⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 book-index.html

📁 Applied Cryptography
💻 HTML
📖 第 1 页 / 共 5 页
字号:
</DL><DD>Ingemarsson, Ingemar, 418<DD>Initialization vector:<DL><DD>cipher block chaining mode, 194<DD>cipher-feedback mode, 201<DD>output-feedback mode, 204</DL><DD>Inner-CBC, 360, 363<DD>Insertion attack, synchronous stream ciphers, 203<DD>Instance deduction, 8<DD>Institute of Electrical and Electronics Engineers, 608<DD>Integrated Services Digital Network, 563&#150;565<DD>Integrity, 2<DD>Interactive protocol, 103<DD>Interchange Key, 581<DD>Interleave, 210&#150;211<DD>Interlock protocol, mutual authentication using, 54&#150;55<DD>Internal feedback, 203<DD>International Association for Cryptologic Research, 605<DD>International Standards Organization:<DL><DD>authentication framework, 574&#150;577<DD>DES adoption, 268</DL><DD>International Traffic in Arms Regulations, 610&#150;614<DD>Internet, Privacy-Enhanced Mail, 577&#150;584<DD>Introducers, 187<DD>Inverses modulo a number, 246&#150;248<DD>IPES, 319<DD>ISDN, 563&#150;565<DD>ISO 8732, 359<DD>ISO 9796, 472, 474, 486<DD>ISO/IEC 9979, 607<DD>ISO X.509 protocols, 574&#150;577<DD>Iterated block cipher, 347<DD>Jacobi symbol, 252&#150;253<DD>J-algebras, 501<DD>Jam, 414<DD>Jennings generator, 383&#150;384<DD>Johnson, David, 241<DD>Jueneman&#146;s methods, 457<DD>Kaliski, Burt, 342<DD>Karn, 351&#150;352<DD>Karn, Phil, 351<DD>Karnin-Greene-Hellman, 530<DD>Kerberos, 60, 566&#150;571<DL><DD>abbreviations, 567<DD>authentication steps, 567<DD>credentials, 568<DD>getting initial ticket, 569<DD>getting server tickets, 569&#150;570<DD>licenses, 571<DD>model, 566<DD>requesting services, 570<DD>security, 571<DD>Version 4, 570&#150;571<DD>Version 5 messages, 568</DL><DD>Kerckhoffs, A., 5<DD>Kerckhoffs&#146;s assumption, 7<DD>Key, 3<DL><DD>backup, 181&#150;182<DD>CDMF shortening, 366<DD>complement, DES, 281&#150;282<DD>compromised, 182&#150;183<DD>controlling usage, 180<DD>dereferencing, 221&#150;222<DD>destroying, 184&#150;185<DD>distribution in large networks, 177<DD>generating, 170&#150;175<DL><DD>ANSI X9.17 standard, 175<DD>DoD, 175<DD>pass phrases, 174&#150;175<DD>poor choices, 171&#150;173<DD>random keys, 173&#150;174<DD>reduced keyspaces, 170&#150;171</DL><DD>ISDN, 563&#150;564<DD>lifetime, 183&#150;184<DD>possibly weak, DES, 281&#150;282<DD>semiweak, DES, 280&#150;281<DD>session, 33, 180<DD>storing, 180&#150;181<DD>transferring, 176&#150;177<DD>transmission, error detection, 178<DD>updating, 180<DD>using, 179&#150;180<DD>verification, 178&#150;179<DD>weak<DL><DD>block ciphers design theory, 348DES, 280&#150;281</DL></DL><DD>Key and message broadcast, 51&#150;52<DD>Key and message transmission, 51<DD>Key Auto-Key, 202<DD>Keyboard latency, as random-sequence generator, 424&#150;425<DD>Key Certification Authority, 43<DD>Key control vectors, 562<DD>Key distribution:<DL><DD>anonymous, 94&#150;95<DD>conference, 524</DL><DD>Key Distribution Center, 43&#150;44<DD>Key-Encryption Keys, 176, 184<DD>Key escrow, 97&#150;100, 181&#150;182, 591<DL><DD>politics, 98&#150;100</DL><DD>Key exchange, 47&#150;52<DL><DD>DASS, 62<DD>Denning-Sacco protocol, 63<DD>with digital signatures, 50<DD>interlock protocol, 49&#150;50<DD>Kerberos, 60<DD>key and message broadcast, 51&#150;52<DD>key and message transmission, 51<DD>man-in-the-middle attack, 48&#150;49<DD>Needham-Schroeder protocol, 58&#150;59<DD>Neuman-Stubblebine protocol, 60&#150;62<DD>Otway-Rees protocol, 59&#150;60<DD>protocols, formal analysis, 65&#150;68<DD>with public-key cryptography, 48<DD>with symmetric cryptography, 47&#150;48<DD>Wide-Mouth Frog protocol, 56&#150;57<DD>without exchanging keys, 515<DD>Woo-Lam protocol, 63&#150;64<DD>Yahalom, 57&#150;58</DL><DD>Key-exchange algorithms:<DL><DD>COMSET, 517&#150;518<DD>conference key distribution and secret broadcasting, 523&#150;525<DD>Diffie-Hellman, 513&#150;516<DD>Encrypted Key Exchange, 518&#150;522<DD>fortified key negotiation, 522<DD>Shamir&#146;s three-pass protocol, 516&#150;517<DD>station-to-station protocol, 516<DD>Tatebayashi-Matsuzaki-Newman, 524&#150;525</DL><DD>Key generation, using coin flipping, 92<DD>Key length:<DL><DD>comparing symmetric and public-key, 165&#150;166<DD>deciding on, 166&#150;167<DD>DES, 283&#150;284<DD>public-key, 158&#150;165<DL><DD>DNA computing, 163&#150;164<DD>quantum computing, 164&#150;165<DD>recommended lengths, 161&#150;163</DL><DD>symmetric, 151&#150;158<DL><DD>biotechnology as cryptanalysis tool, 156&#150;157<DD>brute-force attack, 151&#150;154<DD>Chinese Lottery, 156&#150;157<DD>neural networks, 155<DD>software-based brute-force attacks, 154&#150;155<DD>thermodynamic limitations on brute-force attacks, 157&#150;158<DD>using viruses to spread cracking program, 155&#150;156</DL></DL><DD>Key management, 169&#150;187<DL><DD>distributed, 187<DD>public-key, 185&#150;187</DL><DD>Key negotiation, fortified, 522<DD>Key notarization, 562<DD>Key revocation certificate, 585<DD>Keyspace, 3<DL><DD>flat, 176<DD>nonlinear, 175&#150;176<DD>reduced, 170&#150;171</DL><DD>Keystream generator, 197&#150;198<DL><DD>counter mode, 206<DD>periodic, 202</DL><DD>Khafre, 317&#150;318, 349<DD>Khufu, 317, 349<DD>Kilian, Joe, 116<DD>Kim, Kwangjo, 298, 350<DD>Kinetic Protection Device, 389&#150;390<DD>Klapper, Andy, 404<DD>Klein, Daniel, 53, 171<DD>Knapsack algorithms, 462&#150;466<DL><DD>decryption, 465<DD>encryption, 464<DD>implementations, 465<DD>patents, 466<DD>public key created from private key, 464<DD>security, 465<DD>superincreasing, 463&#150;464<DD>variants, 465&#150;466</DL><DD>Knapsack problem, 501<DD>Known-plaintext attack, 6&#150;7, 151, 359<DD>Knudsen, Lars, 8, 293, 314, 316, 348&#150;349<DD>Knuth, 393, 501<DD>Koblitz, Neal, 480<DD>Konheim, Alan, 266, 280<DD>Kravitz, David, 493<DD>Kravitz-Reed, 481<DD>KryptoKnight, 571&#150;572<DD>Lagged Fibonacci generators, 390<DD>LaGrange interpolating polynomial scheme, 528&#150;529<DD>Lai, Xuejia, 319, 449<DD>Langford, Susan, 293<DD>Law Enforcement Access Field, 591<DD>Legal issues, 618<DD>Legendre symbol, 251<DD>Lehmann, 259<DD>Lehmann algorithm, 259<DD>Length, shift register, 373<DD>Lenstra, Arjen, 159, 162, 257, 485, 488<DD>LFSR/FCSR summation/parity cascade, 410&#150;411<DD>Lidl, Rudolph, 481<DD>Linear complexity:<DL><DD>profile, 380<DD>stream ciphers, 380</DL><DD>Linear congruential generators, 369&#150;372<DL><DD>combining, 371&#150;372<DD>constants, 370</DL><DD>Linear consistency test, 381<DD>Linear cryptanalysis:<DL><DD>DES, 290&#150;293<DD>strength against, block cipher design theory, 348&#150;349</DL><DD>Linear error-correcting codes, algorithms based on, 480<DD>Linear feedback shift registers, 372&#150;379<DL><DD>Galois, 378&#150;379<DD>primitive polynomials mod 2, 376&#150;377<DD>software, 378&#150;379<DD>stream ciphers using, <I>see</I> Stream ciphers</DL><DD>Linear syndrome algorithm, 381<DD>Link-by-link encryption, 216&#150;218<DL><DD>combined with end-to-end, 219&#150;221</DL><DD>Linking protocol, timestamping, 76&#150;77<DD>Li-Wang algorithm, 346<DD>Local deduction, 8<DD>Lock-in, 388<DD>Logarithms, discrete, <I>see</I> Discrete logarithm<DD>LOKI, 314&#150;316<DL><DD>S-boxes, 349<DD>source code, 632&#150;637</DL><DD>LOKI Double-Block, 451<DD>Low decryption exponent attack, RSA, 473<DD>Low encryption exponent attack, RSA, 472&#150;473<DD>Luby, Michael, 352<DD>Luby-Rackoff, 352&#150;353<DL><DD>xDES<SUP>1</SUP>, 365</DL><DD>LUC, 481<DD>Lucas number, 481<DD>Luccio-Mazzone, 501<DD>Lucifer, 266, 303&#150;304<DD>Lu-Lee cryptosystem, 466<DD>Lyndon words, 501<DD>MacGuffin, 346<DD>Madryga, W. E., 304<DD>Mafia Fraud, 110<DD>Magic numbers, 423<DD>Manasse, Mark, 159, 257<DD>Man-in-the-middle attack, 48&#150;49<DD>Masks, REDOC II, 312<DD>Massey, James, 319, 339, 386, 418, 449<DD>Master Key, 561<DD>Master Terminal Key, 561<DD>Matsui, Mitsuru, 290&#150;291<DD>Matsumoto-Imai algorithm, 500<DD>Mauborgne, Joseph, 15<DD>Maurer, Ueli, 419<DD>Maurer&#146;s randomized stream cipher, 419<DD>Maximal period generator, 369<DD>MBAL, 344<DD>McEliece, Robert, 479<DD>McEliece algorithm, 346, 479&#150;480<DD>MD2, 441<DD>MD3, 446<DD>MD4, 435&#150;436<DD>MD5, 436&#150;441<DD>MDC, 353&#150;354<DD>MDC-2, 452&#150;453<DD>MDC-4, 452&#150;454<DD>MD-strengthening, 431<DD>Meet-in-the-middle attack, 358, 381<DD>Mental poker, 92&#150;95<DD>Merkle, Ralph, 34, 316&#150;318, 358&#150;359, 432, 455, 461&#150;462<DD>Merkle&#146;s puzzles, 34<DD>Merritt, Michael, 67, 518, 520&#150;521, 571<DD>Message:<DL><DD>authentication, 56<DD>broadcasting, 69<DD>Privacy-Enhanced Mail, 579&#150;582<DD>recovery, 497&#150;498<DD>resending as receipt, 42&#150;43</DL><DD>Message authentication codes, 31, 455&#150;459<DL><DD>bidirectional, 457<DD>CBC-MAC, 456<DD>IBC-Hash, 458<DD>Jueneman&#146;s methods, 457<DD>message authenticator algorithm, 456&#150;457<DD>one-way hash functions as, 458&#150;459<DD>RIPE-MAC, 457&#150;458<DD>stream ciphers, 459</DL><DD>Message authenticator algorithm, 456&#150;457<DD>Message broadcast, anonymous, 137&#150;139<DD>Message Digest, 435&#150;436<DD>Message Digest Cipher, 353<DD>Message Integrity Check, 578<DD>Message-meaning rule, 66<DD>Message Security Protocol, 584<DD>Meyer, Carl, 266, 278<DD>Meyer, Joseph A., 614<DD>Meyer-Schilling, 452<DD>Micali, Silvio, 94, 508, 546&#150;547, 552<DD>Miller, Gary, 259<DD>Miller, V. S., 480<DD>Mimic functions, 10<DD>Minimum-disclosure proofs, 108<DD>MITRENET, 562&#150;563<DD>Miyaguchi, Shoji, 308<DD>MMB, 325&#150;327<DD>m*n-bit S box, 349<DD>Modular arithmetic, 242&#150;245<DD>Modular Multiplication-based Block cipher, 325&#150;327<DD>Modular reduction, 242<DD>Modulo, inverses, 246&#150;248<DD>Monoalphabetic cipher, 10<DD>Montgomery&#146;s method, 244<DD>Moore&#146;s Law, 153<DD>m-sequence, 374<DD>MSP, 584<DD>Muller, Winfried, 481<DD>Multiparty unconditionally secure protocols, 137<DD>Multiple-bit generator, 421<DD>Multiple encryption, 357<DL><DD>quintuple, 366</DL><DD>Multiple Identity Fraud, 111<DD>Multiple-key public-key cryptography, 527&#150;528<DD>Multiple signatures, 39&#150;40<DD>Multiplier, 369<DD>Multispeed inner-product generator, 386&#150;387<DD>Mush, 392<DD>Mutual shrinking generator, 392<DD>MYK-80, 593&#150;594<DD>Mykotronx Clipper chip, 328<DD>MYK-78T, 591&#150;593<DD>Nanoteq, 390<DD>National Bureau of Standards, <I>see</I> National Institute of Standards and Technology<DD>National Computer Security Center, 599&#150;600<DD>National Institute of Standards and Technology, 600&#150;603<DL><DD>DES development, 265&#150;267<DD>Memorandum of Understanding, 601&#150;603</DL><DD>National Security Agency, 597&#150;599<DL><DD>DES development, 266&#150;267<DD>export of cryptography, 614&#150;615<DD>Memorandum of Understanding, 601&#150;603<DD>S-box development role, 278, 280</DL><DD>Navy Research Laboratory, protocol analyzer, 67&#150;68<DD>Needham, Roger, 58, 66, 216<DD>Needham-Schroeder protocol, 58&#150;59<DD>Networks, large, key distribution, 177<DD>Neuman-Stubblebine protocol, 60&#150;62<DD>Neural networks, breaking algorithms, 155<DD>NewDES, 306&#150;308<DD><I>N</I>-Hash, 433&#150;435<DD>Niederreiter, Harald, 501<DD>Niederreiter algorithm, 480<DD>Niemi cryptosystem, 466<DD>Nobauer, Wilfried, 481<DD>Noise, random, using as random-sequence generator, 423&#150;424<DD>Nonce-verification rule, 66<DD>Non-Interactive Key Sharing systems, 115<DD>Nonlinear-feedback shift registers, 412&#150;413<DD>Nonlinear keyspace, 175&#150;176<DD>Nonrepudiation, 2<DD>Notz, Bill, 266<DD>NP-complete problem, 240&#150;242<DL><DD>graph isomorphism, 104<DD>knapsack algorithms, 462<DD>McEliece algorithm, 479<DD>solving, 163&#150;164</DL><DD>NRL Protocol Analyzer, 67&#150;68<DD>NSDD-145, 268<DD>Nuclear Non-Proliferation Act, 610<DD>Number field sieve, 256<DD>Numbers:<DL><DD>2&#150;adic, 404<DD>large, 17&#150;18</DL><DD>Number theory, 242&#150;255<DL><DD>Barrett&#146;s algorithm, 244<DD>Blum integers, 253<DD>Chinese remainder theorem, 249&#150;250<DD>Euclid&#146;s algorithm, 245<DD>Euler totient function, 248&#150;249<DD>extended Euclidean algorithm, 246&#150;248<DD>Fermat&#146;s little theorem, 248<DD>Galois field, computing in, 254&#150;255<DD>generators, 253&#150;254<DD>greatest common divisor, 245&#150;246<DD>inverses modulo a number, 246&#150;248<DD>Jacobi symbol, 252&#150;253<DD>Legendre symbol, 251<DD>modular arithmetic, 242&#150;245<DD>Montgomery&#146;s method, 244<DD>prime numbers, 245<DD>quadratic residues, 250&#150;251<DD>solving for coefficients, 248</DL><DD>Nyberg, Kaisa, 348

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -