
<DD>MSP, 584
<DD>Muller, Winfried, 481
<DD>Multiparty unconditionally secure protocols, 137
<DD>Multiple-bit generator, 421
<DD>Multiple encryption, 357
<DL>
<DD>quintuple, 366
</DL>
<DD>Multiple Identity Fraud, 111
<DD>Multiple-key public-key cryptography, 527–528
<DD>Multiple signatures, 39–40
<DD>Multiplier, 369
<DD>Multispeed inner-product generator, 386–387
<DD>Mush, 392
<DD>Mutual shrinking generator, 392
<DD>MYK-80, 593–594
<DD>Mykotronx Clipper chip, 328
<DD>MYK-78T, 591–593
<DD>Nanoteq, 390
<DD>National Bureau of Standards, <I>see</I> National Institute of Standards and Technology
<DD>National Computer Security Center, 599–600
<DD>National Institute of Standards and Technology, 600–603
<DL>
<DD>DES development, 265–267
<DD>Memorandum of Understanding, 601–603
</DL>
<DD>National Security Agency, 597–599
<DL>
<DD>DES development, 266–267
<DD>export of cryptography, 614–615
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -