⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 book-index.html

📁 应用密码学电子书籍
💻 HTML
📖 第 1 页 / 共 5 页
字号:
<DD>output-feedback mode, 204
</DL>
<DD>Escrow agencies, 592
<DD>Escrowed Encryption Standard, 97, 593
<DD>ESIGN, 499&#150;500, 533&#150;534
<DD>Euclid&#146;s algorithm, 245
<DD>Euler totient function, 248&#150;249
<DD>Expansion permutation, 273&#150;275, 315
<DD>Export:
<DL>
<DD>of algorithms, 215&#150;216, 610&#150;616
<DD>foreign, 617
</DL>
<DD>Exportable Protection Device, 389
<DD>Export Administration Act, 610
<DD>EXPTIME, 241
<DD>Extended Euclidean algorithm, 246&#150;248
<DD>Factoring, 255&#150;258
<DL>
<DD>general number field sieve, 159&#150;160
<DD>long-range predictions, 162
<DD>public-key encryption algorithms, 158&#150;159
<DD>special number field sieve, 160&#150;161
<DD>using quadratic sieve, 159
</DL>
<DD>Factoring Problem, 501
<DD>Failsafe:
<DL>
<DD>Diffie-Hellman, 547&#150;548
<DD>key escrowing, 98
</DL>
<DD>Fail-stop digital signatures, 85
<DD>Fair cryptosystems, 97
<DD>Fait-Shamir, 508
<DD>FAPKC0, 482
<DD>FAPKC1, 482
<DD>FAPKC2, 482
<DD>FEAL, 308&#150;312
<DL>
<DD>cryptanalysis, 311&#150;312
<DD>description, 308&#150;10
<DD>patents, 311
</DL>
<DD>Feedback:
<DL>
<DD>cipher block chaining mode, 193, 195
<DD>internal, output-feedback mode, 203
</DL>
<DD>Feedback function, 373
<DD>Feedback shift register, 373
<DD>Feedback with carry shift registers, 402&#150;404
<DL>
<DD>combining generators, 405, 410
<DD>maximal-length, tap sequences, 408&#150;409
<DD>maximal-period, connection integers, 406&#150;407
</DL>
<DD>Feedforward, cipher block chaining mode, 195
<DD>Feige, Uriel, 503&#150;504
<DD>Feige-Fiat-Shamir, 503&#150;508
<DL>
<DD>enhancements, 506&#150;507
<DD>identification scheme, 504&#150;505
<DD>simplified, 503&#150;504
</DL>
<DD>Feistel, Horst, 266, 303
<DD>Feistel network, 347
<DL>
<DD>Blowfish, 337
<DD>practically secure, 349
</DL>
<DD>Fermat&#146;s little theorem, 248
<DL>
<DD>Euler&#146;s generalization, 248
</DL>
<DD>FFT-Hash, 446
<DD>Fiat, Amos, 503&#150;504
<DD>Fiat-Shamir signature scheme, 507&#150;508
<DD>Fibonacci configuration, 373, 379
<DD>Fibonacci shrinking generator, 391
<DD>File-level encryption, 222&#150;223
<DD>Filter generator, 381
<DD>Finite field, 254
<DL>
<DD>discrete logarithms, 261&#150;263
</DL>
<DD>FIPS PUB 46, 267
<DD>FIPS PUB 74, 267
<DD>FIPS PUB 81, 267
<DD>FIPS PUB 112, 267
<DD>Fish, 391
<DD>Fixed bit index, 543
<DD>Flat keyspace, 176
<DD>Flipping coins, <I>see</I> Coin flipping
<DD>Fortified key negotiation, 522
<DD>Galois configuration, linear feedback shift registers, 378&#150;379
<DD>Galois field, computing in, 254&#150;255
<DD>Garey, Michael, 241
<DD>Gatekeeper, 278
<DD>Geffe generator, 382&#150;383
<DD>General number field sieve, 159&#150;160, 256
<DD>General Services Administration, DES adoption, 268
<DD>Generators, 253&#150;254
<DD>Gifford, 392&#150;393
<DD>Gifford, David, 392
<DD>Gill, J., 501
<DD>Global deduction, 8
<DD>Goldwasser, Shafi, 94, 552
<DD>Gollmann, Dieter, 386
<DD>Gollmann cascade, 387&#150;388
<DD>Goodman-McAuley cryptosystem, 466
<DD>Goresky, Mark, 404
<DD>GOST, 331&#150;334, 354
<DL>
<DD>source code, 643&#150;647
</DL>
<DD>GOST digital signature algorithm, 495&#150;496
<DD>GOST hash function, 454
<DD>GOST R 34.10&#150;94, 495
<DD>Gosudarstvennyi Standard Soyuza SSR, 331&#150;334
<DD>Graham-Shamir knapsacks, 465
<DD>Graph isomorphism, 104&#150;105
<DD>Greatest common divisor, 245&#150;246
<DD>Grossman, Edna, 266
<DD>Group signatures, 84&#150;85
<DD>Group Special Mobile, 389
<DD>Group structure, block ciphers design theory, 348
<DD>GSM, 389
<DD>Guillou, Louis, 102, 508
<DD>Guillou-Quisquater:
<DL>
<DD>identification scheme, 508&#150;510
<DD>signature scheme, 509&#150;510
</DL>
<DD>Gutmann, Peter, 353
<DD>Guy, Richard, 159
<DD>Haber, Stuart, 75, 485, 488
<DD>Hamiltonian cycles, 105&#150;106
<DD>Hard drive, encrypted, providing random access to, 222
<DD>Hardware:
<DL>
<DD>DES implementation, 278&#150;279
<DD>encryption, 223&#150;225
<DD>RSA, 469
</DL>
<DD>Hash functions, <I>see</I> One-way hash functions
<DD>Hash value, 30
<DD>HAVAL, 445&#150;446
<DD>Hellman, Martin, 31&#150;32, 37, 262, 283, 293, 358&#150;359, 461&#150;462
<DD>Hiding information from an oracle, 86
<DD>Historical terms, 9
<DD>Homophonic substitution cipher, 10&#150;11
<DD>Hughes, 515
<DD>Hughes, Eric, 609
<DD>Hughes XPD/KPD, 389&#150;390
<DD>Hybrid cryptosystems, 32&#150;34, 461
<DD>IBC-Hash, 458
<DD>IBM Common Cryptographic Architecture, 573&#150;574
<DD>IBM secret-key management protocol, 561&#150;562
<DD>IDEA, 319&#150;325, 354
<DL>
<DD>cryptanalysis, 323
<DD>description, 320&#150;322
<DD>modes of operation, 323&#150;325
<DD>overview, 320&#150;321
<DD>patents, 325
<DD>S-boxes, 349
<DD>source code, 637&#150;643
<DD>speed, 322&#150;323
<DD>strength against differential cryptanalysis, 348
<DD>variants, 325
</DL>
<DD>Ideal secrecy, 236
<DD>Identification schemes:
<DL>
<DD>converting to signature schemes, 512
<DD>Feige-Fiat-Shamir, 503&#150;508
<DD>Guillou-Quisquater, 508&#150;510
<DD>Ohta-Okamoto, 508
<DD>Schnorr authentication and signature scheme, 510&#150;512
</DL>
<DD>Identity-based cryptosystems, 115
<DD>Ignition key, 564
<DD>Import, foreign, 617
<DD>Index of coincidence, 14
<DD>Information:
<DL>
<DD>amount, information theory definition, 233
<DD>deduction, 8
<DD>destruction, 228&#150;229
</DL>
<DD>Information-theoretic approach, 418
<DL>
<DD>stream ciphers, 415
</DL>
<DD>Information theory, 233&#150;237
<DL>
<DD>cryptosystem security, 234&#150;235
<DD>entropy and uncertainty, 233&#150;234
<DD>in practice, 236&#150;237
<DD>rate of the language, 234
<DD>unicity distance, 235&#150;236
</DL>
<DD>Ingemarsson, Ingemar, 418
<DD>Initialization vector:
<DL>
<DD>cipher block chaining mode, 194
<DD>cipher-feedback mode, 201
<DD>output-feedback mode, 204
</DL>
<DD>Inner-CBC, 360, 363
<DD>Insertion attack, synchronous stream ciphers, 203
<DD>Instance deduction, 8
<DD>Institute of Electrical and Electronics Engineers, 608
<DD>Integrated Services Digital Network, 563&#150;565
<DD>Integrity, 2
<DD>Interactive protocol, 103
<DD>Interchange Key, 581
<DD>Interleave, 210&#150;211
<DD>Interlock protocol, mutual authentication using, 54&#150;55
<DD>Internal feedback, 203
<DD>International Association for Cryptologic Research, 605
<DD>International Standards Organization:
<DL>
<DD>authentication framework, 574&#150;577
<DD>DES adoption, 268
</DL>
<DD>International Traffic in Arms Regulations, 610&#150;614
<DD>Internet, Privacy-Enhanced Mail, 577&#150;584
<DD>Introducers, 187
<DD>Inverses modulo a number, 246&#150;248
<DD>IPES, 319
<DD>ISDN, 563&#150;565
<DD>ISO 8732, 359
<DD>ISO 9796, 472, 474, 486
<DD>ISO/IEC 9979, 607
<DD>ISO X.509 protocols, 574&#150;577
<DD>Iterated block cipher, 347
<DD>Jacobi symbol, 252&#150;253
<DD>J-algebras, 501
<DD>Jam, 414
<DD>Jennings generator, 383&#150;384
<DD>Johnson, David, 241
<DD>Jueneman&#146;s methods, 457
<DD>Kaliski, Burt, 342
<DD>Karn, 351&#150;352
<DD>Karn, Phil, 351
<DD>Karnin-Greene-Hellman, 530
<DD>Kerberos, 60, 566&#150;571
<DL>
<DD>abbreviations, 567
<DD>authentication steps, 567
<DD>credentials, 568
<DD>getting initial ticket, 569
<DD>getting server tickets, 569&#150;570
<DD>licenses, 571
<DD>model, 566
<DD>requesting services, 570
<DD>security, 571
<DD>Version 4, 570&#150;571
<DD>Version 5 messages, 568
</DL>
<DD>Kerckhoffs, A., 5
<DD>Kerckhoffs&#146;s assumption, 7
<DD>Key, 3
<DL>
<DD>backup, 181&#150;182
<DD>CDMF shortening, 366
<DD>complement, DES, 281&#150;282
<DD>compromised, 182&#150;183
<DD>controlling usage, 180
<DD>dereferencing, 221&#150;222
<DD>destroying, 184&#150;185
<DD>distribution in large networks, 177
<DD>generating, 170&#150;175
<DL>
<DD>ANSI X9.17 standard, 175
<DD>DoD, 175
<DD>pass phrases, 174&#150;175
<DD>poor choices, 171&#150;173
<DD>random keys, 173&#150;174
<DD>reduced keyspaces, 170&#150;171
</DL>
<DD>ISDN, 563&#150;564
<DD>lifetime, 183&#150;184
<DD>possibly weak, DES, 281&#150;282
<DD>semiweak, DES, 280&#150;281
<DD>session, 33, 180
<DD>storing, 180&#150;181
<DD>transferring, 176&#150;177
<DD>transmission, error detection, 178
<DD>updating, 180
<DD>using, 179&#150;180
<DD>verification, 178&#150;179
<DD>weak
<DL>
<DD>block ciphers design theory, 348DES, 280&#150;281
</DL>
</DL>
<DD>Key and message broadcast, 51&#150;52
<DD>Key and message transmission, 51
<DD>Key Auto-Key, 202
<DD>Keyboard latency, as random-sequence generator, 424&#150;425
<DD>Key Certification Authority, 43
<DD>Key control vectors, 562
<DD>Key distribution:
<DL>
<DD>anonymous, 94&#150;95
<DD>conference, 524
</DL>
<DD>Key Distribution Center, 43&#150;44
<DD>Key-Encryption Keys, 176, 184
<DD>Key escrow, 97&#150;100, 181&#150;182, 591
<DL>
<DD>politics, 98&#150;100
</DL>
<DD>Key exchange, 47&#150;52
<DL>
<DD>DASS, 62
<DD>Denning-Sacco protocol, 63
<DD>with digital signatures, 50
<DD>interlock protocol, 49&#150;50
<DD>Kerberos, 60
<DD>key and message broadcast, 51&#150;52
<DD>key and message transmission, 51
<DD>man-in-the-middle attack, 48&#150;49
<DD>Needham-Schroeder protocol, 58&#150;59
<DD>Neuman-Stubblebine protocol, 60&#150;62
<DD>Otway-Rees protocol, 59&#150;60
<DD>protocols, formal analysis, 65&#150;68
<DD>with public-key cryptography, 48
<DD>with symmetric cryptography, 47&#150;48
<DD>Wide-Mouth Frog protocol, 56&#150;57
<DD>without exchanging keys, 515
<DD>Woo-Lam protocol, 63&#150;64
<DD>Yahalom, 57&#150;58
</DL>
<DD>Key-exchange algorithms:
<DL>
<DD>COMSET, 517&#150;518
<DD>conference key distribution and secret broadcasting, 523&#150;525
<DD>Diffie-Hellman, 513&#150;516
<DD>Encrypted Key Exchange, 518&#150;522
<DD>fortified key negotiation, 522
<DD>Shamir&#146;s three-pass protocol, 516&#150;517
<DD>station-to-station protocol, 516
<DD>Tatebayashi-Matsuzaki-Newman, 524&#150;525
</DL>
<DD>Key generation, using coin flipping, 92
<DD>Key length:
<DL>
<DD>comparing symmetric and public-key, 165&#150;166
<DD>deciding on, 166&#150;167
<DD>DES, 283&#150;284
<DD>public-key, 158&#150;165
<DL>
<DD>DNA computing, 163&#150;164
<DD>quantum computing, 164&#150;165
<DD>recommended lengths, 161&#150;163
</DL>
<DD>symmetric, 151&#150;158
<DL>
<DD>biotechnology as cryptanalysis tool, 156&#150;157
<DD>brute-force attack, 151&#150;154
<DD>Chinese Lottery, 156&#150;157
<DD>neural networks, 155
<DD>software-based brute-force attacks, 154&#150;155
<DD>thermodynamic limitations on brute-force attacks, 157&#150;158
<DD>using viruses to spread cracking program, 155&#150;156
</DL>
</DL>
<DD>Key management, 169&#150;187
<DL>
<DD>distributed, 187
<DD>public-key, 185&#150;187
</DL>
<DD>Key negotiation, fortified, 522
<DD>Key notarization, 562
<DD>Key revocation certificate, 585
<DD>Keyspace, 3
<DL>
<DD>flat, 176
<DD>nonlinear, 175&#150;176
<DD>reduced, 170&#150;171
</DL>
<DD>Keystream generator, 197&#150;198
<DL>
<DD>counter mode, 206
<DD>periodic, 202
</DL>
<DD>Khafre, 317&#150;318, 349
<DD>Khufu, 317, 349
<DD>Kilian, Joe, 116
<DD>Kim, Kwangjo, 298, 350
<DD>Kinetic Protection Device, 389&#150;390
<DD>Klapper, Andy, 404
<DD>Klein, Daniel, 53, 171
<DD>Knapsack algorithms, 462&#150;466
<DL>
<DD>decryption, 465
<DD>encryption, 464
<DD>implementations, 465
<DD>patents, 466
<DD>public key created from private key, 464
<DD>security, 465
<DD>superincreasing, 463&#150;464
<DD>variants, 465&#150;466
</DL>
<DD>Knapsack problem, 501
<DD>Known-plaintext attack, 6&#150;7, 151, 359
<DD>Knudsen, Lars, 8, 293, 314, 316, 348&#150;349
<DD>Knuth, 393, 501
<DD>Koblitz, Neal, 480
<DD>Konheim, Alan, 266, 280
<DD>Kravitz, David, 493
<DD>Kravitz-Reed, 481
<DD>KryptoKnight, 571&#150;572
<DD>Lagged Fibonacci generators, 390
<DD>LaGrange interpolating polynomial scheme, 528&#150;529
<DD>Lai, Xuejia, 319, 449
<DD>Langford, Susan, 293
<DD>Law Enforcement Access Field, 591
<DD>Legal issues, 618
<DD>Legendre symbol, 251
<DD>Lehmann, 259
<DD>Lehmann algorithm, 259
<DD>Length, shift register, 373
<DD>Lenstra, Arjen, 159, 162, 257, 485, 488
<DD>LFSR/FCSR summation/parity cascade, 410&#150;411
<DD>Lidl, Rudolph, 481
<DD>Linear complexity:
<DL>
<DD>profile, 380
<DD>stream ciphers, 380
</DL>
<DD>Linear congruential generators, 369&#150;372
<DL>
<DD>combining, 371&#150;372
<DD>constants, 370
</DL>
<DD>Linear consistency test, 381
<DD>Linear cryptanalysis:
<DL>
<DD>DES, 290&#150;293
<DD>strength against, block cipher design theory, 348&#150;349
</DL>
<DD>Linear error-correcting codes, algorithms based on, 480
<DD>Linear feedback shift registers, 372&#150;379
<DL>
<DD>Galois, 378&#150;379
<DD>primitive polynomials mod 2, 376&#150;377
<DD>software, 378&#150;379
<DD>stream ciphers using, <I>see</I> Stream ciphers
</DL>
<DD>Linear syndrome algorithm, 381
<DD>Link-by-link encryption, 216&#150;218

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -