找回密码
 立即注册
密码学cryptography密码教科书 | 企业管理 2022-09-10 101 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
part1:/data/151379part2:/data/151378?很多密码方案与协议,特别是基于公钥密码系统的,有一些基础性或所谓的“教科书式密码”版本,这些版本往往是很多密码学教材所包括的内容。本书采用了一种不一样的方法来介绍密码学——愈加注重适于使用的密码学方面。它解说了那些“教科书式密码”版本仅适合于理想S界的因素,即数据是随机的、坏人的发挥不会逾越预先的假定。本书通过展现“教科书式密码”版本的方案、协议、和系统在各种实践使用场合存在着很多攻击,来提醒“教科书式密码”版本在实践生活中的不适用性。本书有选择性的介绍了一些有效的密码方案、协议和系统,其间多数已成为了规范或事实上的规范,对其进行了具体的研究,解说了其工作原理,评论了其实践使用,而且常会以建立安全性模式证实的方法来调查它们的强(有效)安全性。别的,本书还完整地给出了学习现代密码学所必备的理论基础知识。

(part1:/data/151379part2:/data/151378? Many cryptographic schemes and protocols, especially those based on public-key cryptosystems, have some basic or so-called "textbook cryptography" versions, which are often used in many cryptography textbooks. included. This book takes a different approach to introducing cryptography - focusing more and more on the aspects of cryptography that are suitable for use. It explains those "textbook ciphers" versions that fit only in an ideal world, where data is random and bad actors don't play beyond pre-supposed assumptions. This book reminds the inapplicability of the "textbook cryptography" version in practical life by showing that the "textbook cryptography" version of the scheme, protocol, and system has many attacks in various practical use cases. This book selectively introduces some effective cryptographic schemes, protocols, and systems, most of which have become norms or de facto norms, conducts specific research on them, explains their working principles, comments on their practical use, And they are often investigated for their strong (effective) security by establishing security model validation. In addition, this book also gives a complete theoretical foundation for learning modern cryptography.)

[下载]13332896814.rar




上一篇:隐藏文件扫描
下一篇:流光Fluxay 软件