📄 index
字号:
Matsumoto-Imai, 318 McEliece, 316 Okamoto, 92, 316, 17 Ong-Schnorr-Shamir, 299, 300 Pohlig-Hellman, 289 Rabin, 289, 91 RSA, 281, 88 Schnorr, 302, 4 security, 274, 75, 319 Yagisawa, 318Public key cryptography attacks against, 30, 31 coin flipping using, 76, 77 communications using, 29, 31 generating keys for, 144, 45 key exchange, 42, 47 multiple-key, 56, 58 one-way functions and, 27, 28 one-way hash functions, 34, 35, 39 prime numbers and, 213, 16 signing documents, 33, 34 user identification with, 48, 49Public Key Distribution Center, 414, 15Public Key Partners (PKP), 276, 288, 289Public keys, 35, 36. See also Keys; Public-Key algorithms certificates, 153 creating from private, knapsack algorithm, 278, 79 database, 43 introducers and distributed key management, 153 introduction, 4 management, 152, 53 one-way functions and, 27, 28 security, 30PURPLE, Japanese diplomatic code, 6Q-code cryptosystems, 8Quadratic algorithms, 194Quadratic residues and nonresidues, 206Quadratic Sieve, 211Quantum cryptography, 408, 10Queensland University of Technology, 247Quisquater, Jean-Jacques, 85Quisquater-Girault hash function, 341, 42Rabin algorithm, 289, 91, 435Rabin, Michael, 86, 404Rabin-Miller prime number algorithm, 214, 15Rackoff, C., 270Rainbow Books, 441RAND tables, 368, 69Random noise, 370Random numbers. See also Pseudo-random crypotographically, 40 generating, 14, 15, 39, 41, 144 keystream generators, 170Random permutations, generating, 374, 75Randomized stream ciphers, 367Rate of language, 190, 91RC2 and RC4, 259, 60, 364Real random sequence generators, 368, 72. See also Pseudo-random sequence generators biases and correlations, 371, 72 diffusing randomness, 372 measuring keyboard latency, 370 RAND tables, 368, 69 random noise, 370, 71 using computer clocks, 369, 70Real, world random numbers, 41Receipts, resending message as, 37, 38Receiver, 1REDOC, 252, 55Redundancy of language, 190, 91Regan, Ronald and NSDD, 145, 222Related-key cryptanalysis, 240, 41Relatively prime numbers, 200Relativized cryptography, 192Research and Development in Advanced Communication Technologies in Europe (RACE), 336, 446Resend attacks, 39Residues in modular arithmetic, 198, 203Restricted algorithms, 2Ribenboim, Paulo, 200Richter, Manfield, 370RIPEM, 435, 36RIPE-MAC, 345, 446RIPE-MD one-way hash function, 336RIPE project, secret-key identification (SKID), 50, 51, 343, 446Rivest, Ron, 12, 100, 259, 282, 329, 332, 35Riorden, Mark, 435Robotron, 237ROM keys, 148, 49Rotor machines, 11Rounds, DES, 224, 237RSA (Rivest, Shamir, and Adleman) algorithm, 281, 88 attacks against poker protocols, 80 common modulus attack, 287 digital signatures and, 33 encrypted key exchange (EKE), 379 in hardware, 285 introduction, 12 low exponent attack against RSA, 287, 88 multiple public-key cryptography, 381 patents, 288 restrictions on, 288 security, 282, 85 speed of, 285, 86, 306 as standard, 288 zero-knowledge proof of ability to break, 403RSA Data Security, Inc. (RSADI), 259, 60, 305, 364, 444, 45RSA generator, 365Rueppel, Ranier, 345, 357, 358, 363, 364Salomaa, Arto, 399Salt, 47, 48Santean, Lila, 109, 399S-boxes, 228, 29, 237, 38, 242Scherbius, Arthur, 11Schnorr, C. P., 299, 337, 367Schnorr algorithm, 302, 4Schroeder, 52, 177Sci.crypt, 445Scott, Robert, 247Seberry, Jennifer, 336Secrecy, ideal, 192Secrecy, perfect, 191Secret broadcasting, 382, 83Secret-key algorithms, 3Secret-key identification protocols (SKID), 50, 51Secret keys compromised, 150 database of, 30, 33 introduction, 4Secret sharing advanced threshold schemes, 385, 86 all-or-nothing disclosure (ANDOS), 83, 84, 399, 401 Asmuth-Bloom, 385 backup keys, 149 with cheaters, 60, 386, 87 Karnin-Greene-Hellman, 385 LaGrange interpolating polynomial scheme, 383, 84 (m,n)-threshold scheme, 59, 383 with prevention, 387 without revealing shares, 386 schemes for, 59, 61 shadows, 59 simultaneous exchange, 104, 5 threshold scheme, 59 without Trent, 60, 61 vector scheme, 384Secret splitting, 58, 59Secure algorithm introduction, 7Secure Data Network System (SDNS), 436Secure Hash Algorithm (SHA), 333, 36 description of, 334, 35 and DSS, 308 security, 335, 36Secure Hash Standard (SHS), 323Secure multiparty computation protocols, 114, 16, 404, 6 secure circuit evaluation, 116, 17Security of CA-1.1, 268 cheating, 25 cryptosystems, 7, 191 DES, 232 DSA, 311, 13 ESIGN algorithm, 315 hardware and software encryption, 181, 83 Kerberos, 424 key length and future security, 139, 40 and keys, 2, 4 keystream generators and, 170 knapsack algorithm, 280 MD5, 332, 33 of MMB, 267, 68 multiple encryption, 165, 69 network, 178, 80 PEM, 434 problems with OFB, 162 pseudo-random sequences and, 40, 41 public-key algorithms, 274, 75, 319 restricted algorithms, 2 of REDOC II, 253, 54 of REDOC III, 254 RSA, 282, 85 Secure Hash Algorithm (SHA), 308, 335, 36Self-decimated generators, 362, 63Self-enforcing protocols, 24Semi-weak keys, 233Sender introduction, 1 unconditional, and recipient untraceability, 125Sequence, superincreasing, 278Session keys, 42, 418Shadows, 59, 383Shamir, Adi, 12, 60, 91, 234, 237, 238, 240, 43, 244, 252, 254, 255, 259, 260, 277, 280, 282, 295, 299, 324, 325, 326, 383Shamir's pseudo-random number generator, 365Shamir's three-pass protocol, 376, 77Shannon, Claude Elmwood, 189, 193Shares, secret sharing without revealing, 386Shift registers, 351Shifting identities problem, 93Shimizu, Akihiro, 249Shmuley, Z., 275Shroyer, Les, 306Signatures. See Digital signaturesSigning contracts, simultaneous with arbitrators, 99 without arbitrator, (face-to-face), 99, 100 without arbitrator, (not face-to-face), 100, 1 without arbitrator, (using cryptography), 101-3Signing documents and timestamps, 34, 39 with public-key cryptography, 33, 35 with symmetric cryptosystems and arbitrator, 31, 33Simmons, Gustavus, 67, 318, 387Simple substitution cypher, 8Simultaneous exchange of secrets, 104, 5Single-key algorithm, 3Smart card applications, 296, 297, 309Smith, Peter, 318Snefru one-way hash function, 324, 25Software brute-force attacks, 135, 36 DES implementation, 231 encryption, 148, 182, 83Software Publishers Association (SPA), 260Solvay-Strassen prime number algorithm, 214Soviet Union, 237Space complexity of algorithms, 194Speed DES, 231 DES compared to RSA, 286, 306 of IDEA, 263, 64 of RSA, 285, 86SPX protocols, 55, 56Square roots modulo N, 213, 289Square roots, coin flipping using, 396Standards. See Data Encryption Standard (DES), RSA algorithmStereotyped beginnings and endings, 155Stern, 349Store-and-forward network, 46, 47Storing keys, 148, 49Stornetta, W. Scott, 62Straight permutation, 230Stream algorithms, 3Stream ciphers, 168, 77, 356, 67 alternating stop-and-go generator, 360, 61 Beth-Piper stop-and-go generators, 359 bilateral stop-and-go generator, 361 Blum-Mitcali generator, 365 BlumBlumShub (BBS) generator, 365, 66, 407 cellular automaton generator, 363 complexity, theoretic approach, 365, 66 crypt(1), 364 Geffe generator, 358, 59 Gollmann cascade, 360 I/p generator, 363, 64 information theory approach, 366, 67 insertion attack, 174 introduction, 3 keystream generators, 169, 72 MAC, 345, 46 multiplexer generator, 359 multispeed inner-product generator, 363 Pless generator, 359 randomized, 367 RC4, 364 RSA generator, 365 self-synchronous, 172, 174, 75 self-decimated generators, 362, 63 Shamir's pseudo-random number generator, 365 summation generator, 364 synchronous, 172 system-theoretic approach, 357, 64 threshold generator, 361, 62 using block ciphers as, 175, 76 vs. block ciphers, 176, 77Stream ciphers. See also pseudo-random sequence generatorsStrong algorithms, 7Strong primes, 215, 16Subliminal channels applications of, 68 DES, 313 DSA, 390, 92 ElGamal, 388, 89 ESIGN, 389, 90 Ong-Schorr-Shamir, 387, 88 protocols, 66, 68 subliminal-free signatures, 68Substitution, 8, 10, 193 S-box substitution, DES, 228, 29Summation generator, 364Sumoto, T., 270Superincreasing knapsack, 278Superincreasing sequence, 278Superpolynomial algorithms, 194Swap files, 152, 183Symmetric algorithms compared to public-key, 31 introduction, 3, 4Symmetric cryptography bit commitment using, 72 communications using, 26, 27 key exchange with, 42, 43 keys and, 26, 27 security of, 129, 30 signing documents with arbitrator, 31, 33 vs. public-key cryptography, 177, 78Symposium on the theory of Computing (STOC), 91Synchronous stream ciphers, 172, 74 counter mode, 172, 173 introduction, 172 output feedback mode, 172, 73Tandem Davies-Meyer hash function, 342, 43Tap sequence, 351TCP/IP networks, 417TEMPEST, 181Threshold generators, 361, 62Threshold scheme, 59, 385Ticket-Granting Server (TGS), 419Ticket-Granting Service (TGS), 419Ticket Granting Ticket (TGT), 421Tickets, 419Time complexity of algorithms, 194Time estimates for brute-force attack, 130, 35, 195Timestamping arbitrated solution, 62, 63 distributed protocols, 64, 65 document signing and, 34, 39 linking protocols, 63, 64 services, 61, 65TIS-PEM, 434, 35Tractable problems, 195Traffic-flow security, 178Transferring keys, 145, 47Transposition ciphers, 10Trap-door one-way functions, 28Trial Division, 212Triple encryption, 166, 67Trusted Information Systems. See Privacy-Enhanced Mail (PEM)Trusted parties, 21Tsujii, S., 318Tuchman, W. L., 166, 232, 413Turing, Alan, 11, 193, 196Turing machine, 195Turkin, A. I., 316U.S. export rules, 447, 54U.S. government cryptosystems Clipper and Capstone chips, 181, 269, 436, 437, 38 DES (Data Encryption Standard), 12Unconditionally secure algorithm, 7Unconditionally secure multiparty protocols, 125, 26Undecidable problems, 196Undeniable digital signatures, 68, 69, 392, 95Unicity distance, 192Unicity point, 192UNIX CRYPT(3), 242 Crypt Breakers Workbench (CBW), 364 encryption operations, 148 generating random values, 369, 70 Kerberos, 417, 25 ROT13, 9, 10 salt, 48 TIS-PEM, 434, 35Unpredictable to left/right, 366Untraceability, unconditional sender and recipient and, 125User identification, with public-key cryptography, 48, 49Van Oorschot, Paul, 167Variants, DES, 241, 43Vector scheme, 384Verifying keys, 147, 48Vernam, Gilbert, 13Vigenere cipher classical cryptography, 10 simple XOR, 12, 13Viruses, 137Voting. See Elections, secureWaidner, Michael, 69Waterloo, University of, 337Wayner, Peter, 66Weak DES keys, 232, 34Weizmann Institute in Israel, 291Well, coin flipping into, 77Wichmann, B. A., 349Wide-Mouth Frog protocols, 51, 52Wiener, Michael, 167, 287Windows NT, 148Wolfram, Steve, 337, 363Wood, Michael, 252, 254Woollven, Jack, 345Work factor, breaking algorithms, 7World War I ciphers, 10World War II ciphers, 11X.509 protocols, 425XOR algorithm, 12, 13Xuejia, Lai, 260Yagisawa algorithm, 318Yahalom protocol, 52Yamagishi, Atsuhiro, 252Yang, Shouboa, 393Yung, Moti, 69Yuval, G., 322Zenith video scrambling, 2Zero knowledge identification algorithm, 297Zero-knowledge proofs of identity chess grandmaster problem, 91, 93 introduction, 91, 93 shifting identities problem, 93Zero-knowledge proofs of knowledge basic protocol, 85, 87 convincing third parties, 89, 90 Cut and choose technique, 85, 86 discrete logarithm, proofs of, 401, 3 Feige-Fiat-Shamir algorithm, 291, 96 generalities, 91 graph isomorphism, 88, 89 Hamiltonian cycle, 87, 88 introduction, 84 minimum-disclosure proofs, 84 noninteractive proofs, 90, 91 parallel proofs, 89 RSA, ability to break, 403Zheng, Yuliang, 270, 336Zippel, 280
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -