⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 book-index.html

📁 应用密码学电子书籍
💻 HTML
📖 第 1 页 / 共 5 页
字号:
<DD>background, 461&#150;462
<DD>based on linear error-correcting codes, 480
<DD>Diffie-Hellman, 513
<DD>ElGamal, 476&#150;479
<DD>elliptic curve cryptosystems, 480&#150;481
<DD>finite automaton cryptosystems, 482
<DD>knapsack algorithms, 462&#150;466
<DD>LUC, 481
<DD>McEliece, 479&#150;480
<DD>one-way hash functions using, 455
<DD>Pohlig-Hellman, 474
<DD>Rabin, 475&#150;476
<DD>RSA, <I>see</I> RSA
<DD>security, 461&#150;462
<DD>strength, 502
</DL>
<DD>Public-key cryptography:
<DL>
<DD>attacks against, 43&#150;44
<DD>authentication using, 53&#150;54
<DD>coin flipping using, 90&#150;91
<DD>communications using, 31&#150;34
<DD>identity-based, 115
<DD>key exchange with, 48
<DD>multiple-key, 68&#150;69
<DD>private keys, lifetime, 184
<DD>signing documents with, 37&#150;38
<DL>
<DD>one-way hash functions, 38&#150;39
</DL>
<DD>versus symmetric cryptography, 216&#150;217
</DL>
<DD>Public-Key Cryptography Standards, 588&#150;589
<DD>Public Key Partners, 604&#150;605
<DD>Public-key ring, 585
<DD>Purchase-key attack, 7
<DD>Quadratic nonresidues, 251
<DD>Quadratic residues, 250&#150;251
<DL>
<DD>generator, 417
</DL>
<DD>Quadratic sieve, 256
<DL>
<DD>factoring, 159
</DL>
<DD>Quantum computing, 164&#150;165
<DD>Quantum cryptography, 554&#150;557
<DD>Quintuple encryption, 366
<DD>Quisquater, Jean-Jacques, 102, 508
<DD>Quisquater-Girault, 450
<DD>Rabin, 475&#150;476
<DD>Rabin, Michael, 103, 259, 518, 550
<DD>Rabin-Miller algorithm, 259&#150;260
<DD>RACE Integrity Primitives Evaluation, 605&#150;606
<DD>Rackoff, Charles, 352
<DD>Rainbow Books, 600
<DD>Rambutan, 390
<DD>Random keys, 173&#150;174
<DD>Random noise, as random-sequence generator, 423&#150;424
<DD>Random-number generation, 44
<DD>Random-sequence generators, 421&#150;428
<DL>
<DD>biases and correlations, 425&#150;426
<DD>computer clock, 424
<DD>distilling randomness, 426&#150;428
<DD>keyboard latency measurement, 424&#150;425
<DD>RAND tables, 422&#150;423
<DD>using random noise, 423&#150;424
</DL>
<DD>Random sequences, real, 45&#150;46
<DD>Randomized approach, stream ciphers, 415
<DD>Randomized stream cipher, 419
<DD>Randomness, distilling, 426&#150;428
<DD>RAND tables, 422&#150;423
<DD>Rao-Nam algorithm, 346
<DD>Rate of the language, 234
<DD>RC2, 318&#150;319
<DD>RC4, 319, 397&#150;398
<DD>RC5, 344&#150;346
<DL>
<DD>source code, 659&#150;662
</DL>
<DD>RDES, 297&#150;298
<DD>Receipt, resending message as, 42&#150;43
<DD>REDOC II, 311&#150;313
<DD>REDOC III, 313
<DD>Redundancy, of language, 234
<DD>Reeds, Jim, 369
<DD>Related-key cryptanalysis, 290
<DD>Renji, Tao, 482
<DD>Renting Passports, 111
<DD>Replay attacks, 58&#150;59
<DD>Research and Development in Advanced Communication Technologies, Integrity Primitives Evaluation, 605&#150;606
<DD>Resend attack, foiling, 43
<DD>Residue, 242
<DL>
<DD>quadratic, 250&#150;251
<DD>reduced set, 248
</DL>
<DD>Restricted algorithms, 3
<DD>RFC 1421, 578
<DD>RFC 1422, 578
<DD>RFC 1423, 578
<DD>RFC 1424, 578
<DD>Richter, Manfield, 423
<DD>Riordan, Mark, 583&#150;584
<DD>RIPE, 605&#150;606
<DD>RIPEM, 583&#150;584
<DD>RIPE-MAC, 457&#150;458
<DD>RIPE-MD, 445
<DD>Rip van Winkle cipher, 418&#150;419
<DD>Rivest, Ron, 159, 163, 318&#150;319, 344, 397, 435, 440&#150;441, 444, 446, 467
<DD>Rivest Cipher, 318
<DD>Robshaw, Matt, 342
<DD>Rogaway, Phil, 398
<DD>ROM key, 181
<DD>ROT13, 11
<DD>Rotor machines, 12&#150;13
<DD>RSA, 17, 466&#150;474
<DL>
<DD>ability to break, zero-knowledge proofs, 548&#150;549
<DD>attack on encrypting and signing with, 473&#150;474
<DD>blind signatures, 548
<DD>chosen ciphertext attack, 471&#150;472
<DD>common modulus attack, 472
<DD>compared to DSA, 485
<DD>computation time comparison with DSA, 489
<DD>as <I>de facto</I> standard, 485&#150;486
<DD>EKE implementation, 519
<DD>encryption, 468
<DL>
<DD>with DSA, 491
</DL>
<DD>in hardware, 469
<DD>low decryption exponent attack, 473
<DD>low encryption exponent attack, 472&#150;473
<DD>patents, 474
<DD>restrictions on use, 473
<DD>security, 470&#150;471
<DD>speed, 469
<DD>standards, 474
</DL>
<DD>RSA Data Security, Inc., 295, 603&#150;604
<DD>RSA Factoring Challenge, 257
<DD>RSA generator, 417
<DD>Rubber-hose cryptanalysis, 7
<DD>Rueppel, Ranier, 385&#150;386
<DD>Running-key cipher, 12
<DD>SAFER K-64, 339&#150;341
<DD>SAFER K-128, 341
<DD>Salt, 52&#150;53
<DD>S-boxes:
<DL>
<DD>alternate, DES, 296&#150;298
<DD>Blowfish, 336
<DD>Boolean functions in, 350
<DD>DES, key-dependent, 298, 300
<DD>design
<DL>
<DD>criteria, 294
<DD>security questions, 284
<DD>theory, 349&#150;351
</DL>
<DD>Lucifer, 303
<DD>NSA role, 278, 280
<DD>substitution, 274&#150;276
</DL>
<DD>Scherbius, Arthur, 13
<DD>Schlafly, Roger, 394
<DD>Schneier, Bruce, 336, 346
<DD>Schnorr, Claus, 418, 446, 510
<DD>Schnorr authentication and signature scheme, 510&#150;512
<DD>Schroeder, Michael, 58, 216
<DD>Schwartau, Winn, 300
<DD>Sci.crypt, 608&#150;609
<DD>Scott, Robert, 306
<DD>SEAL, 398&#150;400
<DL>
<DD>source code, 667&#150;673
</DL>
<DD>Secrecy:
<DL>
<DD>ideal, 236
<DD>perfect, 235
</DL>
<DD>Secrets, simultaneous exchange, 123&#150;124
<DD>Secret sharing, 71&#150;73
<DL>
<DD>without adjudication, 72
<DD>with cheaters, 72
<DD>with disenrollment, 73
<DD>without revealing shares, 73
<DD>schemes with prevention, 73
<DD>verifiable, 73
</DL>
<DD>Secret-sharing algorithms, 528&#150;531
<DL>
<DD>advanced threshold schemes, 530&#150;531
<DD>Asmuth-Bloom, 529&#150;530
<DD>cheater detection, 531
<DD>Karnin-Greene-Hellman, 530
<DD>LaGrange interpolating polynomial scheme, 528&#150;529
<DD>vector scheme, 529
</DL>
<DD>Secret splitting, 70&#150;71
<DL>
<DD>digital cash, 142&#150;145
</DL>
<DD>Secure and Fast Encryption Routine, 339
<DD>Secure circuit evaluation, 137
<DD>Secure elections, 125&#150;134
<DL>
<DD>divided protocols, 133
<DD>multiple-key ciphers, 133
<DD>simplistic voting protocols, 125&#150;126
<DD>voting with
<DL>
<DD>blind signatures, 126&#150;127
<DD>single central facility, 128&#150;130
<DD>two central facilities, 127&#150;128
</DL>
</DL>
<DD>Secure elections (<I>Cont.</I>)
<DL>
<DD>voting without central tabulating facility, 130&#150;133
</DL>
<DD>Secure European System for Applications in a Multivendor Environment, 572
<DD>Secure Hash Algorithm, 442&#150;445
<DD>Secure multiparty computation, 134&#150;137, 551&#150;552
<DD>Secure Telephone Unit, 565
<DD>Security:
<DL>
<DD>of algorithms, 8&#150;9
<DD>Blowfish, 339
<DD>cipher block chaining mode, 196&#150;197
<DD>ciphers based on one-way hash functions, 353&#150;354
<DD>cryptosystem, 234&#150;235
<DD>DES, 278, 280&#150;285
<DL>
<DD>algebraic structure, 282&#150;283
<DD>current, 300&#150;301
<DD>key length, 283&#150;284
<DD>weak keys, 280&#150;281
</DL>
<DD>DSA, 491&#150;492
<DD>ESIGN, 500
<DD>Kerberos, 571
<DD>knapsack algorithms, 465
<DD>MD5, 440&#150;441
<DD>MMB, 326&#150;327
<DD>output-feedback mode, 205
<DD>PKZIP, 395
<DD>Privacy-Enhanced Mail, 582&#150;583
<DD>requirements for different information, 167
<DD>RSA, 470&#150;471
<DD>SEAL, 400
<DD>Secure Hash Algorithm, 444&#150;445
<DD>self-synchronizing stream cipher, 199
</DL>
<DD>Selector string, 143
<DD>Self-decimated generator, 385&#150;387
<DD>Self-enforcing protocols, 26&#150;27
<DD>Self-recovering, cipher block chaining mode, 196
<DD>Self-shrinking generator, 388
<DD>Self-synchronizing stream cipher, 198&#150;199
<DD>Selmer, E. S., 381
<DD>Semiweak keys, DES, 280&#150;281
<DD>SESAME, 572
<DD>Session keys, 33, 180
<DD>SHA, 442&#150;445
<DD>Shadows, 71&#150;72
<DD>Shamir, Adi, 72, 284&#150;285, 288, 291, 296, 303, 311&#150;312, 314, 319, 416, 434, 462, 467, 502&#150;504, 508, 516, 528
<DD>Shamir&#146;s pseudo-random-number generator, 416
<DD>Shamir&#146;s three-pass protocol, 516&#150;517
<DD>Shimizu, Akihiro, 308
<DD>Shor, Peter, 164
<DD>Shrinking generator, 388, 411&#150;412
<DD>Signature equation, 496
<DD>Signatures, <I>see</I> Digital signatures
<DD>Silverman, Bob, 159
<DD>Simmons, Gustavus, 72, 79, 493, 501, 531
<DD>Simple columnar transposition cipher, 12
<DD>Simple relations, 347&#150;348
<DD>Simple substitution cipher, 10&#150;11
<DD>Simultaneous exchange of secrets, 123&#150;124
<DD>Skew, 425
<DD>SKEY, 53
<DD>SKID, 55&#150;56
<DD>Skipjack, 267, 328&#150;329
<DD>Smart cards, 587
<DL>
<DD>observer, 146
<DD>Universal Electronic Payment System, 589&#150;591
</DL>
<DD>Smith, Lynn, 266
<DD><I>sn</I>DES, 298&#150;299
<DD>Snefru, 432
<DD>Software:
<DL>
<DD>DES implementation, 278&#150;279
<DD>encryption, 225
<DD>linear feedback shift registers, 378&#150;379
<DD>RSA speedups, 469&#150;470
</DL>
<DD>Software-based brute-force attack, 154&#150;155
<DD>Software Publishers Association, 608
<DD>Solovay, Robert, 259
<DD>Solovay-Strassen algorithm, 259
<DD>Space complexity, 237
<DD>Sparse, 378
<DD>Special number field sieve, 160&#150;161
<DD>SP network, 347
<DD>Square roots:
<DL>
<DD>coin flipping using, 541&#150;542
<DD>modulo <I>n</I>, 258
</DL>
<DD>Standards:
<DL>
<DD>public-key cryptography, 588&#150;589
<DD>RSA, 474
</DL>
<DD>Station-to-station protocol, 516
<DD>Steganography, 9&#150;10
<DD>StepRightUp, 414
<DD>Stereotyped beginnings, 190
<DD>Stereotyped endings, 190
<DD>Storage:
<DL>
<DD>data encryption for, 220&#150;222
<DD>keys, 180&#150;181
<DD>requirements, 9
</DL>
<DD>Stornetta, W. Scott, 75
<DD>Straight permutation, 275
<DD>Strassen, Volker, 259
<DD>Stream algorithms, 4
<DD>Stream ciphers, 4, 189, 197&#150;198
<DL>
<DD>A5, 389
<DD>additive generators, 390&#150;392
<DD>Algorithm M, 393&#150;394
<DD>versus block ciphers, 210&#150;211
<DD>Blum, Blum, and Shub generator, 417&#150;418
<DD>Blum-Micali generator, 416&#150;417
<DD>cascading multiple, 419&#150;420
<DD>cellular automaton generator, 414
<DD>choosing, 420
<DD>complexity-theoretic approach, 415&#150;418
<DD>correlation immunity, 380
<DD>counter mode, 206
<DD>crypt(1), 414
<DD>design and analysis, 379&#150;381
<DD>Diffie&#146;s randomized stream cipher, 419
<DD>encryption speeds, 420
<DD>feedback with carry shift registers, 402&#150;404
<DD>Fish, 391
<DD>Gifford, 392&#150;393
<DD>Hughes XPD/KPD, 389&#150;390
<DD>information-theoretic approach, 418
<DD>linear complexity, 380
<DD>Maurer&#146;s randomized stream cipher, 419
<DD>message authentication codes, 459
<DD>multiple, generating from single pseudo-random-sequence generator, 420&#150;421
<DD>Mush, 392
<DD>Nanoteq, 390
<DD>nonlinear-feedback shift registers, 412&#150;413
<DD>1/p generator, 414
<DD>output-feedback mode, 205
<DD>Pike, 391&#150;392
<DD>PKZIP, 394&#150;395
<DD>Pless generator, 413&#150;414
<DD>Rambutan, 390
<DD>random-sequence generators, 421&#150;428
<DD>RC4, 397&#150;398
<DD>Rip van Winkle cipher, 418&#150;419
<DD>RSA generator, 417
<DD>SEAL, 398&#150;400
<DD>self-synchronizing, 198&#150;199
<DD>synchronous, 202&#150;203
<DD>system-theoretic approach, 415&#150;416
<DD>using feedback with carry shift registers, 405&#150;412
<DL>
<DD>alternating stop-and-go generators, 410&#150;411
<DD>cascade generators, 405
<DD>FCSR combining generators, 405, 410
<DD>LFSR/FCSR summation/parity cascade, 410&#150;411
<DD>shrinking generators, 411&#150;412
</DL>
<DD>using linear feedback shift registers, 381&#150;388
<DL>
<DD>alternating stop-and-go generator, 383, 385
<DD>Beth-Piper stop-and-go generator, 383&#150;384
<DD>bilateral stop-and-go generator, 384&#150;385
<DD>DNRSG, 387
<DD>Geffe generator, 382
<DD>generalized Geffe generator, 382&#150;383
<DD>Gollmann cascade, 387&#150;388
<DD>Jennings generator, 383&#150;384
<DD>multispeed inner-product generator, 386&#150;387
<DD>self-decimated generator, 385&#150;387
<DD>self-shrinking generator, 388
<DD>shrinking generator, 388
<DD>summation generator, 386&#150;387
<DD>threshold generator, 384&#150;386
</DL>
<DD>WAKE, 400&#150;402
</DL>
<DD>Strict avalanche criteria, 350
<DD>Strong primes, 261
<DD>STU-III, 565&#150;566
<DD>Subkey, 272
<DL>
<DD>Blowfish, 338&#150;339
<DD>Crab, 342&#150;343
<DD>IDEA, 322
<DD>independent, DES, 295
</DL>
<DD>Subliminal channel, 79&#150;80
<DL>
<DD>applications, 80
<DD>DSA, 493, 534&#150;536
<DD>ElGamal, 532&#150;533
<DD>ESIGN, 533&#150;534
<DD>foiling, 536
<DD>Ong-Schnorr-Shamir, 531&#150;532
<DD>signature algorithm, 79
</DL>
<DD>Subliminal-free signature schemes, 80
<DD>Subprotocols, 26
<DD>Substitution boxes, 274&#150;276
<DD>Substitution ciphers, 10&#150;12
<DD>Substitution-permutation network, 347
<DD>SubStream, 414
<DD>Summation generator, 386&#150;387
<DD>Superincreasing knapsack, 463&#150;464
<DD>Superincreasing sequence, 463&#150;464
<DD>Suppress-replay, 61
<DD>Surety Technologies, 79
<DD>SXAL8, 344
<DD>Symmetric algorithms, 4
<DD>Symmetric block algorithms, one-way hash functions using, 446&#150;455
<DD>Symmetric cryptography:
<DL>
<DD>bit commitment using, 86&#150;87
<DD>communication using, 28&#150;29
<DD>key exchange with, 47&#150;48
<DD>versus public-key cryptography, 216&#150;217
</DL>
<DD>Symmetric cryptosystems, document signing, 35&#150;37
<DD>Symmetric key length, 151&#150;158
<

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -