📄 book-index.html
字号:
<DD>background, 461–462
<DD>based on linear error-correcting codes, 480
<DD>Diffie-Hellman, 513
<DD>ElGamal, 476–479
<DD>elliptic curve cryptosystems, 480–481
<DD>finite automaton cryptosystems, 482
<DD>knapsack algorithms, 462–466
<DD>LUC, 481
<DD>McEliece, 479–480
<DD>one-way hash functions using, 455
<DD>Pohlig-Hellman, 474
<DD>Rabin, 475–476
<DD>RSA, <I>see</I> RSA
<DD>security, 461–462
<DD>strength, 502
</DL>
<DD>Public-key cryptography:
<DL>
<DD>attacks against, 43–44
<DD>authentication using, 53–54
<DD>coin flipping using, 90–91
<DD>communications using, 31–34
<DD>identity-based, 115
<DD>key exchange with, 48
<DD>multiple-key, 68–69
<DD>private keys, lifetime, 184
<DD>signing documents with, 37–38
<DL>
<DD>one-way hash functions, 38–39
</DL>
<DD>versus symmetric cryptography, 216–217
</DL>
<DD>Public-Key Cryptography Standards, 588–589
<DD>Public Key Partners, 604–605
<DD>Public-key ring, 585
<DD>Purchase-key attack, 7
<DD>Quadratic nonresidues, 251
<DD>Quadratic residues, 250–251
<DL>
<DD>generator, 417
</DL>
<DD>Quadratic sieve, 256
<DL>
<DD>factoring, 159
</DL>
<DD>Quantum computing, 164–165
<DD>Quantum cryptography, 554–557
<DD>Quintuple encryption, 366
<DD>Quisquater, Jean-Jacques, 102, 508
<DD>Quisquater-Girault, 450
<DD>Rabin, 475–476
<DD>Rabin, Michael, 103, 259, 518, 550
<DD>Rabin-Miller algorithm, 259–260
<DD>RACE Integrity Primitives Evaluation, 605–606
<DD>Rackoff, Charles, 352
<DD>Rainbow Books, 600
<DD>Rambutan, 390
<DD>Random keys, 173–174
<DD>Random noise, as random-sequence generator, 423–424
<DD>Random-number generation, 44
<DD>Random-sequence generators, 421–428
<DL>
<DD>biases and correlations, 425–426
<DD>computer clock, 424
<DD>distilling randomness, 426–428
<DD>keyboard latency measurement, 424–425
<DD>RAND tables, 422–423
<DD>using random noise, 423–424
</DL>
<DD>Random sequences, real, 45–46
<DD>Randomized approach, stream ciphers, 415
<DD>Randomized stream cipher, 419
<DD>Randomness, distilling, 426–428
<DD>RAND tables, 422–423
<DD>Rao-Nam algorithm, 346
<DD>Rate of the language, 234
<DD>RC2, 318–319
<DD>RC4, 319, 397–398
<DD>RC5, 344–346
<DL>
<DD>source code, 659–662
</DL>
<DD>RDES, 297–298
<DD>Receipt, resending message as, 42–43
<DD>REDOC II, 311–313
<DD>REDOC III, 313
<DD>Redundancy, of language, 234
<DD>Reeds, Jim, 369
<DD>Related-key cryptanalysis, 290
<DD>Renji, Tao, 482
<DD>Renting Passports, 111
<DD>Replay attacks, 58–59
<DD>Research and Development in Advanced Communication Technologies, Integrity Primitives Evaluation, 605–606
<DD>Resend attack, foiling, 43
<DD>Residue, 242
<DL>
<DD>quadratic, 250–251
<DD>reduced set, 248
</DL>
<DD>Restricted algorithms, 3
<DD>RFC 1421, 578
<DD>RFC 1422, 578
<DD>RFC 1423, 578
<DD>RFC 1424, 578
<DD>Richter, Manfield, 423
<DD>Riordan, Mark, 583–584
<DD>RIPE, 605–606
<DD>RIPEM, 583–584
<DD>RIPE-MAC, 457–458
<DD>RIPE-MD, 445
<DD>Rip van Winkle cipher, 418–419
<DD>Rivest, Ron, 159, 163, 318–319, 344, 397, 435, 440–441, 444, 446, 467
<DD>Rivest Cipher, 318
<DD>Robshaw, Matt, 342
<DD>Rogaway, Phil, 398
<DD>ROM key, 181
<DD>ROT13, 11
<DD>Rotor machines, 12–13
<DD>RSA, 17, 466–474
<DL>
<DD>ability to break, zero-knowledge proofs, 548–549
<DD>attack on encrypting and signing with, 473–474
<DD>blind signatures, 548
<DD>chosen ciphertext attack, 471–472
<DD>common modulus attack, 472
<DD>compared to DSA, 485
<DD>computation time comparison with DSA, 489
<DD>as <I>de facto</I> standard, 485–486
<DD>EKE implementation, 519
<DD>encryption, 468
<DL>
<DD>with DSA, 491
</DL>
<DD>in hardware, 469
<DD>low decryption exponent attack, 473
<DD>low encryption exponent attack, 472–473
<DD>patents, 474
<DD>restrictions on use, 473
<DD>security, 470–471
<DD>speed, 469
<DD>standards, 474
</DL>
<DD>RSA Data Security, Inc., 295, 603–604
<DD>RSA Factoring Challenge, 257
<DD>RSA generator, 417
<DD>Rubber-hose cryptanalysis, 7
<DD>Rueppel, Ranier, 385–386
<DD>Running-key cipher, 12
<DD>SAFER K-64, 339–341
<DD>SAFER K-128, 341
<DD>Salt, 52–53
<DD>S-boxes:
<DL>
<DD>alternate, DES, 296–298
<DD>Blowfish, 336
<DD>Boolean functions in, 350
<DD>DES, key-dependent, 298, 300
<DD>design
<DL>
<DD>criteria, 294
<DD>security questions, 284
<DD>theory, 349–351
</DL>
<DD>Lucifer, 303
<DD>NSA role, 278, 280
<DD>substitution, 274–276
</DL>
<DD>Scherbius, Arthur, 13
<DD>Schlafly, Roger, 394
<DD>Schneier, Bruce, 336, 346
<DD>Schnorr, Claus, 418, 446, 510
<DD>Schnorr authentication and signature scheme, 510–512
<DD>Schroeder, Michael, 58, 216
<DD>Schwartau, Winn, 300
<DD>Sci.crypt, 608–609
<DD>Scott, Robert, 306
<DD>SEAL, 398–400
<DL>
<DD>source code, 667–673
</DL>
<DD>Secrecy:
<DL>
<DD>ideal, 236
<DD>perfect, 235
</DL>
<DD>Secrets, simultaneous exchange, 123–124
<DD>Secret sharing, 71–73
<DL>
<DD>without adjudication, 72
<DD>with cheaters, 72
<DD>with disenrollment, 73
<DD>without revealing shares, 73
<DD>schemes with prevention, 73
<DD>verifiable, 73
</DL>
<DD>Secret-sharing algorithms, 528–531
<DL>
<DD>advanced threshold schemes, 530–531
<DD>Asmuth-Bloom, 529–530
<DD>cheater detection, 531
<DD>Karnin-Greene-Hellman, 530
<DD>LaGrange interpolating polynomial scheme, 528–529
<DD>vector scheme, 529
</DL>
<DD>Secret splitting, 70–71
<DL>
<DD>digital cash, 142–145
</DL>
<DD>Secure and Fast Encryption Routine, 339
<DD>Secure circuit evaluation, 137
<DD>Secure elections, 125–134
<DL>
<DD>divided protocols, 133
<DD>multiple-key ciphers, 133
<DD>simplistic voting protocols, 125–126
<DD>voting with
<DL>
<DD>blind signatures, 126–127
<DD>single central facility, 128–130
<DD>two central facilities, 127–128
</DL>
</DL>
<DD>Secure elections (<I>Cont.</I>)
<DL>
<DD>voting without central tabulating facility, 130–133
</DL>
<DD>Secure European System for Applications in a Multivendor Environment, 572
<DD>Secure Hash Algorithm, 442–445
<DD>Secure multiparty computation, 134–137, 551–552
<DD>Secure Telephone Unit, 565
<DD>Security:
<DL>
<DD>of algorithms, 8–9
<DD>Blowfish, 339
<DD>cipher block chaining mode, 196–197
<DD>ciphers based on one-way hash functions, 353–354
<DD>cryptosystem, 234–235
<DD>DES, 278, 280–285
<DL>
<DD>algebraic structure, 282–283
<DD>current, 300–301
<DD>key length, 283–284
<DD>weak keys, 280–281
</DL>
<DD>DSA, 491–492
<DD>ESIGN, 500
<DD>Kerberos, 571
<DD>knapsack algorithms, 465
<DD>MD5, 440–441
<DD>MMB, 326–327
<DD>output-feedback mode, 205
<DD>PKZIP, 395
<DD>Privacy-Enhanced Mail, 582–583
<DD>requirements for different information, 167
<DD>RSA, 470–471
<DD>SEAL, 400
<DD>Secure Hash Algorithm, 444–445
<DD>self-synchronizing stream cipher, 199
</DL>
<DD>Selector string, 143
<DD>Self-decimated generator, 385–387
<DD>Self-enforcing protocols, 26–27
<DD>Self-recovering, cipher block chaining mode, 196
<DD>Self-shrinking generator, 388
<DD>Self-synchronizing stream cipher, 198–199
<DD>Selmer, E. S., 381
<DD>Semiweak keys, DES, 280–281
<DD>SESAME, 572
<DD>Session keys, 33, 180
<DD>SHA, 442–445
<DD>Shadows, 71–72
<DD>Shamir, Adi, 72, 284–285, 288, 291, 296, 303, 311–312, 314, 319, 416, 434, 462, 467, 502–504, 508, 516, 528
<DD>Shamir’s pseudo-random-number generator, 416
<DD>Shamir’s three-pass protocol, 516–517
<DD>Shimizu, Akihiro, 308
<DD>Shor, Peter, 164
<DD>Shrinking generator, 388, 411–412
<DD>Signature equation, 496
<DD>Signatures, <I>see</I> Digital signatures
<DD>Silverman, Bob, 159
<DD>Simmons, Gustavus, 72, 79, 493, 501, 531
<DD>Simple columnar transposition cipher, 12
<DD>Simple relations, 347–348
<DD>Simple substitution cipher, 10–11
<DD>Simultaneous exchange of secrets, 123–124
<DD>Skew, 425
<DD>SKEY, 53
<DD>SKID, 55–56
<DD>Skipjack, 267, 328–329
<DD>Smart cards, 587
<DL>
<DD>observer, 146
<DD>Universal Electronic Payment System, 589–591
</DL>
<DD>Smith, Lynn, 266
<DD><I>sn</I>DES, 298–299
<DD>Snefru, 432
<DD>Software:
<DL>
<DD>DES implementation, 278–279
<DD>encryption, 225
<DD>linear feedback shift registers, 378–379
<DD>RSA speedups, 469–470
</DL>
<DD>Software-based brute-force attack, 154–155
<DD>Software Publishers Association, 608
<DD>Solovay, Robert, 259
<DD>Solovay-Strassen algorithm, 259
<DD>Space complexity, 237
<DD>Sparse, 378
<DD>Special number field sieve, 160–161
<DD>SP network, 347
<DD>Square roots:
<DL>
<DD>coin flipping using, 541–542
<DD>modulo <I>n</I>, 258
</DL>
<DD>Standards:
<DL>
<DD>public-key cryptography, 588–589
<DD>RSA, 474
</DL>
<DD>Station-to-station protocol, 516
<DD>Steganography, 9–10
<DD>StepRightUp, 414
<DD>Stereotyped beginnings, 190
<DD>Stereotyped endings, 190
<DD>Storage:
<DL>
<DD>data encryption for, 220–222
<DD>keys, 180–181
<DD>requirements, 9
</DL>
<DD>Stornetta, W. Scott, 75
<DD>Straight permutation, 275
<DD>Strassen, Volker, 259
<DD>Stream algorithms, 4
<DD>Stream ciphers, 4, 189, 197–198
<DL>
<DD>A5, 389
<DD>additive generators, 390–392
<DD>Algorithm M, 393–394
<DD>versus block ciphers, 210–211
<DD>Blum, Blum, and Shub generator, 417–418
<DD>Blum-Micali generator, 416–417
<DD>cascading multiple, 419–420
<DD>cellular automaton generator, 414
<DD>choosing, 420
<DD>complexity-theoretic approach, 415–418
<DD>correlation immunity, 380
<DD>counter mode, 206
<DD>crypt(1), 414
<DD>design and analysis, 379–381
<DD>Diffie’s randomized stream cipher, 419
<DD>encryption speeds, 420
<DD>feedback with carry shift registers, 402–404
<DD>Fish, 391
<DD>Gifford, 392–393
<DD>Hughes XPD/KPD, 389–390
<DD>information-theoretic approach, 418
<DD>linear complexity, 380
<DD>Maurer’s randomized stream cipher, 419
<DD>message authentication codes, 459
<DD>multiple, generating from single pseudo-random-sequence generator, 420–421
<DD>Mush, 392
<DD>Nanoteq, 390
<DD>nonlinear-feedback shift registers, 412–413
<DD>1/p generator, 414
<DD>output-feedback mode, 205
<DD>Pike, 391–392
<DD>PKZIP, 394–395
<DD>Pless generator, 413–414
<DD>Rambutan, 390
<DD>random-sequence generators, 421–428
<DD>RC4, 397–398
<DD>Rip van Winkle cipher, 418–419
<DD>RSA generator, 417
<DD>SEAL, 398–400
<DD>self-synchronizing, 198–199
<DD>synchronous, 202–203
<DD>system-theoretic approach, 415–416
<DD>using feedback with carry shift registers, 405–412
<DL>
<DD>alternating stop-and-go generators, 410–411
<DD>cascade generators, 405
<DD>FCSR combining generators, 405, 410
<DD>LFSR/FCSR summation/parity cascade, 410–411
<DD>shrinking generators, 411–412
</DL>
<DD>using linear feedback shift registers, 381–388
<DL>
<DD>alternating stop-and-go generator, 383, 385
<DD>Beth-Piper stop-and-go generator, 383–384
<DD>bilateral stop-and-go generator, 384–385
<DD>DNRSG, 387
<DD>Geffe generator, 382
<DD>generalized Geffe generator, 382–383
<DD>Gollmann cascade, 387–388
<DD>Jennings generator, 383–384
<DD>multispeed inner-product generator, 386–387
<DD>self-decimated generator, 385–387
<DD>self-shrinking generator, 388
<DD>shrinking generator, 388
<DD>summation generator, 386–387
<DD>threshold generator, 384–386
</DL>
<DD>WAKE, 400–402
</DL>
<DD>Strict avalanche criteria, 350
<DD>Strong primes, 261
<DD>STU-III, 565–566
<DD>Subkey, 272
<DL>
<DD>Blowfish, 338–339
<DD>Crab, 342–343
<DD>IDEA, 322
<DD>independent, DES, 295
</DL>
<DD>Subliminal channel, 79–80
<DL>
<DD>applications, 80
<DD>DSA, 493, 534–536
<DD>ElGamal, 532–533
<DD>ESIGN, 533–534
<DD>foiling, 536
<DD>Ong-Schnorr-Shamir, 531–532
<DD>signature algorithm, 79
</DL>
<DD>Subliminal-free signature schemes, 80
<DD>Subprotocols, 26
<DD>Substitution boxes, 274–276
<DD>Substitution ciphers, 10–12
<DD>Substitution-permutation network, 347
<DD>SubStream, 414
<DD>Summation generator, 386–387
<DD>Superincreasing knapsack, 463–464
<DD>Superincreasing sequence, 463–464
<DD>Suppress-replay, 61
<DD>Surety Technologies, 79
<DD>SXAL8, 344
<DD>Symmetric algorithms, 4
<DD>Symmetric block algorithms, one-way hash functions using, 446–455
<DD>Symmetric cryptography:
<DL>
<DD>bit commitment using, 86–87
<DD>communication using, 28–29
<DD>key exchange with, 47–48
<DD>versus public-key cryptography, 216–217
</DL>
<DD>Symmetric cryptosystems, document signing, 35–37
<DD>Symmetric key length, 151–158
<
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -