⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 book-index.html

📁 应用密码学电子书籍
💻 HTML
📖 第 1 页 / 共 5 页
字号:
<DD>using square roots, 541&#150;542
</DL>
<DD>Collision, 166
<DD>Collision-free, 30
<DD>Collision-resistance, 429
<DD>Combination generator, 381
<DD>Combining function, 381
<DD>Commercial COMSEC Endorsement Program, 269, 598&#150;599
<DD>Commercial Data Masking Facility, 366, 574
<DD>Common Cryptographic Architecture, 573&#150;574
<DD>Common modulus, dangers of, 493
<DD>Common modulus attack, RSA, 472
<DD>Communications:
<DL>
<DD>using public-key cryptography, 31&#150;34
<DD>using symmetric cryptography, 28&#150;29
</DL>
<DD>Communications channels, encryption, 216&#150;220
<DD>Communications Setup, 517&#150;518
<DD>Complementation property, 281
<DD>Complement keys, DES, 281&#150;282
<DD>Completely blind signatures, 112&#150;113
<DD>Complete set of residues, 242
<DD>Complexity-theoretic approach, stream ciphers, 415&#150;418
<DD>Complexity theory, 237&#150;242
<DL>
<DD>algorithms, 237&#150;239
<DD>complexity of problems, 239&#150;241
</DL>
<DD>Compression, 226
<DD>Compression function, 431
<DD>Compression permutation, 273&#150;274
<DD>Compromise, 5
<DD>Compromised keys, 182&#150;183
<DD>Computational complexity, 237
<DD>Computationally secure, 8
<DD>Computer algorithms, 17
<DD>Computer clock, as random-sequence generator, 424
<DD>Computer Security Act of 1987, 600&#150;601
<DD>Computing, with encrypted data, 85&#150;86, 540&#150;541
<DD>COMSET, 517&#150;518
<DD>Conditional Access for Europe, 606&#150;607
<DD>Conference key distribution, 524
<DD>Confusion, 237, 346&#150;347
<DD>Congruent, 242
<DD>Connection integer, 403
<DL>
<DD>feedback with carry shift registers, maximal-period, 406&#150;407
</DL>
<DD>Continued fraction algorithm, 256
<DD>Contract signing, simultaneous:
<DL>
<DD>with an arbitrator, 118
<DD>without an arbitrator
<DL>
<DD>face-to-face, 118&#150;119
<DD>not face-to-face, 119&#150;120
<DD>using cryptography, 120&#150;122
</DL>
</DL>
<DD>Control Vector, 180
<DD>Convertible undeniable signatures, 538&#150;539
<DD>Coppersmith, Don, 94, 266, 280, 283, 293, 398, 457
<DD>Coppersmith&#146;s algorithm, 263
<DD>Correlation attack, 380
<DD>Correlation immunity, stream ciphers, 380
<DD>Correlations, random-sequence generators, 425
<DD>Counter mode, 205&#150;206, 209
<DD>Counting coincidences, 14
<DD>Crab, 342&#150;344
<DD>Credit cards, anonymous, 147
<DD>Crepeau, Claude, 555
<DD>Crypt(1), 414
<DD>CRYPT(3), 296
<DD>Cryptanalysis, 1, 5&#150;8
<DL>
<DD>differential, <I>see</I> Differential cryptanalysis
<DD>FEAL, 311&#150;312
<DD>GOST, 333&#150;334
<DD>IDEA, 323
<DD>linear, 290&#150;293
<DD>LOKI91, 316
<DD>Madryga, 306
<DD><I>N</I>-Hash, 434&#150;435
<DD>related-key, 290
<DD>Snefru, 432
<DD>types, 5&#150;7
</DL>
<DD>Cryptanalysts, 1
<DD>Crypt Breakers Workbench, 414
<DD>Cryptographers, 1
<DD>Cryptographic algorithm, <I>see</I> Cipher
<DD>Cryptographically secure pseudo-random, 45
<DD>Cryptographic facility, 562
<DD>Cryptographic mode, 189
<DD>Cryptographic protection, databases, 73&#150;74
<DD>Cryptographic protocol, 22
<DD>Cryptography, 1
<DD>CRYPTO-LEGGO, 414
<DD>Cryptologists, 1
<DD>Cryptology, 1
<DD>CRYPTO-MECCANO, 346
<DD>Cryptosystems, 4
<DL>
<DD>fair, 97
<DD>finite automaton public-key, 482
<DD>hybrid, 32&#150;34
<DD>security, 234&#150;235
<DD>weak, 97
</DL>
<DD>Cusick, Thomas, 312
<DD>Cut and choose, 103
<DD>Cypherpunks, 609
<DD>Daemen, Joan, 325, 341, 349, 414
<DD>Damgard, Ivan, 446
<DD>Damm, Arvid Gerhard, 13
<DD>Data, encrypted:
<DL>
<DD>computing with, 85&#150;86, 540&#150;541
<DD>discrete logarithm problem, 540&#150;541
<DD>for storage, 220&#150;222
</DL>
<DD>Databases, cryptographic protection, 73&#150;74
<DD>Data complexity, 9
<DD>Data Encryption Algorithm, <I>see</I> Data Encryption Standard
<DD>Data Encryption Standard, 17, 265&#150;301
<DL>
<DD>adoption, 267&#150;268
<DD>algorithm, brute-force attack efficiency, 152&#150;153
<DD>characteristics, 286&#150;288
<DD>commercial chips, 279
<DD>compared to GOST, 333&#150;334
<DD>compression permutation, 273&#150;274
<DD>CRYPT(3), 296
<DD>decryption, 277
<DD>description, 270
<DD>DESX, 295
<DD>development, 265&#150;267
<DD>differential cryptanalysis, 284&#150;290
<DL>
<DD>DES variants, 298
</DL>
<DD>expansion permutation, 273&#150;275
<DD>final permutation, 277
<DD>generalized, 296&#150;297
<DD>hardware and software implementation, 278&#150;279
<DD>with independent subkeys, 295
<DD>initial permutation, 271
<DD>iterated block cipher, 347
<DD>key transformation, 272&#150;273
<DD>linear cryptanalysis, 290&#150;293
<DD>modes, 277&#150;278
<DD>multiple, 294&#150;295
<DD>1987 review, 268&#150;269
<DD>1993 review, 269&#150;270
<DD>outline of algorithm, 270&#150;272
<DD>P-boxes
<DL>
<DD>design criteria, 294
<DD>permutation, 275, 277
</DL>
<DD>RDES, 297&#150;298
<DD>related-key cryptanalysis, 290
<DD>RIPE-MAC, 457&#150;458
<DD>S-boxes, 349
<DL>
<DD>alternate, 296&#150;298
<DD>design criteria, 294
<DD>key-dependent, 298, 300, 354
<DD>substitution, 274&#150;276
</DL>
<DD>security, 278, 280&#150;285
<DL>
<DD>algebraic structure, 282&#150;283
<DD>complement keys, 281&#150;282
<DD>current, 300&#150;301
<DD>key length, 283&#150;284
<DD>number of rounds, 284
<DD>possibly weak keys, 281&#150;282
<DD>S-box design, 284&#150;285
<DD>semiweak keys, 280&#150;281
<DD>weak keys, 280&#150;281
</DL>
<DD><I>sn</I>DES, 298&#150;299
<DD>source code, 623&#150;632
<DD>speeds on microprocessors and computers, 279
<DD>validation and certification of equipment, 268
</DL>
<DD>Data Exchange Key, 581
<DD>Data Keys, 176
<DD>Davies, Donald, 562
<DD>Davies-Meyer, 448
<DL>
<DD>abreast, 452
<DD>modified, 449&#150;450
<DD>parallel, 451
<DD>tandem, 451&#150;452
</DL>
<DD>Davies-Price, 358
<DD>Decoherence, 165
<DD>Decryption, 1
<DL>
<DD>DES, 277
<DD>key, 3
<DD>key-error detection, 179
<DD>knapsack algorithms, 465
<DD>with a public key, 39
<DD>with symmetric algorithm, 4
</DL>
<DD>den Boer, Bert, 434, 436, 441
<DD>Denning-Sacco protocol, 63
<DD>Dense, 378
<DD>Dereferencing keys, 221&#150;222
<DD>Derived sequence attack, 381
<DD>Designated confirmer signatures, 82&#150;83, 539&#150;540
<DD>Desmedt, Yvo, 81
<DD>DES, <I>see</I> Data Encryption Standard
<DD>Destruction:
<DL>
<DD>information, 228&#150;229
<DD>of keys, 184&#150;185
</DL>
<DD>DESX, 295
<DD>Dictionary attack, 52, 171&#150;173
<DD>Differential cryptanalysis, 284&#150;290
<DL>
<DD>attacks against
<DL>
<DD>DES, 288&#150;290
<DD>DES variants, 298
<DD>Lucifer, 303
</DL>
<DD>extending to higher-order differentials, 293
<DD>strength against, block cipher design theory, 348&#150;349
</DL>
<DD>Differential-linear cryptanalysis, 293
<DD>Diffie, Whitfield, 31, 37, 122, 216, 283, 419, 461, 501, 565
<DD>Diffie-Hellman:
<DL>
<DD>EKE implementation, 519&#150;520
<DD>extended, 515
<DD>failsafe, 547&#150;548fair, 546&#150;547
<DD>Hughes variant, 515
<DD>key exchange without exchanging keys, 515
<DD>patents, 516
<DD>with three or more parties, 514
</DL>
<DD>Diffie&#146;s randomized stream cipher, 419
<DD>Diffusion, 237, 346&#150;347
<DD>Digital card, properties, 146
<DD>Digital cash, 139&#150;147
<DL>
<DD>anonymous, 139
<DL>
<DD>credit cards, 147
<DD>money orders, 140
</DL>
<DD>double spending problem, 140&#150;141
<DD>off-line systems, 146
<DD>on-line systems, 145&#150;146
<DD>other protocols, 145&#150;147
<DD>perfect crime, 145
<DD>practical, 145
<DD>secret splitting, 142&#150;145
</DL>
<DD>Digital certified mail, 122&#150;123
<DD>Digital Notary System, 78
<DD>Digital Signature Algorithm, 17, 483&#150;494
<DL>
<DD>attacks against <I>k</I>, 492
<DD>computation time comparison with RSA, 489
<DD>criticisms, 484&#150;486
<DD>dangers of common modulus, 493
<DD>description, 486&#150;488
<DD>ElGamal encryption with, 490&#150;491
<DD>patents, 493&#150;494
<DD>prime generation, 488&#150;490
<DD>proposal for NIST standard, 483&#150;486
<DD>RSA encryption with, 491
<DD>security, 491&#150;492
<DD>speed precomputations, 487&#150;488
<DD>subliminal channel, 493, 534&#150;536
<DL>
<DD>foiling, 536
</DL>
<DD>variants, 494&#150;495
</DL>
<DD>Digital signatures, 34&#150;41
<DL>
<DD>algorithms, 39
<DD>applications, 41
<DD>blind, 112&#150;115, 549&#150;550
<DD>convertible undeniable signatures, 538&#150;539
<DD>converting identification schemes to, 512
<DD>definition, 39
<DD>designated confirmer signatures, 82&#150;83, 539&#150;540
<DD>ElGamal, 476&#150;478
<DD>with encryption, 41&#150;44
<DD>entrusted undeniable, 82
<DD>fail-stop, 85
<DD>Fiat-Shamir signature scheme, 507&#150;508
<DD>group signatures, 84&#150;85
<DD>Guillou-Quisquater signature scheme, 509&#150;510
<DD>improved arbitrated solution, 76
<DD>key exchange with, 50
<DD>multiple, 39&#150;40
<DL>
<DD>Guillou-Quisquater, 510
</DL>
<DD>nonrepudiation, 40
<DD>oblivious, 117
<DD>protocol, 40
<DD>proxy, 83
<DD>public-key algorithms, 483&#150;502
<DL>
<DD>Cade algorithm, 500&#150;501
<DD>cellular automata, 500
<DD>Digital Signature Algorithm, <I>see</I> Digital Signature Algorithm
<DD>discrete logarithm signature schemes, 496&#150;498
<DD>ESIGN, 499&#150;500
<DD>GOST digital signature algorithm, 495&#150;496
</DL>
</DL>
<DD>Digital signatures (<I>Cont.</I>)
<DL>
<DD>public-key algorithms (<I>Cont.</I>)
<DL>
<DD>Matsumoto-Imai algorithm, 500
<DD>Ong-Schnorr-Shamir, 498&#150;499
</DL>
<DD>public-key cryptography, 37&#150;38
<DL>
<DD>attacks against, 43&#150;44
<DD>one-way hash functions and, 38&#150;39
</DL>
<DD>resend attack, foiling, 43
<DD>RSA, 473&#150;474
<DD>Schnorr signature scheme, 511&#150;512
<DD>subliminal-free, 80
<DD>with symmetric cryptosystems and arbitrator, 35&#150;37
<DD>terminology, 39
<DD>timestamps, 38
<DD>trees, 37
<DD>undeniable, 81&#150;82, 536&#150;539
</DL>
<DD>Dining Cryptographers Problem, 137
<DD>Discrete logarithm, 245
<DL>
<DD>in finite field, 261&#150;263
<DD>zero-knowledge proofs, 548
</DL>
<DD>Discrete Logarithm Problem, 501, 540&#150;541
<DD>Discrete logarithm signature schemes, 496&#150;498
<DD>Distributed Authentication Security Service, 62
<DD>Distributed convertible undeniable signatures, 539
<DD>Distributed key management, 187
<DD>DNA computing, 163&#150;164
<DD>DNRSG, 387
<DD>DoD key generation, 175
<DD>Double encryption, 357&#150;358
<DD>Double OFB/counter, 363&#150;364
<DD>Double spending problem, 140&#150;141
<DD>Driver-level encryption, 222&#150;223
<DD>DSA, <I>see</I> Digital Signature Algorithm
<DD>Dynamic random-sequence generator, 387
<DD>E-box, 273
<DD>ECB, <I>see</I> Electronic codebook mode
<DD>Electronic checks, 146
<DD>Electronic codebook mode, 189&#150;191, 208&#150;210
<DL>
<DD>combined with OFB, 364
<DD>DES, 277&#150;278padding, 190&#150;191
<DD>triple encryption, 362&#150;363
</DL>
<DD>Electronic coins, 146
<DD>Electronic Frontier Foundation, 608
<DD>Electronic-funds transfer, DES adoption, 268
<DD>Electronic Privacy Information Center, 608
<DD>ElGamal, 532&#150;533
<DL>
<DD>EKE implementation, 519
<DD>encryption, 478
<DL>
<DD>with DSA, 490&#150;491
</DL>
<DD>patents, 479
<DD>signatures, 476&#150;478
<DD>speed, 478&#150;479
</DL>
<DD>ElGamal, Taher, 263
<DD>Elliptic curve cryptosystems, 480&#150;481
<DD>Elliptic curve method, 256
<DD>Ellison, Carl, 362
<DD>Encoding, 226
<DD>Encrypt-decrypt-encrypt mode, 359
<DD>Encrypted Key Exchange:
<DL>
<DD>applications, 521&#150;522
<DD>augmented, 520&#150;521
<DD>basic protocol, 518&#150;519
<DD>implementation with
<DL>
<DD>Diffie-Hellman, 519&#150;520
<DD>ElGamal, 519
<DD>RSA, 519
</DL>
<DD>strengthening, 520
</DL>
<DD>Encryption, 1
<DL>
<DD>communication channels, 216&#150;220
<DL>
<DD>combining link-by-link and end-to-end, 219&#150;221
</DL>
<DD>with compression and error control, 226
<DD>data, for storage, 220&#150;222
<DD>detection, 226&#150;227
<DD>digital signatures with, 41&#150;44
<DD>driver-level versus file-level, 222&#150;223
<DD>ElGamal, 478
<DL>
<DD>with DSA, 490&#150;491
</DL>
<DD>end-to-end, 217&#150;220
<DD>with interleaving, 210&#150;211
<DD>key, 3
<DD>knapsack algorithms, 464
<DD>link-by-link, 216&#150;218
<DD>multiple, 357
<DD>with a private key, 39
<DD>probabilistic, 552&#150;554
<DD>RSA, 468
<DL>
<DD>with DSA, 491
</DL>
<DD>with symmetric algorithm, 4
<DD>using public key, 5
</DL>
<DD>End-to-end encryption, 217&#150;220
<DL>
<DD>combined with link-by-link, 219&#150;221
</DL>
<DD>Enigma, 13, 414
<DD>Entropy, 233&#150;234
<DD>Entrusted undeniable signature, 82
<DD>Error detection:
<DL>
<DD>during decryption, 179
<DD>during transmission, 178
</DL>
<DD>Error extension, cipher block chaining mode, 196
<DD>Error propagation:
<DL>
<DD>cipher block chaining mode, 195&#150;196
<DD>cipher-feedback mode, 201&#150;202

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -