⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 index

📁 应用密码学密码算法源代码
💻
📖 第 1 页 / 共 4 页
字号:
       Matsumoto-Imai, 318       McEliece, 316       Okamoto, 92, 316, 17       Ong-Schnorr-Shamir, 299, 300       Pohlig-Hellman, 289       Rabin, 289, 91       RSA, 281, 88       Schnorr, 302, 4       security, 274, 75, 319       Yagisawa, 318Public key cryptography       attacks against, 30, 31       coin flipping using, 76, 77       communications using, 29, 31       generating keys for, 144, 45       key exchange, 42, 47       multiple-key, 56, 58       one-way functions and, 27, 28       one-way hash functions, 34, 35, 39       prime numbers and, 213, 16       signing documents, 33, 34       user identification with, 48, 49Public Key Distribution Center, 414, 15Public Key Partners (PKP), 276, 288, 289Public keys, 35, 36.  See also Keys; Public-Key algorithms       certificates, 153       creating from private, knapsack algorithm, 278, 79       database, 43       introducers and distributed key management, 153       introduction, 4       management, 152, 53       one-way functions and, 27, 28       security, 30PURPLE, Japanese diplomatic code, 6Q-code cryptosystems, 8Quadratic algorithms, 194Quadratic residues and nonresidues, 206Quadratic Sieve, 211Quantum cryptography, 408, 10Queensland University of Technology, 247Quisquater, Jean-Jacques, 85Quisquater-Girault hash function, 341, 42Rabin algorithm, 289, 91, 435Rabin, Michael, 86, 404Rabin-Miller prime number algorithm, 214, 15Rackoff, C., 270Rainbow Books, 441RAND tables, 368, 69Random noise, 370Random numbers.  See also Pseudo-random       crypotographically, 40       generating, 14, 15, 39, 41, 144       keystream generators, 170Random permutations, generating, 374, 75Randomized stream ciphers, 367Rate of language, 190, 91RC2 and RC4, 259, 60, 364Real random sequence generators, 368, 72.  See also Pseudo-random sequence generators       biases and correlations, 371, 72       diffusing randomness, 372       measuring keyboard latency, 370       RAND tables, 368, 69       random noise, 370, 71       using computer clocks, 369, 70Real, world random numbers, 41Receipts, resending message as, 37, 38Receiver, 1REDOC, 252, 55Redundancy of language, 190, 91Regan, Ronald and NSDD, 145, 222Related-key cryptanalysis, 240, 41Relatively prime numbers, 200Relativized cryptography, 192Research and Development in Advanced Communication Technologies in Europe (RACE), 336, 446Resend attacks, 39Residues in modular arithmetic, 198, 203Restricted algorithms, 2Ribenboim, Paulo, 200Richter, Manfield, 370RIPEM, 435, 36RIPE-MAC, 345, 446RIPE-MD one-way hash function, 336RIPE project, secret-key identification (SKID), 50, 51, 343, 446Rivest, Ron, 12, 100, 259, 282, 329, 332, 35Riorden, Mark, 435Robotron, 237ROM keys, 148, 49Rotor machines, 11Rounds, DES, 224, 237RSA (Rivest, Shamir, and Adleman) algorithm, 281, 88       attacks against poker protocols, 80       common modulus attack, 287       digital signatures and, 33       encrypted key exchange (EKE), 379       in hardware, 285       introduction, 12       low exponent attack against RSA, 287, 88       multiple public-key cryptography, 381       patents, 288       restrictions on, 288       security, 282, 85       speed of, 285, 86, 306       as standard, 288       zero-knowledge proof of ability to break, 403RSA Data Security, Inc. (RSADI), 259, 60, 305, 364, 444, 45RSA generator, 365Rueppel, Ranier, 345, 357, 358, 363, 364Salomaa, Arto, 399Salt, 47, 48Santean, Lila, 109, 399S-boxes, 228, 29, 237, 38, 242Scherbius, Arthur, 11Schnorr, C. P., 299, 337, 367Schnorr algorithm, 302, 4Schroeder, 52, 177Sci.crypt, 445Scott, Robert, 247Seberry, Jennifer, 336Secrecy, ideal, 192Secrecy, perfect, 191Secret broadcasting, 382, 83Secret-key algorithms, 3Secret-key identification protocols (SKID), 50, 51Secret keys       compromised, 150       database of, 30, 33       introduction, 4Secret sharing       advanced threshold schemes, 385, 86       all-or-nothing disclosure (ANDOS), 83, 84, 399, 401       Asmuth-Bloom, 385       backup keys, 149       with cheaters, 60, 386, 87       Karnin-Greene-Hellman, 385       LaGrange interpolating polynomial scheme, 383, 84       (m,n)-threshold scheme, 59, 383       with prevention, 387       without revealing shares, 386       schemes for, 59, 61       shadows, 59       simultaneous exchange, 104, 5       threshold scheme, 59       without Trent, 60, 61       vector scheme, 384Secret splitting, 58, 59Secure algorithm       introduction, 7Secure Data Network System (SDNS), 436Secure Hash Algorithm (SHA), 333, 36       description of, 334, 35       and DSS, 308       security, 335, 36Secure Hash Standard (SHS), 323Secure multiparty computation       protocols, 114, 16, 404, 6       secure circuit evaluation, 116, 17Security       of CA-1.1, 268       cheating, 25       cryptosystems, 7, 191       DES, 232       DSA, 311, 13       ESIGN algorithm, 315       hardware and software encryption, 181, 83       Kerberos, 424       key length and future security, 139, 40       and keys, 2, 4       keystream generators and, 170       knapsack algorithm, 280       MD5, 332, 33       of MMB, 267, 68       multiple encryption, 165, 69       network, 178, 80       PEM, 434       problems with OFB, 162       pseudo-random sequences and, 40, 41       public-key algorithms, 274, 75, 319       restricted algorithms, 2       of REDOC II, 253, 54       of REDOC III, 254       RSA, 282, 85       Secure Hash Algorithm (SHA), 308, 335, 36Self-decimated generators, 362, 63Self-enforcing protocols, 24Semi-weak keys, 233Sender       introduction, 1       unconditional, and recipient untraceability, 125Sequence, superincreasing, 278Session keys, 42, 418Shadows, 59, 383Shamir, Adi, 12, 60, 91, 234, 237, 238, 240, 43, 244, 252, 254,        255, 259, 260, 277, 280, 282, 295, 299, 324, 325, 326, 383Shamir's pseudo-random number generator, 365Shamir's three-pass protocol, 376, 77Shannon, Claude Elmwood, 189, 193Shares, secret sharing without revealing, 386Shift registers, 351Shifting identities problem, 93Shimizu, Akihiro, 249Shmuley, Z., 275Shroyer, Les, 306Signatures.  See Digital signaturesSigning contracts, simultaneous       with arbitrators, 99       without arbitrator, (face-to-face), 99, 100       without arbitrator, (not face-to-face), 100, 1       without arbitrator, (using cryptography), 101-3Signing documents       and timestamps, 34, 39       with public-key cryptography, 33, 35       with symmetric cryptosystems and arbitrator, 31, 33Simmons, Gustavus, 67, 318, 387Simple substitution cypher, 8Simultaneous exchange of secrets, 104, 5Single-key algorithm, 3Smart card applications, 296, 297, 309Smith, Peter, 318Snefru one-way hash function, 324, 25Software       brute-force attacks, 135, 36       DES implementation, 231       encryption, 148, 182, 83Software Publishers Association (SPA), 260Solvay-Strassen prime number algorithm, 214Soviet Union, 237Space complexity of algorithms, 194Speed       DES, 231       DES compared to RSA, 286, 306       of IDEA, 263, 64       of RSA, 285, 86SPX protocols, 55, 56Square roots modulo N, 213, 289Square roots, coin flipping using, 396Standards.  See Data Encryption Standard (DES), RSA algorithmStereotyped beginnings and endings, 155Stern, 349Store-and-forward network, 46, 47Storing keys, 148, 49Stornetta, W. Scott, 62Straight permutation, 230Stream algorithms, 3Stream ciphers, 168, 77, 356, 67       alternating stop-and-go generator, 360, 61       Beth-Piper stop-and-go generators, 359       bilateral stop-and-go generator, 361       Blum-Mitcali generator, 365       BlumBlumShub (BBS) generator, 365, 66, 407       cellular automaton generator, 363       complexity, theoretic approach, 365, 66       crypt(1), 364       Geffe generator, 358, 59       Gollmann cascade, 360       I/p generator, 363, 64       information theory approach, 366, 67       insertion attack, 174       introduction, 3       keystream generators, 169, 72       MAC, 345, 46       multiplexer generator, 359       multispeed inner-product generator, 363       Pless generator, 359       randomized, 367       RC4, 364       RSA generator, 365       self-synchronous, 172, 174, 75       self-decimated generators, 362, 63       Shamir's pseudo-random number generator, 365       summation generator, 364       synchronous, 172       system-theoretic approach, 357, 64       threshold generator, 361, 62       using block ciphers as, 175, 76       vs. block ciphers, 176, 77Stream ciphers.  See also pseudo-random sequence generatorsStrong algorithms, 7Strong primes, 215, 16Subliminal channels       applications of, 68       DES, 313       DSA, 390, 92       ElGamal, 388, 89       ESIGN, 389, 90       Ong-Schorr-Shamir, 387, 88       protocols, 66, 68       subliminal-free signatures, 68Substitution, 8, 10, 193       S-box substitution, DES, 228, 29Summation generator, 364Sumoto, T., 270Superincreasing knapsack, 278Superincreasing sequence, 278Superpolynomial algorithms, 194Swap files, 152, 183Symmetric algorithms       compared to public-key, 31       introduction, 3, 4Symmetric cryptography       bit commitment using, 72       communications using, 26, 27       key exchange with, 42, 43       keys and, 26, 27       security of, 129, 30       signing documents with arbitrator, 31, 33       vs. public-key cryptography, 177, 78Symposium on the theory of Computing (STOC), 91Synchronous stream ciphers, 172, 74       counter mode, 172, 173       introduction, 172       output feedback mode, 172, 73Tandem Davies-Meyer hash function, 342, 43Tap sequence, 351TCP/IP networks, 417TEMPEST, 181Threshold generators, 361, 62Threshold scheme, 59, 385Ticket-Granting Server (TGS), 419Ticket-Granting Service (TGS), 419Ticket Granting Ticket (TGT), 421Tickets, 419Time complexity of algorithms, 194Time estimates for brute-force attack, 130, 35, 195Timestamping       arbitrated solution, 62, 63       distributed protocols, 64, 65       document signing and, 34, 39       linking protocols, 63, 64       services, 61, 65TIS-PEM, 434, 35Tractable problems, 195Traffic-flow security, 178Transferring keys, 145, 47Transposition ciphers, 10Trap-door one-way functions, 28Trial Division, 212Triple encryption, 166, 67Trusted Information Systems.  See Privacy-Enhanced Mail (PEM)Trusted parties, 21Tsujii, S., 318Tuchman, W. L., 166, 232, 413Turing, Alan, 11, 193, 196Turing machine, 195Turkin, A. I., 316U.S. export rules, 447, 54U.S. government cryptosystems       Clipper and Capstone chips, 181, 269, 436, 437, 38       DES (Data Encryption Standard), 12Unconditionally secure algorithm, 7Unconditionally secure multiparty protocols, 125, 26Undecidable problems, 196Undeniable digital signatures, 68, 69, 392, 95Unicity distance, 192Unicity point, 192UNIX       CRYPT(3), 242       Crypt Breakers Workbench (CBW), 364       encryption operations, 148       generating random values, 369, 70       Kerberos, 417, 25       ROT13, 9, 10       salt, 48       TIS-PEM, 434, 35Unpredictable to left/right, 366Untraceability, unconditional sender and recipient and, 125User identification, with public-key cryptography, 48, 49Van Oorschot, Paul, 167Variants, DES, 241, 43Vector scheme, 384Verifying keys, 147, 48Vernam, Gilbert, 13Vigenere cipher       classical cryptography, 10       simple XOR, 12, 13Viruses, 137Voting.  See Elections, secureWaidner, Michael, 69Waterloo, University of, 337Wayner, Peter, 66Weak DES keys, 232, 34Weizmann Institute in Israel, 291Well, coin flipping into, 77Wichmann, B. A., 349Wide-Mouth Frog protocols, 51, 52Wiener, Michael, 167, 287Windows NT, 148Wolfram, Steve, 337, 363Wood, Michael, 252, 254Woollven, Jack, 345Work factor, breaking algorithms, 7World War I ciphers, 10World War II ciphers, 11X.509 protocols, 425XOR algorithm, 12, 13Xuejia, Lai, 260Yagisawa algorithm, 318Yahalom protocol, 52Yamagishi, Atsuhiro, 252Yang, Shouboa, 393Yung, Moti, 69Yuval, G., 322Zenith video scrambling, 2Zero knowledge identification algorithm, 297Zero-knowledge proofs of identity       chess grandmaster problem, 91, 93       introduction, 91, 93       shifting identities problem, 93Zero-knowledge proofs of knowledge       basic protocol, 85, 87       convincing third parties, 89, 90       Cut and choose technique, 85, 86       discrete logarithm, proofs of, 401, 3       Feige-Fiat-Shamir algorithm, 291, 96       generalities, 91       graph isomorphism, 88, 89       Hamiltonian cycle, 87, 88       introduction, 84       minimum-disclosure proofs, 84       noninteractive proofs, 90, 91       parallel proofs, 89       RSA, ability to break, 403Zheng, Yuliang, 270, 336Zippel, 280

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -