📄 book-index.html
字号:
<DD>output-feedback mode, 204
</DL>
<DD>Escrow agencies, 592
<DD>Escrowed Encryption Standard, 97, 593
<DD>ESIGN, 499–500, 533–534
<DD>Euclid’s algorithm, 245
<DD>Euler totient function, 248–249
<DD>Expansion permutation, 273–275, 315
<DD>Export:
<DL>
<DD>of algorithms, 215–216, 610–616
<DD>foreign, 617
</DL>
<DD>Exportable Protection Device, 389
<DD>Export Administration Act, 610
<DD>EXPTIME, 241
<DD>Extended Euclidean algorithm, 246–248
<DD>Factoring, 255–258
<DL>
<DD>general number field sieve, 159–160
<DD>long-range predictions, 162
<DD>public-key encryption algorithms, 158–159
<DD>special number field sieve, 160–161
<DD>using quadratic sieve, 159
</DL>
<DD>Factoring Problem, 501
<DD>Failsafe:
<DL>
<DD>Diffie-Hellman, 547–548
<DD>key escrowing, 98
</DL>
<DD>Fail-stop digital signatures, 85
<DD>Fair cryptosystems, 97
<DD>Fait-Shamir, 508
<DD>FAPKC0, 482
<DD>FAPKC1, 482
<DD>FAPKC2, 482
<DD>FEAL, 308–312
<DL>
<DD>cryptanalysis, 311–312
<DD>description, 308–10
<DD>patents, 311
</DL>
<DD>Feedback:
<DL>
<DD>cipher block chaining mode, 193, 195
<DD>internal, output-feedback mode, 203
</DL>
<DD>Feedback function, 373
<DD>Feedback shift register, 373
<DD>Feedback with carry shift registers, 402–404
<DL>
<DD>combining generators, 405, 410
<DD>maximal-length, tap sequences, 408–409
<DD>maximal-period, connection integers, 406–407
</DL>
<DD>Feedforward, cipher block chaining mode, 195
<DD>Feige, Uriel, 503–504
<DD>Feige-Fiat-Shamir, 503–508
<DL>
<DD>enhancements, 506–507
<DD>identification scheme, 504–505
<DD>simplified, 503–504
</DL>
<DD>Feistel, Horst, 266, 303
<DD>Feistel network, 347
<DL>
<DD>Blowfish, 337
<DD>practically secure, 349
</DL>
<DD>Fermat’s little theorem, 248
<DL>
<DD>Euler’s generalization, 248
</DL>
<DD>FFT-Hash, 446
<DD>Fiat, Amos, 503–504
<DD>Fiat-Shamir signature scheme, 507–508
<DD>Fibonacci configuration, 373, 379
<DD>Fibonacci shrinking generator, 391
<DD>File-level encryption, 222–223
<DD>Filter generator, 381
<DD>Finite field, 254
<DL>
<DD>discrete logarithms, 261–263
</DL>
<DD>FIPS PUB 46, 267
<DD>FIPS PUB 74, 267
<DD>FIPS PUB 81, 267
<DD>FIPS PUB 112, 267
<DD>Fish, 391
<DD>Fixed bit index, 543
<DD>Flat keyspace, 176
<DD>Flipping coins, <I>see</I> Coin flipping
<DD>Fortified key negotiation, 522
<DD>Galois configuration, linear feedback shift registers, 378–379
<DD>Galois field, computing in, 254–255
<DD>Garey, Michael, 241
<DD>Gatekeeper, 278
<DD>Geffe generator, 382–383
<DD>General number field sieve, 159–160, 256
<DD>General Services Administration, DES adoption, 268
<DD>Generators, 253–254
<DD>Gifford, 392–393
<DD>Gifford, David, 392
<DD>Gill, J., 501
<DD>Global deduction, 8
<DD>Goldwasser, Shafi, 94, 552
<DD>Gollmann, Dieter, 386
<DD>Gollmann cascade, 387–388
<DD>Goodman-McAuley cryptosystem, 466
<DD>Goresky, Mark, 404
<DD>GOST, 331–334, 354
<DL>
<DD>source code, 643–647
</DL>
<DD>GOST digital signature algorithm, 495–496
<DD>GOST hash function, 454
<DD>GOST R 34.10–94, 495
<DD>Gosudarstvennyi Standard Soyuza SSR, 331–334
<DD>Graham-Shamir knapsacks, 465
<DD>Graph isomorphism, 104–105
<DD>Greatest common divisor, 245–246
<DD>Grossman, Edna, 266
<DD>Group signatures, 84–85
<DD>Group Special Mobile, 389
<DD>Group structure, block ciphers design theory, 348
<DD>GSM, 389
<DD>Guillou, Louis, 102, 508
<DD>Guillou-Quisquater:
<DL>
<DD>identification scheme, 508–510
<DD>signature scheme, 509–510
</DL>
<DD>Gutmann, Peter, 353
<DD>Guy, Richard, 159
<DD>Haber, Stuart, 75, 485, 488
<DD>Hamiltonian cycles, 105–106
<DD>Hard drive, encrypted, providing random access to, 222
<DD>Hardware:
<DL>
<DD>DES implementation, 278–279
<DD>encryption, 223–225
<DD>RSA, 469
</DL>
<DD>Hash functions, <I>see</I> One-way hash functions
<DD>Hash value, 30
<DD>HAVAL, 445–446
<DD>Hellman, Martin, 31–32, 37, 262, 283, 293, 358–359, 461–462
<DD>Hiding information from an oracle, 86
<DD>Historical terms, 9
<DD>Homophonic substitution cipher, 10–11
<DD>Hughes, 515
<DD>Hughes, Eric, 609
<DD>Hughes XPD/KPD, 389–390
<DD>Hybrid cryptosystems, 32–34, 461
<DD>IBC-Hash, 458
<DD>IBM Common Cryptographic Architecture, 573–574
<DD>IBM secret-key management protocol, 561–562
<DD>IDEA, 319–325, 354
<DL>
<DD>cryptanalysis, 323
<DD>description, 320–322
<DD>modes of operation, 323–325
<DD>overview, 320–321
<DD>patents, 325
<DD>S-boxes, 349
<DD>source code, 637–643
<DD>speed, 322–323
<DD>strength against differential cryptanalysis, 348
<DD>variants, 325
</DL>
<DD>Ideal secrecy, 236
<DD>Identification schemes:
<DL>
<DD>converting to signature schemes, 512
<DD>Feige-Fiat-Shamir, 503–508
<DD>Guillou-Quisquater, 508–510
<DD>Ohta-Okamoto, 508
<DD>Schnorr authentication and signature scheme, 510–512
</DL>
<DD>Identity-based cryptosystems, 115
<DD>Ignition key, 564
<DD>Import, foreign, 617
<DD>Index of coincidence, 14
<DD>Information:
<DL>
<DD>amount, information theory definition, 233
<DD>deduction, 8
<DD>destruction, 228–229
</DL>
<DD>Information-theoretic approach, 418
<DL>
<DD>stream ciphers, 415
</DL>
<DD>Information theory, 233–237
<DL>
<DD>cryptosystem security, 234–235
<DD>entropy and uncertainty, 233–234
<DD>in practice, 236–237
<DD>rate of the language, 234
<DD>unicity distance, 235–236
</DL>
<DD>Ingemarsson, Ingemar, 418
<DD>Initialization vector:
<DL>
<DD>cipher block chaining mode, 194
<DD>cipher-feedback mode, 201
<DD>output-feedback mode, 204
</DL>
<DD>Inner-CBC, 360, 363
<DD>Insertion attack, synchronous stream ciphers, 203
<DD>Instance deduction, 8
<DD>Institute of Electrical and Electronics Engineers, 608
<DD>Integrated Services Digital Network, 563–565
<DD>Integrity, 2
<DD>Interactive protocol, 103
<DD>Interchange Key, 581
<DD>Interleave, 210–211
<DD>Interlock protocol, mutual authentication using, 54–55
<DD>Internal feedback, 203
<DD>International Association for Cryptologic Research, 605
<DD>International Standards Organization:
<DL>
<DD>authentication framework, 574–577
<DD>DES adoption, 268
</DL>
<DD>International Traffic in Arms Regulations, 610–614
<DD>Internet, Privacy-Enhanced Mail, 577–584
<DD>Introducers, 187
<DD>Inverses modulo a number, 246–248
<DD>IPES, 319
<DD>ISDN, 563–565
<DD>ISO 8732, 359
<DD>ISO 9796, 472, 474, 486
<DD>ISO/IEC 9979, 607
<DD>ISO X.509 protocols, 574–577
<DD>Iterated block cipher, 347
<DD>Jacobi symbol, 252–253
<DD>J-algebras, 501
<DD>Jam, 414
<DD>Jennings generator, 383–384
<DD>Johnson, David, 241
<DD>Jueneman’s methods, 457
<DD>Kaliski, Burt, 342
<DD>Karn, 351–352
<DD>Karn, Phil, 351
<DD>Karnin-Greene-Hellman, 530
<DD>Kerberos, 60, 566–571
<DL>
<DD>abbreviations, 567
<DD>authentication steps, 567
<DD>credentials, 568
<DD>getting initial ticket, 569
<DD>getting server tickets, 569–570
<DD>licenses, 571
<DD>model, 566
<DD>requesting services, 570
<DD>security, 571
<DD>Version 4, 570–571
<DD>Version 5 messages, 568
</DL>
<DD>Kerckhoffs, A., 5
<DD>Kerckhoffs’s assumption, 7
<DD>Key, 3
<DL>
<DD>backup, 181–182
<DD>CDMF shortening, 366
<DD>complement, DES, 281–282
<DD>compromised, 182–183
<DD>controlling usage, 180
<DD>dereferencing, 221–222
<DD>destroying, 184–185
<DD>distribution in large networks, 177
<DD>generating, 170–175
<DL>
<DD>ANSI X9.17 standard, 175
<DD>DoD, 175
<DD>pass phrases, 174–175
<DD>poor choices, 171–173
<DD>random keys, 173–174
<DD>reduced keyspaces, 170–171
</DL>
<DD>ISDN, 563–564
<DD>lifetime, 183–184
<DD>possibly weak, DES, 281–282
<DD>semiweak, DES, 280–281
<DD>session, 33, 180
<DD>storing, 180–181
<DD>transferring, 176–177
<DD>transmission, error detection, 178
<DD>updating, 180
<DD>using, 179–180
<DD>verification, 178–179
<DD>weak
<DL>
<DD>block ciphers design theory, 348DES, 280–281
</DL>
</DL>
<DD>Key and message broadcast, 51–52
<DD>Key and message transmission, 51
<DD>Key Auto-Key, 202
<DD>Keyboard latency, as random-sequence generator, 424–425
<DD>Key Certification Authority, 43
<DD>Key control vectors, 562
<DD>Key distribution:
<DL>
<DD>anonymous, 94–95
<DD>conference, 524
</DL>
<DD>Key Distribution Center, 43–44
<DD>Key-Encryption Keys, 176, 184
<DD>Key escrow, 97–100, 181–182, 591
<DL>
<DD>politics, 98–100
</DL>
<DD>Key exchange, 47–52
<DL>
<DD>DASS, 62
<DD>Denning-Sacco protocol, 63
<DD>with digital signatures, 50
<DD>interlock protocol, 49–50
<DD>Kerberos, 60
<DD>key and message broadcast, 51–52
<DD>key and message transmission, 51
<DD>man-in-the-middle attack, 48–49
<DD>Needham-Schroeder protocol, 58–59
<DD>Neuman-Stubblebine protocol, 60–62
<DD>Otway-Rees protocol, 59–60
<DD>protocols, formal analysis, 65–68
<DD>with public-key cryptography, 48
<DD>with symmetric cryptography, 47–48
<DD>Wide-Mouth Frog protocol, 56–57
<DD>without exchanging keys, 515
<DD>Woo-Lam protocol, 63–64
<DD>Yahalom, 57–58
</DL>
<DD>Key-exchange algorithms:
<DL>
<DD>COMSET, 517–518
<DD>conference key distribution and secret broadcasting, 523–525
<DD>Diffie-Hellman, 513–516
<DD>Encrypted Key Exchange, 518–522
<DD>fortified key negotiation, 522
<DD>Shamir’s three-pass protocol, 516–517
<DD>station-to-station protocol, 516
<DD>Tatebayashi-Matsuzaki-Newman, 524–525
</DL>
<DD>Key generation, using coin flipping, 92
<DD>Key length:
<DL>
<DD>comparing symmetric and public-key, 165–166
<DD>deciding on, 166–167
<DD>DES, 283–284
<DD>public-key, 158–165
<DL>
<DD>DNA computing, 163–164
<DD>quantum computing, 164–165
<DD>recommended lengths, 161–163
</DL>
<DD>symmetric, 151–158
<DL>
<DD>biotechnology as cryptanalysis tool, 156–157
<DD>brute-force attack, 151–154
<DD>Chinese Lottery, 156–157
<DD>neural networks, 155
<DD>software-based brute-force attacks, 154–155
<DD>thermodynamic limitations on brute-force attacks, 157–158
<DD>using viruses to spread cracking program, 155–156
</DL>
</DL>
<DD>Key management, 169–187
<DL>
<DD>distributed, 187
<DD>public-key, 185–187
</DL>
<DD>Key negotiation, fortified, 522
<DD>Key notarization, 562
<DD>Key revocation certificate, 585
<DD>Keyspace, 3
<DL>
<DD>flat, 176
<DD>nonlinear, 175–176
<DD>reduced, 170–171
</DL>
<DD>Keystream generator, 197–198
<DL>
<DD>counter mode, 206
<DD>periodic, 202
</DL>
<DD>Khafre, 317–318, 349
<DD>Khufu, 317, 349
<DD>Kilian, Joe, 116
<DD>Kim, Kwangjo, 298, 350
<DD>Kinetic Protection Device, 389–390
<DD>Klapper, Andy, 404
<DD>Klein, Daniel, 53, 171
<DD>Knapsack algorithms, 462–466
<DL>
<DD>decryption, 465
<DD>encryption, 464
<DD>implementations, 465
<DD>patents, 466
<DD>public key created from private key, 464
<DD>security, 465
<DD>superincreasing, 463–464
<DD>variants, 465–466
</DL>
<DD>Knapsack problem, 501
<DD>Known-plaintext attack, 6–7, 151, 359
<DD>Knudsen, Lars, 8, 293, 314, 316, 348–349
<DD>Knuth, 393, 501
<DD>Koblitz, Neal, 480
<DD>Konheim, Alan, 266, 280
<DD>Kravitz, David, 493
<DD>Kravitz-Reed, 481
<DD>KryptoKnight, 571–572
<DD>Lagged Fibonacci generators, 390
<DD>LaGrange interpolating polynomial scheme, 528–529
<DD>Lai, Xuejia, 319, 449
<DD>Langford, Susan, 293
<DD>Law Enforcement Access Field, 591
<DD>Legal issues, 618
<DD>Legendre symbol, 251
<DD>Lehmann, 259
<DD>Lehmann algorithm, 259
<DD>Length, shift register, 373
<DD>Lenstra, Arjen, 159, 162, 257, 485, 488
<DD>LFSR/FCSR summation/parity cascade, 410–411
<DD>Lidl, Rudolph, 481
<DD>Linear complexity:
<DL>
<DD>profile, 380
<DD>stream ciphers, 380
</DL>
<DD>Linear congruential generators, 369–372
<DL>
<DD>combining, 371–372
<DD>constants, 370
</DL>
<DD>Linear consistency test, 381
<DD>Linear cryptanalysis:
<DL>
<DD>DES, 290–293
<DD>strength against, block cipher design theory, 348–349
</DL>
<DD>Linear error-correcting codes, algorithms based on, 480
<DD>Linear feedback shift registers, 372–379
<DL>
<DD>Galois, 378–379
<DD>primitive polynomials mod 2, 376–377
<DD>software, 378–379
<DD>stream ciphers using, <I>see</I> Stream ciphers
</DL>
<DD>Linear syndrome algorithm, 381
<DD>Link-by-link encryption, 216–218
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -