密码学
文章平均质量分 67
dbzou
这个作者很懒,什么都没留下…
展开
-
《Modern Cryptogrophy:Theory and practice》学习笔记之第二章 part I
第二章 Wrestling Between Safeguard and Attack一些术语: encryption, encipherment, decription, decipherment, cryptographic algorithms, symmetric(shared-key) cryptosystem, asymmetric(public-key) cryptosy原创 2004-09-05 08:54:00 · 928 阅读 · 0 评论 -
《Modern Cryptogrophy:Theory and practice》学习笔记之第一章
Chapter One: Begining with a Simple Communication GameThree important aspects to serve as general guidelines for security system designers and implementors:1.Be explicit about all assumptions need原创 2004-09-04 17:03:00 · 857 阅读 · 0 评论 -
《Modern Cryptogrophy:Theory and practice》学习笔记之第二章 part II
下面是Attack 和Fix之间不断反复的例子(以认证的密钥建立协议为例 Protocols for Authenticated Key Establishment Using Encryption)Prot2.1: Protocol “From Alice to Bob”Alice generates K at random, creates {K}KAT, and sends t原创 2004-09-05 09:20:00 · 814 阅读 · 0 评论