📄 book-index.html
字号:
<DD>using square roots, 541–542
</DL>
<DD>Collision, 166
<DD>Collision-free, 30
<DD>Collision-resistance, 429
<DD>Combination generator, 381
<DD>Combining function, 381
<DD>Commercial COMSEC Endorsement Program, 269, 598–599
<DD>Commercial Data Masking Facility, 366, 574
<DD>Common Cryptographic Architecture, 573–574
<DD>Common modulus, dangers of, 493
<DD>Common modulus attack, RSA, 472
<DD>Communications:
<DL>
<DD>using public-key cryptography, 31–34
<DD>using symmetric cryptography, 28–29
</DL>
<DD>Communications channels, encryption, 216–220
<DD>Communications Setup, 517–518
<DD>Complementation property, 281
<DD>Complement keys, DES, 281–282
<DD>Completely blind signatures, 112–113
<DD>Complete set of residues, 242
<DD>Complexity-theoretic approach, stream ciphers, 415–418
<DD>Complexity theory, 237–242
<DL>
<DD>algorithms, 237–239
<DD>complexity of problems, 239–241
</DL>
<DD>Compression, 226
<DD>Compression function, 431
<DD>Compression permutation, 273–274
<DD>Compromise, 5
<DD>Compromised keys, 182–183
<DD>Computational complexity, 237
<DD>Computationally secure, 8
<DD>Computer algorithms, 17
<DD>Computer clock, as random-sequence generator, 424
<DD>Computer Security Act of 1987, 600–601
<DD>Computing, with encrypted data, 85–86, 540–541
<DD>COMSET, 517–518
<DD>Conditional Access for Europe, 606–607
<DD>Conference key distribution, 524
<DD>Confusion, 237, 346–347
<DD>Congruent, 242
<DD>Connection integer, 403
<DL>
<DD>feedback with carry shift registers, maximal-period, 406–407
</DL>
<DD>Continued fraction algorithm, 256
<DD>Contract signing, simultaneous:
<DL>
<DD>with an arbitrator, 118
<DD>without an arbitrator
<DL>
<DD>face-to-face, 118–119
<DD>not face-to-face, 119–120
<DD>using cryptography, 120–122
</DL>
</DL>
<DD>Control Vector, 180
<DD>Convertible undeniable signatures, 538–539
<DD>Coppersmith, Don, 94, 266, 280, 283, 293, 398, 457
<DD>Coppersmith’s algorithm, 263
<DD>Correlation attack, 380
<DD>Correlation immunity, stream ciphers, 380
<DD>Correlations, random-sequence generators, 425
<DD>Counter mode, 205–206, 209
<DD>Counting coincidences, 14
<DD>Crab, 342–344
<DD>Credit cards, anonymous, 147
<DD>Crepeau, Claude, 555
<DD>Crypt(1), 414
<DD>CRYPT(3), 296
<DD>Cryptanalysis, 1, 5–8
<DL>
<DD>differential, <I>see</I> Differential cryptanalysis
<DD>FEAL, 311–312
<DD>GOST, 333–334
<DD>IDEA, 323
<DD>linear, 290–293
<DD>LOKI91, 316
<DD>Madryga, 306
<DD><I>N</I>-Hash, 434–435
<DD>related-key, 290
<DD>Snefru, 432
<DD>types, 5–7
</DL>
<DD>Cryptanalysts, 1
<DD>Crypt Breakers Workbench, 414
<DD>Cryptographers, 1
<DD>Cryptographic algorithm, <I>see</I> Cipher
<DD>Cryptographically secure pseudo-random, 45
<DD>Cryptographic facility, 562
<DD>Cryptographic mode, 189
<DD>Cryptographic protection, databases, 73–74
<DD>Cryptographic protocol, 22
<DD>Cryptography, 1
<DD>CRYPTO-LEGGO, 414
<DD>Cryptologists, 1
<DD>Cryptology, 1
<DD>CRYPTO-MECCANO, 346
<DD>Cryptosystems, 4
<DL>
<DD>fair, 97
<DD>finite automaton public-key, 482
<DD>hybrid, 32–34
<DD>security, 234–235
<DD>weak, 97
</DL>
<DD>Cusick, Thomas, 312
<DD>Cut and choose, 103
<DD>Cypherpunks, 609
<DD>Daemen, Joan, 325, 341, 349, 414
<DD>Damgard, Ivan, 446
<DD>Damm, Arvid Gerhard, 13
<DD>Data, encrypted:
<DL>
<DD>computing with, 85–86, 540–541
<DD>discrete logarithm problem, 540–541
<DD>for storage, 220–222
</DL>
<DD>Databases, cryptographic protection, 73–74
<DD>Data complexity, 9
<DD>Data Encryption Algorithm, <I>see</I> Data Encryption Standard
<DD>Data Encryption Standard, 17, 265–301
<DL>
<DD>adoption, 267–268
<DD>algorithm, brute-force attack efficiency, 152–153
<DD>characteristics, 286–288
<DD>commercial chips, 279
<DD>compared to GOST, 333–334
<DD>compression permutation, 273–274
<DD>CRYPT(3), 296
<DD>decryption, 277
<DD>description, 270
<DD>DESX, 295
<DD>development, 265–267
<DD>differential cryptanalysis, 284–290
<DL>
<DD>DES variants, 298
</DL>
<DD>expansion permutation, 273–275
<DD>final permutation, 277
<DD>generalized, 296–297
<DD>hardware and software implementation, 278–279
<DD>with independent subkeys, 295
<DD>initial permutation, 271
<DD>iterated block cipher, 347
<DD>key transformation, 272–273
<DD>linear cryptanalysis, 290–293
<DD>modes, 277–278
<DD>multiple, 294–295
<DD>1987 review, 268–269
<DD>1993 review, 269–270
<DD>outline of algorithm, 270–272
<DD>P-boxes
<DL>
<DD>design criteria, 294
<DD>permutation, 275, 277
</DL>
<DD>RDES, 297–298
<DD>related-key cryptanalysis, 290
<DD>RIPE-MAC, 457–458
<DD>S-boxes, 349
<DL>
<DD>alternate, 296–298
<DD>design criteria, 294
<DD>key-dependent, 298, 300, 354
<DD>substitution, 274–276
</DL>
<DD>security, 278, 280–285
<DL>
<DD>algebraic structure, 282–283
<DD>complement keys, 281–282
<DD>current, 300–301
<DD>key length, 283–284
<DD>number of rounds, 284
<DD>possibly weak keys, 281–282
<DD>S-box design, 284–285
<DD>semiweak keys, 280–281
<DD>weak keys, 280–281
</DL>
<DD><I>sn</I>DES, 298–299
<DD>source code, 623–632
<DD>speeds on microprocessors and computers, 279
<DD>validation and certification of equipment, 268
</DL>
<DD>Data Exchange Key, 581
<DD>Data Keys, 176
<DD>Davies, Donald, 562
<DD>Davies-Meyer, 448
<DL>
<DD>abreast, 452
<DD>modified, 449–450
<DD>parallel, 451
<DD>tandem, 451–452
</DL>
<DD>Davies-Price, 358
<DD>Decoherence, 165
<DD>Decryption, 1
<DL>
<DD>DES, 277
<DD>key, 3
<DD>key-error detection, 179
<DD>knapsack algorithms, 465
<DD>with a public key, 39
<DD>with symmetric algorithm, 4
</DL>
<DD>den Boer, Bert, 434, 436, 441
<DD>Denning-Sacco protocol, 63
<DD>Dense, 378
<DD>Dereferencing keys, 221–222
<DD>Derived sequence attack, 381
<DD>Designated confirmer signatures, 82–83, 539–540
<DD>Desmedt, Yvo, 81
<DD>DES, <I>see</I> Data Encryption Standard
<DD>Destruction:
<DL>
<DD>information, 228–229
<DD>of keys, 184–185
</DL>
<DD>DESX, 295
<DD>Dictionary attack, 52, 171–173
<DD>Differential cryptanalysis, 284–290
<DL>
<DD>attacks against
<DL>
<DD>DES, 288–290
<DD>DES variants, 298
<DD>Lucifer, 303
</DL>
<DD>extending to higher-order differentials, 293
<DD>strength against, block cipher design theory, 348–349
</DL>
<DD>Differential-linear cryptanalysis, 293
<DD>Diffie, Whitfield, 31, 37, 122, 216, 283, 419, 461, 501, 565
<DD>Diffie-Hellman:
<DL>
<DD>EKE implementation, 519–520
<DD>extended, 515
<DD>failsafe, 547–548fair, 546–547
<DD>Hughes variant, 515
<DD>key exchange without exchanging keys, 515
<DD>patents, 516
<DD>with three or more parties, 514
</DL>
<DD>Diffie’s randomized stream cipher, 419
<DD>Diffusion, 237, 346–347
<DD>Digital card, properties, 146
<DD>Digital cash, 139–147
<DL>
<DD>anonymous, 139
<DL>
<DD>credit cards, 147
<DD>money orders, 140
</DL>
<DD>double spending problem, 140–141
<DD>off-line systems, 146
<DD>on-line systems, 145–146
<DD>other protocols, 145–147
<DD>perfect crime, 145
<DD>practical, 145
<DD>secret splitting, 142–145
</DL>
<DD>Digital certified mail, 122–123
<DD>Digital Notary System, 78
<DD>Digital Signature Algorithm, 17, 483–494
<DL>
<DD>attacks against <I>k</I>, 492
<DD>computation time comparison with RSA, 489
<DD>criticisms, 484–486
<DD>dangers of common modulus, 493
<DD>description, 486–488
<DD>ElGamal encryption with, 490–491
<DD>patents, 493–494
<DD>prime generation, 488–490
<DD>proposal for NIST standard, 483–486
<DD>RSA encryption with, 491
<DD>security, 491–492
<DD>speed precomputations, 487–488
<DD>subliminal channel, 493, 534–536
<DL>
<DD>foiling, 536
</DL>
<DD>variants, 494–495
</DL>
<DD>Digital signatures, 34–41
<DL>
<DD>algorithms, 39
<DD>applications, 41
<DD>blind, 112–115, 549–550
<DD>convertible undeniable signatures, 538–539
<DD>converting identification schemes to, 512
<DD>definition, 39
<DD>designated confirmer signatures, 82–83, 539–540
<DD>ElGamal, 476–478
<DD>with encryption, 41–44
<DD>entrusted undeniable, 82
<DD>fail-stop, 85
<DD>Fiat-Shamir signature scheme, 507–508
<DD>group signatures, 84–85
<DD>Guillou-Quisquater signature scheme, 509–510
<DD>improved arbitrated solution, 76
<DD>key exchange with, 50
<DD>multiple, 39–40
<DL>
<DD>Guillou-Quisquater, 510
</DL>
<DD>nonrepudiation, 40
<DD>oblivious, 117
<DD>protocol, 40
<DD>proxy, 83
<DD>public-key algorithms, 483–502
<DL>
<DD>Cade algorithm, 500–501
<DD>cellular automata, 500
<DD>Digital Signature Algorithm, <I>see</I> Digital Signature Algorithm
<DD>discrete logarithm signature schemes, 496–498
<DD>ESIGN, 499–500
<DD>GOST digital signature algorithm, 495–496
</DL>
</DL>
<DD>Digital signatures (<I>Cont.</I>)
<DL>
<DD>public-key algorithms (<I>Cont.</I>)
<DL>
<DD>Matsumoto-Imai algorithm, 500
<DD>Ong-Schnorr-Shamir, 498–499
</DL>
<DD>public-key cryptography, 37–38
<DL>
<DD>attacks against, 43–44
<DD>one-way hash functions and, 38–39
</DL>
<DD>resend attack, foiling, 43
<DD>RSA, 473–474
<DD>Schnorr signature scheme, 511–512
<DD>subliminal-free, 80
<DD>with symmetric cryptosystems and arbitrator, 35–37
<DD>terminology, 39
<DD>timestamps, 38
<DD>trees, 37
<DD>undeniable, 81–82, 536–539
</DL>
<DD>Dining Cryptographers Problem, 137
<DD>Discrete logarithm, 245
<DL>
<DD>in finite field, 261–263
<DD>zero-knowledge proofs, 548
</DL>
<DD>Discrete Logarithm Problem, 501, 540–541
<DD>Discrete logarithm signature schemes, 496–498
<DD>Distributed Authentication Security Service, 62
<DD>Distributed convertible undeniable signatures, 539
<DD>Distributed key management, 187
<DD>DNA computing, 163–164
<DD>DNRSG, 387
<DD>DoD key generation, 175
<DD>Double encryption, 357–358
<DD>Double OFB/counter, 363–364
<DD>Double spending problem, 140–141
<DD>Driver-level encryption, 222–223
<DD>DSA, <I>see</I> Digital Signature Algorithm
<DD>Dynamic random-sequence generator, 387
<DD>E-box, 273
<DD>ECB, <I>see</I> Electronic codebook mode
<DD>Electronic checks, 146
<DD>Electronic codebook mode, 189–191, 208–210
<DL>
<DD>combined with OFB, 364
<DD>DES, 277–278padding, 190–191
<DD>triple encryption, 362–363
</DL>
<DD>Electronic coins, 146
<DD>Electronic Frontier Foundation, 608
<DD>Electronic-funds transfer, DES adoption, 268
<DD>Electronic Privacy Information Center, 608
<DD>ElGamal, 532–533
<DL>
<DD>EKE implementation, 519
<DD>encryption, 478
<DL>
<DD>with DSA, 490–491
</DL>
<DD>patents, 479
<DD>signatures, 476–478
<DD>speed, 478–479
</DL>
<DD>ElGamal, Taher, 263
<DD>Elliptic curve cryptosystems, 480–481
<DD>Elliptic curve method, 256
<DD>Ellison, Carl, 362
<DD>Encoding, 226
<DD>Encrypt-decrypt-encrypt mode, 359
<DD>Encrypted Key Exchange:
<DL>
<DD>applications, 521–522
<DD>augmented, 520–521
<DD>basic protocol, 518–519
<DD>implementation with
<DL>
<DD>Diffie-Hellman, 519–520
<DD>ElGamal, 519
<DD>RSA, 519
</DL>
<DD>strengthening, 520
</DL>
<DD>Encryption, 1
<DL>
<DD>communication channels, 216–220
<DL>
<DD>combining link-by-link and end-to-end, 219–221
</DL>
<DD>with compression and error control, 226
<DD>data, for storage, 220–222
<DD>detection, 226–227
<DD>digital signatures with, 41–44
<DD>driver-level versus file-level, 222–223
<DD>ElGamal, 478
<DL>
<DD>with DSA, 490–491
</DL>
<DD>end-to-end, 217–220
<DD>with interleaving, 210–211
<DD>key, 3
<DD>knapsack algorithms, 464
<DD>link-by-link, 216–218
<DD>multiple, 357
<DD>with a private key, 39
<DD>probabilistic, 552–554
<DD>RSA, 468
<DL>
<DD>with DSA, 491
</DL>
<DD>with symmetric algorithm, 4
<DD>using public key, 5
</DL>
<DD>End-to-end encryption, 217–220
<DL>
<DD>combined with link-by-link, 219–221
</DL>
<DD>Enigma, 13, 414
<DD>Entropy, 233–234
<DD>Entrusted undeniable signature, 82
<DD>Error detection:
<DL>
<DD>during decryption, 179
<DD>during transmission, 178
</DL>
<DD>Error extension, cipher block chaining mode, 196
<DD>Error propagation:
<DL>
<DD>cipher block chaining mode, 195–196
<DD>cipher-feedback mode, 201–202
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -