📄 book-index.html
字号:
<HTML><HEAD><META name=vscategory content="Security Programming Languages"><META name=vsisbn content="0471128457"><META name=vstitle content="Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)"><META name=vsauthor content="Bruce Schneier"><META name=vsimprint content="Wiley Computer Publishing "><META name=vspublisher content="John Wiley & Sons, Inc."><META name=vspubdate content="1/1/96"><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Index</TITLE><!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) { var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"> <table width="640" border="0" cellpadding="0" cellspacing="0"> <tr valign="top"> <td><!-- Begin Ads ITKBAN.BOOKS //--><HTML><HEAD><TITLE></TITLE></HEAD><BODY><TABLE WIDTH=468 height=60 border=0 cellspacing=0 cellpadding=0> <TR> <TD><TABLE border=0 cellspacing=0 cellpadding=0> <TR> <TD WIDTH=129 HEIGHT=60> <A HREF="/adclick.html/CID=00000c0033d6f71200000000/site=itknowledge/area=itk.books/aamsz=468x60" TARGET="_blank"><IMG SRC="http://adimages.earthweb.com/images/ads/house/dtm_salary/day_night4.gif" BORDER=0 WIDTH=129 HEIGHT=60></a></TD> <TD WIDTH=339 HEIGHT=60><A HREF="/adclick.html/CID=00000c0033d6f71200000000/site=itknowledge/area=itk.books/aamsz=468x60" TARGET="_blank"><IMG SRC="http://adimages.earthweb.com/images/ads/house/dtm_salary/rightside.gif" BORDER=0 WIDTH=339 HEIGHT=60></a></TD> </TR></TABLE><!-- http://www.datamation.com/staff/survey/index.html --></TD> </TR></TABLE></BODY></HTML><!-- ITKBAN.BOOKS End Ads //--></td> <td><!-- Begin Ads ITKBAN //--><CENTER><A HREF="/adclick.html/CID=00000b452954e8a400000000/site=itknowledge/area=itk/aamsz=160x60/position=top" TARGET=_top><IMG BORDER=0 SRC="http://adimages.earthweb.com/images/ads/160x60/compaq_dtm_sponsor.gif" ALT="" ></A><BR><A HREF="/adclick.html/CID=00000b452954e8a400000000/site=itknowledge/area=itk/aamsz=160x60/position=top" TARGET=_top></A></CENTER><BR><!-- ITKBAN End Ads //--></td> </tr> <tr><td height="1" colspan="2" bgcolor="#CCCCCC"><img src="/images/white.gif" border=0 alt=""></td></tr> </TABLE><!-- END HEADER --><!-- BEGIN SUB HEADER --> <table bgcolor="#FFFFFF" cellpadding="0" cellspacing="0" border="0" width="100%"> <!-- ITK LOGO Banner --> <tr> <td align="left" valign="top" bgcolor="#FFFFFF"><script>function GetCookie (name){ var arg = name + "="; var alen = arg.length; var clen = document.cookie.length; var i = 0; while (i < clen) { var j = i + alen; if (document.cookie.substring(i, j) == arg) { var end = document.cookie.indexOf (";", j); if (end == -1) end = document.cookie.length; return unescape(document.cookie.substring(j, end)); } i = document.cookie.indexOf(" ", i) + 1; if (i == 0) break; } return null;}var m1='<IMG SRC="';var m2='/images/itk-logo.gif';var m3='" VSPACE="10" WIDTH=434 HEIGHT=58 ALT="ITKnowledge" border="0">';var gifstr=GetCookie("UsrType");if((gifstr!=0 ) && (gifstr!=null)) { m2=gifstr; }document.write(m1+m2+m3);</script></td> </tr><!-- END of ITK LOGO Banner --> <!-- ITK TOPNAV --> <tr> <td align="left" valign="top" nowrap><a href="/"><img src="/images/home1.gif" width=38 height=37 alt="home" border="0"></a> <a href="/pick-account.html"><img src="/images/accountinfo.gif" width=70 height=37 alt="account info" border="0"></a> <a href="/PSUser/usrreg.htm?AdminAction=InitAdd&Locale=en&URI=/"><img src="/images/subscribe2.gif" width=56 height=37 alt="subscribe" border="0" hspace="6"></a> <a href="/PSUser/psuserauth.htm?cmd=login&URI=/"><img src="/images/login1.gif" width=33 height=37 alt="login" hspace="5" border="0"></a> <a href="/search/"><img src="/images/search1.gif" width=43 height=37 alt="search" border="0" hspace="10"></a> <a href="/faq/faq.html"><img src="/images/faqs1.gif" width=40 height=37 alt="FAQ/help" border="0" hspace="0"></a> <a href="/sitemap.html"><img src="/images/sitemap1.gif" width=46 height=37 alt="site map" border="0" hspace="2"></a> <a href="/contactus.html"><img src="/images/contact1.gif" width=61 height=37 alt="contact us" border="0" hspace="4"></a><br> <img src="/images/white.gif" width="1" height="5" alt="" border="0"></td> </tr></table><!-- END of ITK TOPNAV --> <!-- begin of ITK left NAV --><!-- BEGIN LEFT NAV --> <table width=99% border="0" cellpadding="2" cellspacing="0"> <tr> <td bgcolor="#ffffff" width=120 valign="top" rowspan=8> <form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi"> <INPUT TYPE="hidden" NAME="Action" VALUE="Search"> <INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm"> <INPUT TYPE="hidden" NAME="Collection" VALUE="ITK"> <INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts"> <img src="/images/search5.gif" width=115 height=27 alt="" border="0"><br> <img src="/images/white.gif" width="1" height="5" alt="" border="0"><br> <table width="116" height="135" bgcolor="#e0e0e0" border="1" bordercolor="#006666" cellpadding="3" cellspacing="0"> <tr> <td width="116"><input type="text" name="metaqueryText" value="" size="8"> <input type="submit" name="submitbutton" value="Go!"> <INPUT type="hidden" NAME="section_on" VALUE="on"> <font face="Arial,helvetica" size="1"> <SELECT NAME="metatags" style="font-size: 10; font-family: sans-serif;" size="1"> <option value="keyword" SELECTED>Keyword <option value="vstitle">Title <option value="vsauthor">Author <option value="vsisbn">ISBN <option value="vspublisher">Publisher <option value="vsimprint">Imprint </SELECT></font><br> <input type="radio" name="ResultTemplate" value="itk-brief.hts" checked style="background-color: #e0e0e0;"><font face="arial, helvetica" color="#006666" size="1">Brief</font> <input type="radio" name="ResultTemplate" value="itk-full.hts" style="background-color: #e0e0e0;"><font face="arial, helvetica" color="#006666" size="1">Full</font><br> <font face="arial, helvetica" size="1"> <img src="/images/bullet.gif" width=5 height=5 hspace="5" alt="" border="0"> <a href="/search/"><font color="#006666">Advanced</font></a><br> <a href="/search/"><font color="#006666">Search</font></a><br> <img src="/images/bullet.gif" width=5 height=5 hspace="5" alt="" border="0"> <a href="/search/search-tips.html"><font color="#006666">Search Tips</font></a> </font></td></tr></table> </form><!-- BROWSE BY TOPIC --> <form action="" name="catlist"> <img src="/images/browse5.gif" width=115 height=34 alt="" border="0"><table width="120" height="32" border="1" cellspacing="0" cellpadding="3" bordercolor="#006666" bgcolor="#e0e0e0"> <tr> <td width="117" align="center"> <font face="Arial,helvetica" size="1"> <SELECT NAME="cat" onChange='top.location.href=this.options[selectedIndex].value;' style="font-size: 10; font-family: sans-serif;"> <option value="" selected>Please Select <option value="">----------- <option value="/reference/dir.components.html">Components <option value="/reference/dir.contentmanagement.html">Content Mgt <option value="/reference/dir.certification1.html">Certification <option value="/reference/dir.databases.html">Databases <option value="/reference/dir.enterprisemanagement1.html">Enterprise Mgt <option value="/reference/dir.funandgames1.html">Fun/Games <option value="/reference/dir.groupwareandcollaboration1.html">Groupware <option value="/reference/dir.hardware1.html">Hardware <option value="/reference/dir.intranetandextranetdevelopment1.html">Intranet Dev <option value="/reference/dir.middleware.html">Middleware <option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia <option value="/reference/dir.networkservices1.html">Networks <option value="/reference/dir.operatingsystems.html">OS <option value="/reference/dir.productivityapplications1.html">Prod Apps <option value="/reference/dir.programminglanguages.html">Programming <option value="/reference/dir.security1.html">Security <!-- <option value="/reference/dir.ewtraining1.html">Training Guides --> <option value="/reference/dir.userinterfaces.html">UI <option value="/reference/dir.webservices.html">Web Services <option value="/reference/dir.webmasterskills1.html">Webmaster <option value="/reference/dir.y2k1.html">Y2K <option value="">----------- <option value="/reference/whatsnew.html">New Titles <option value="">----------- <option value="/reference/dir.archive1.html">Free Archive </SELECT> </font></td> </tr> </table> </form><!-- LEFT NAV SEARCH END --> </td> <!-- PUB PARTNERS END --><!-- END LEFT NAV --><td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td><td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td><!-- end of ITK left NAV --><!-- begin main content --><td width="100%" valign="top" align="left"><!-- END SUB HEADER --><!--Begin Content Column --><FONT FACE="Arial,Helvetica" SIZE="-1">To access the contents, click the chapter and section titles.</FONT><P><B>Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)</B><FONT SIZE="-1"><BR><I>(Publisher: John Wiley & Sons, Inc.)</I><BR>Author(s): Bruce Schneier<BR>ISBN: 0471128457<BR>Publication Date: 01/01/96</FONT><P><form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi"><INPUT TYPE="hidden" NAME="Action" VALUE="Search"><INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm"><INPUT TYPE="hidden" NAME="Collection" VALUE="ITK"><INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts"><INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts"><font face="arial, helvetica" size=2><b>Search this book:</b></font><br><INPUT NAME="queryText" size=50 VALUE=""> <input type="submit" name="submitbutton" value="Go!"><INPUT type=hidden NAME="section_on" VALUE="on"><INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471128457/"></form><!-- Empty Reference Subhead --><!--ISBN=0471128457//--><!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//--><!--AUTHOR=Bruce Schneier//--><!--PUBLISHER=Wiley Computer Publishing//--><!--CHAPTER=Index//--><!--PAGES=743-758//--><!--UNASSIGNED1//--><!--UNASSIGNED2//--><CENTER><TABLE BORDER><TR><TD><A HREF="appendix-b.html">Previous</A></TD><TD><A HREF="ewtoc.html">Table of Contents</A></TD><TD><A HREF="ewtoc.html">Next</A></TD></TR></TABLE></CENTER><P><BR></P><H2><A NAME="Heading1"></A><FONT COLOR="#000077">Index</FONT></H2><DL><DD>A5, 389, 662–667<DD>Abadi, Martin, 66<DD>Absolute rate, of language, 234<DD>Accreditation, 103<DD>Active attacks, 27<DD>Active cheaters, 27<DD>Adams, Carlisle, 334<DD>Adaptive-chosen-plaintext attack, 6<DD>Addition chaining, 244<DD>Additive generators, 390–392<DD>Adjudicated protocol, 26, 71<DD>Adjudicator, 26<DD>Adleman, Leonard M., 163–164, 467<DD>Adler, Roy, 266<DD>Agnew, G. B., 423<DD>Algebraic structure, DES, 282–283<DD>Algorithm M, 393–394<DD>Algorithms, 2–4, 17<DL><DD>all-or-nothing disclosure of secrets, 543–546<DD>Asmuth-Bloom, 529–530<DD>Barrett’s, 244<DD>Berlekamp-Massey algorithm, 380, 404<DD>block<DL><DD>chain mode, 206–207<DD>choosing, 354–355<DD>replay, 191–193</DL><DD>breaking, 8<DD>CAST, 334–335<DD>choosing, 214–216<DD>cipher block chaining mode, 193–197, 208–210<DD>cipher block chaining of plaintext difference mode, 208<DD>cipher block chaining with checksum, 207–208<DD>cipher-feedback mode, 200–202, 208–210<DD>cipher mode<DL><DD>choosing, 208–210<DD>summary, 209</DL><DD>classes, 217<DD>coin flipping<DL><DD>using Blum integers, 543<DD>using exponentiation modulo <I>p</I>, 542–543<DD>using square roots, 541–542</DL><DD>complexity, 237–239<DD>constant, 238<DD>convertible undeniable signatures, 538–539<DD>counter mode, 205–206, 209<DD>cubic, 238<DD>data compression, 226<DD>designated confirmer signatures, 539–540<DD>Diffie-Hellman, fair, 546–547<DD>digital signatures, 39<DD>exponential, 238<DD>for export, 215–216<DD>extended Euclidean, 246–248<DD>factoring, 256<DD>ISO/IEC 9979 registered, 607<DD>Karnin-Greene-Hellman, 530<DD>Khafre, 317–318<DD>Khufu, 317<DD>linear, 238<DD>linear syndrome, 381<DD>modes, DES, 277–278<DD>multiple block<DL><DD>cascading, 367–368<DD>combining, 368</DL><DD>multiple-key public-key cryptography, 527–528<DD>oblivious transfer, 550<DD>one-way accumulators, 543<DD>output-feedback mode, 203–205, 208–210<DD>output feedback with a nonlinear function, 208<DD>plaintext block chaining mode, 208<DD>plaintext feedback mode, 208<DD>polynomial, 238<DD>polynomial-time, 238<DD>probabilistic encryption, 552–554<DD>propagating cipher block chaining mode, 207<DD>public-key, 4–5, 33<DD>quadratic, 238<DD>quantum cryptography, 554–557<DD>restricted, 3<DD>running times, 238–239<DD>secret-sharing algorithms, 528–531<DD>secure multiparty computation, 551–552</DL><DD>Algorithms (<I>Cont.</I>)<DL><DD>security, 8–9<DD>self-synchronizing stream cipher, 198–199<DD>stream ciphers, 197–198<DD>subliminal-channel signature, 79<DD>superpolynomial, 238<DD>symmetric, 4<DD>synchronous stream cipher, 202–203<DD>TEA, 346<DD>types, 189<DD>unconditionally secure, 8<DD>undeniable digital signatures, 536–539<DD>using, 213–229<DD>vector scheme, 529<DD>zero-knowledge proofs, 548–550<DD><I>See also</I> Block ciphers; Stream ciphers</DL><DD>All-or-nothing disclosure of secrets, 96, 543–546<DL><DD>voting with a single central facility, 128–130</DL><DD>Alternating stop-and-go generator, 383, 385, 410–411<DD>American National Standards Institute, DES approval, 267–268<DD>Anderson, Ross, 391<DD>ANDOS, <I>see</I> All-or-nothing disclosure of secrets<DD>Anonymous message broadcast, 137–139<DD>ANSI X3.105, 267<DD>ANSI X3.106, 267<DD>ANSI X9.8, 267<DD>ANSI X9.17, 268, 359<DL><DD>key generation, 175</DL><DD>ANSI X9.19, 267<DD>ANSI X9.26, 268<DD>Arbitrated protocol, 23–26<DD>Arbitration, timestamping, 75–76<DD>Arbitrator, 23<DL><DD>document signing with, 35–37<DD>group signatures with, 84–85</DL><DD>AR hash function, 453<DD>Arithmetic, modular, 242–245<DD>Arms Export Control Act, 610<DD>Asmuth-Bloom scheme, 529–530<DD>Association for Computing Machinery, 608<DD>Asymmetric algorithms, <I>see</I> Public-key algorithms<DD>Atomic Energy Act, 610<DD>Attack, 5<DD>AT&T Model 3600 Telephone Security Device, 594–595<DD>Authentication, 2, 52–56<DL><DD>DASS, 62<DD>Denning-Sacco protocol, 63<DD>dictionary attacks, 52<DD>ISO framework, 574–577<DD>Kerberos, 60<DD>message, 56<DD>Needham-Schroeder protocol, 58–59<DD>Neuman-Stubblebine protocol, 60–62<DD>Otway-Rees protocol, 59–60<DD>protocols, formal analysis, 65–68<DD>salt, 52–53<DD>Schnorr, 511<DD>SESAME, 572<DD>SKEY, 53
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -