搬家送什么礼物最好| 回心转意是什么意思| 蛋白粉有什么用| 双重所有格是什么意思| mps是什么意思| 去湿气吃什么食物好| 月经是什么意思| 肝fnh是什么病| 有什么别有病| 狗吃什么药会立马就死| 脂肪肝浸润是什么意思| 肺部条索灶是什么意思| cc是什么单位| 月经期体重增加是什么原因| 7.31什么星座| 珙桐是什么植物| 大器晚成是什么意思| 老人嗜睡是什么原因| 血尿是什么病| 怀孕什么时候显怀| 降息是什么意思| 男生腿毛旺盛说明什么| 右眼老跳是什么原因| 什么颜色代表水| 卡粉是什么意思| 性感染有什么症状| 女人腰酸背痛是什么病| 四月23日是什么星座| min代表什么| 白居易被称为什么| r标是什么意思| 金牛座是什么星象| 榴莲蜜什么味道| 饱的偏旁叫什么| 非议是什么意思| 为什么不开朱元璋的墓| 胆囊炎属于什么科| bra什么意思| 八月二十五是什么星座| 遗憾是什么| 南瓜什么人不能吃| 树欲静而风不止什么意思| 荔枝都有什么品种| 豆角炒什么好吃| 萎缩性胃炎不能吃什么食物| 姨妈是什么意思| 淋巴细胞计数偏高是什么原因| 1999属什么| 腹主动脉钙化是什么意思| 叠是什么意思| 72年属什么的生肖| 玫瑰什么时候开花| 神经衰弱是什么意思| 一人吃饱全家不饿是什么生肖| 湿疹怎么治用什么药膏| 血hcg是什么意思| mac是什么牌子口红| 年柱亡神是什么意思| 发改委是做什么的| 洋盘是什么意思| 一马平川是什么生肖| 喉咙干疼吃什么药| 肉丝炒什么菜好吃| 通草和什么炖最催奶了| 骷髅是什么意思| 烟草属于什么行业| 验血肝功能看什么指标| 脑白质疏松是什么意思| 梦见好多猪是什么意思| 截疟是什么意思| 口腔溃疡要吃什么药| 什么是帽子戏法| 爱新觉罗是什么民族| 一号来的月经排卵期是什么时候| 花生不能和什么食物一起吃| 羊肉炖什么| 内科主要看什么病| 吃汤圆是什么节日| 双鱼女和什么座最配对| 汆水是什么意思| 出汗多吃什么| 世交是什么意思| 什么的流| 颈椎病是什么原因引起的| 胸闷出汗是什么原因| 浪迹天涯是什么生肖| 直肠增生性的息肉是什么意思| 鼠加句念什么| 少帅是什么军衔| 大生化检查都包括什么项目| 高兴的动物是什么生肖| 嗜酸性粒细胞高是什么原因| 婴儿喝什么牌奶粉好| 孕妇有狐臭擦什么最好| 胎儿偏小吃什么补得快| 85年属于什么生肖| 虚病是什么意思| am和pm是什么意思| 白茶属于什么茶| 血栓吃什么药可以疏通血管| ou是什么意思| 石榴代表什么生肖| 肝脂肪沉积是什么意思| 剧透是什么意思| 头孢长什么样图片| 雨中漫步是什么意思| 三七粉什么人不适合吃| 敏是什么意思| 栀子花什么时候开花| gucci是什么品牌| 沂字五行属什么| 国字脸适合什么发型男| 违反禁令标志指示什么意思| 什么是直男| 松板肉是什么肉| 葫芦什么时候开花| mankind是什么意思| 马卡龙是什么| 朝鲜面是什么原料做的| 断交社保有什么影响| 沉迷是什么意思| 泵头是什么| 空调什么时候发明的| 醋泡姜用什么醋好| 小儿麻痹是什么病| 什么是尿潴留| 7月16日是什么星座| 北京朝阳医院擅长什么| 六月份适合种什么菜| 牙神经挑了为什么还疼| 水落石出是什么意思| 咳嗽吃什么好| 男人为什么离不开情人| 高中什么时候分文理科| 带资进组什么意思| 打生长激素有什么副作用| 李白字什么号什么| 什么泡水喝杀幽门螺杆菌| 睾丸积液吃什么药| 前列腺增生有什么危害| 活好的女人有什么表现| 心脏供血不足吃什么| 10月21日什么星座| 面部油腻是什么原因| 性张力什么意思| 解脲脲原体阳性是什么| 人才辈出是什么意思| 日光灯属于什么光源| 尿液中有泡沫是什么原因| 肛门是什么意思| 风寒吃什么药| 精神寄托是什么意思| 黄金为什么值钱| 聊天是什么意思| 农历是什么生肖| 一什么白菜| 什么的大树| 朋友的反义词是什么| 孕妇牙龈出血是什么原因| 坐骨神经痛吃什么药好得快| 一什么雪| bdsm什么意思| 为什么会长脂肪粒| 等回声结节是什么意思| 脚转筋是什么原因| 家里为什么会进蝙蝠| 女性漏尿吃什么药最好| 艾滋病初期什么症状| elsevier是什么期刊| 右胸痛什么原因| qt什么意思| 吃完饭恶心想吐是什么原因| 骶髂关节在什么位置| 流云是什么意思| 什么是乌龙茶| 为什么喉咙痛| it代表什么| 花肠是母猪的什么部位| 阳明病是什么意思| 春回大地是指什么生肖| 大便颜色发绿是什么原因| 保育员是什么| 上海古代叫什么| 肝血虚吃什么食物调理| 市监狱长是什么级别| 坐地户是什么意思| 怀孕初期要注意什么| 阴影是什么意思| 中性粒细胞绝对值高是什么原因| 什么是肺腺癌| 破伤风伤口有什么症状| 齐白石擅长画什么| 淋巴结肿大是什么样子的| 手上脱皮是什么原因| 膝盖响是什么原因| 山楂泡酒有什么功效| 一什么一什么| mario是什么意思| 月经过多是什么原因| 什么叫过渡句| 肾怕什么| 皮肤发白一块一块的是什么病| pcl是什么意思| 五心烦热失眠手脚心发热吃什么药| 阴道真菌感染用什么药| 吹风样杂音见于什么病| 微量蛋白尿高说明什么| 妇科炎症用什么药| 香奈儿是什么品牌| 处是什么结构| 怀孕掉头发厉害是什么原因| 介石是什么意思| 开火上下结构念什么| 秋字五行属什么| 腰椎挂什么科室| 银属于五行属什么| 川字属于五行属什么| 什么1| 贫血都有什么症状| 毛主席的女儿为什么姓李| 糖代谢增高是什么意思| 钢笔刻字刻什么好| 成年人改名字需要什么手续| 肛门瘙痒用什么药| 头疼呕吐是什么原因| 2月12日什么星座| 痔疮挂什么科室| 定位是什么意思| 春指什么生肖| 股票解禁是什么意思| 回头是岸是什么意思| 颔是什么意思| 上午八点是什么时辰| other是什么品牌| 牙龈肿痛吃什么药快速消肿止痛| 肩周炎吃什么药效果最好| 庶母是什么意思| 受控是什么意思| 毒是什么意思| 梦见妈妈出轨预示什么意思| 什么是心理学| 麸质是什么意思| 什么是免疫力| 保鲜卡是什么原理纸片| 物理意义是什么意思| 脱发是什么病| soe咖啡是什么意思| 做梦梦见鬼是什么意思| 唾液酸是什么| 做春梦是什么原因| 一岁宝宝能吃什么水果| 蹂躏是什么意思| 王玉读什么| 酸野是什么| 心脏房颤吃什么药好| 敏使朗是什么药| 2004年是什么生肖| 大三阳是什么意思| 大红袍是什么茶类| 杏色配什么颜色好看| 痔疮长什么样子图片| 高血压属于什么系统疾病| 沉甸甸的爱是什么意思| 黑加仑是什么水果| 百度Jump to content

卖房送女留学却嫁老外 父母崩溃:我们老了谁照顾

From Wikipedia, the free encyclopedia
(Redirected from Public key cryptography)
百度 1927年,准备在英国上市的Selfridge百货公司也非常被美国投资者看好,但无奈于当时英国的法律规定,本国企业不许在海外登记上市。

An unpredictable (typically large and random) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm.
In this example the message is digitally signed with Alice's private key, but the message itself is not encrypted. 1) Alice signs a message with her private key. 2) Using Alice's public key, Bob can verify that Alice sent the message and that the message has not been modified.
In the Diffie–Hellman key exchange scheme, each party generates a public/private key pair and distributes the public key of the pair. After obtaining an authentic (n.b., this is critical) copy of each other's public keys, Alice and Bob can compute a shared secret offline. The shared secret can be used, for instance, as the key for a symmetric cipher.
In an asymmetric key encryption scheme, anyone can encrypt messages using a public key, but only the holder of the paired private key can decrypt such a message. The security of the system depends on the secrecy of the private key, which must not become known to any other.

Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key.[1][2] Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.[3] There are many kinds of public-key cryptosystems, with different security goals, including digital signature, Diffie–Hellman key exchange, public-key key encapsulation, and public-key encryption.

Public key algorithms are fundamental security primitives in modern cryptosystems, including applications and protocols that offer assurance of the confidentiality and authenticity of electronic communications and data storage. They underpin numerous Internet standards, such as Transport Layer Security (TLS), SSH, S/MIME, and PGP. Compared to symmetric cryptography, public-key cryptography can be too slow for many purposes,[4] so these protocols often combine symmetric cryptography with public-key cryptography in hybrid cryptosystems.

Description

[edit]

Before the mid-1970s, all cipher systems used symmetric key algorithms, in which the same cryptographic key is used with the underlying algorithm by both the sender and the recipient, who must both keep it secret. Of necessity, the key in every such system had to be exchanged between the communicating parties in some secure way prior to any use of the system – for instance, via a secure channel. This requirement is never trivial and very rapidly becomes unmanageable as the number of participants increases, or when secure channels are not available, or when, (as is sensible cryptographic practice), keys are frequently changed. In particular, if messages are meant to be secure from other users, a separate key is required for each possible pair of users.

By contrast, in a public-key cryptosystem, the public keys can be disseminated widely and openly, and only the corresponding private keys need be kept secret.

The two best-known types of public key cryptography are digital signature and public-key encryption:

  • In a digital signature system, a sender can use a private key together with a message to create a signature. Anyone with the corresponding public key can verify whether the signature matches the message, but a forger who does not know the private key cannot find any message/signature pair that will pass verification with the public key.[5][6][7]

    For example, a software publisher can create a signature key pair and include the public key in software installed on computers. Later, the publisher can distribute an update to the software signed using the private key, and any computer receiving an update can confirm it is genuine by verifying the signature using the public key. As long as the software publisher keeps the private key secret, even if a forger can distribute malicious updates to computers, they cannot convince the computers that any malicious updates are genuine.

  • In a public-key encryption system, anyone with a public key can encrypt a message, yielding a ciphertext, but only those who know the corresponding private key can decrypt the ciphertext to obtain the original message.[8]

    For example, a journalist can publish the public key of an encryption key pair on a web site so that sources can send secret messages to the news organization in ciphertext.

    Only the journalist who knows the corresponding private key can decrypt the ciphertexts to obtain the sources' messages—an eavesdropper reading email on its way to the journalist cannot decrypt the ciphertexts. However, public-key encryption does not conceal metadata like what computer a source used to send a message, when they sent it, or how long it is.[9][10][11][12] Public-key encryption on its own also does not tell the recipient anything about who sent a message[8]: 283[13][14]—it just conceals the content of the message.

One important issue is confidence/proof that a particular public key is authentic, i.e. that it is correct and belongs to the person or entity claimed, and has not been tampered with or replaced by some (perhaps malicious) third party. There are several possible approaches, including:

A public key infrastructure (PKI), in which one or more third parties – known as certificate authorities – certify ownership of key pairs. TLS relies upon this. This implies that the PKI system (software, hardware, and management) is trust-able by all involved.

A "web of trust" decentralizes authentication by using individual endorsements of links between a user and the public key belonging to that user. PGP uses this approach, in addition to lookup in the domain name system (DNS). The DKIM system for digitally signing emails also uses this approach.

Applications

[edit]

The most obvious application of a public key encryption system is for encrypting communication to provide confidentiality – a message that a sender encrypts using the recipient's public key, which can be decrypted only by the recipient's paired private key. Most digital services such as financial services, email, and messaging applications utilized daily are secured using public key encryption. [15]

Another application in public key cryptography is the digital signature. Digital signature schemes can be used for sender authentication.

Non-repudiation systems use digital signatures to ensure that one party cannot successfully dispute its authorship of a document or communication.

Further applications built on this foundation include: digital cash, password-authenticated key agreement, time-stamping services and non-repudiation protocols.

Hybrid cryptosystems

[edit]

Because asymmetric key algorithms are nearly always much more computationally intensive than symmetric ones, it is common to use a public/private asymmetric key-exchange algorithm to encrypt and exchange a symmetric key, which is then used by symmetric-key cryptography to transmit data using the now-shared symmetric key for a symmetric key encryption algorithm. PGP, SSH, and the SSL/TLS family of schemes use this procedure; they are thus called hybrid cryptosystems. The initial asymmetric cryptography-based key exchange to share a server-generated symmetric key from the server to client has the advantage of not requiring that a symmetric key be pre-shared manually, such as on printed paper or discs transported by a courier, while providing the higher data throughput of symmetric key cryptography over asymmetric key cryptography for the remainder of the shared connection.

Weaknesses

[edit]

As with all security-related systems, there are various potential weaknesses in public-key cryptography. Aside from poor choice of an asymmetric key algorithm (there are few that are widely regarded as satisfactory) or too short a key length, the chief security risk is that the private key of a pair becomes known. All security of messages, authentication, etc., will then be lost.

Additionally, with the advent of quantum computing, many asymmetric key algorithms are considered vulnerable to attacks, and new quantum-resistant schemes are being developed to overcome the problem.[16][17]

Algorithms

[edit]

All public key schemes are in theory susceptible to a "brute-force key search attack".[18] However, such an attack is impractical if the amount of computation needed to succeed – termed the "work factor" by Claude Shannon – is out of reach of all potential attackers. In many cases, the work factor can be increased by simply choosing a longer key. But other algorithms may inherently have much lower work factors, making resistance to a brute-force attack (e.g., from longer keys) irrelevant. Some special and specific algorithms have been developed to aid in attacking some public key encryption algorithms; both RSA and ElGamal encryption have known attacks that are much faster than the brute-force approach.[citation needed] None of these are sufficiently improved to be actually practical, however.

Major weaknesses have been found for several formerly promising asymmetric key algorithms. The "knapsack packing" algorithm was found to be insecure after the development of a new attack.[19] As with all cryptographic functions, public-key implementations may be vulnerable to side-channel attacks that exploit information leakage to simplify the search for a secret key. These are often independent of the algorithm being used. Research is underway to both discover, and to protect against, new attacks.

Alteration of public keys

[edit]

Another potential security vulnerability in using asymmetric keys is the possibility of a "man-in-the-middle" attack, in which the communication of public keys is intercepted by a third party (the "man in the middle") and then modified to provide different public keys instead. Encrypted messages and responses must, in all instances, be intercepted, decrypted, and re-encrypted by the attacker using the correct public keys for the different communication segments so as to avoid suspicion.[citation needed]

A communication is said to be insecure where data is transmitted in a manner that allows for interception (also called "sniffing"). These terms refer to reading the sender's private data in its entirety. A communication is particularly unsafe when interceptions can not be prevented or monitored by the sender.[20]

A man-in-the-middle attack can be difficult to implement due to the complexities of modern security protocols. However, the task becomes simpler when a sender is using insecure media such as public networks, the Internet, or wireless communication. In these cases an attacker can compromise the communications infrastructure rather than the data itself. A hypothetical malicious staff member at an Internet service provider (ISP) might find a man-in-the-middle attack relatively straightforward. Capturing the public key would only require searching for the key as it gets sent through the ISP's communications hardware; in properly implemented asymmetric key schemes, this is not a significant risk.[citation needed]

In some advanced man-in-the-middle attacks, one side of the communication will see the original data while the other will receive a malicious variant. Asymmetric man-in-the-middle attacks can prevent users from realizing their connection is compromised. This remains so even when one user's data is known to be compromised because the data appears fine to the other user. This can lead to confusing disagreements between users such as "it must be on your end!" when neither user is at fault. Hence, man-in-the-middle attacks are only fully preventable when the communications infrastructure is physically controlled by one or both parties; such as via a wired route inside the sender's own building. In summation, public keys are easier to alter when the communications hardware used by a sender is controlled by an attacker.[21][22][23]

Public key infrastructure

[edit]

One approach to prevent such attacks involves the use of a public key infrastructure (PKI); a set of roles, policies, and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. However, this has potential weaknesses.

For example, the certificate authority issuing the certificate must be trusted by all participating parties to have properly checked the identity of the key-holder, to have ensured the correctness of the public key when it issues a certificate, to be secure from computer piracy, and to have made arrangements with all participants to check all their certificates before protected communications can begin. Web browsers, for instance, are supplied with a long list of "self-signed identity certificates" from PKI providers – these are used to check the bona fides of the certificate authority and then, in a second step, the certificates of potential communicators. An attacker who could subvert one of those certificate authorities into issuing a certificate for a bogus public key could then mount a "man-in-the-middle" attack as easily as if the certificate scheme were not used at all. An attacker who penetrates an authority's servers and obtains its store of certificates and keys (public and private) would be able to spoof, masquerade, decrypt, and forge transactions without limit, assuming that they were able to place themselves in the communication stream.

Despite its theoretical and potential problems, Public key infrastructure is widely used. Examples include TLS and its predecessor SSL, which are commonly used to provide security for web browser transactions (for example, most websites utilize TLS for HTTPS).

Aside from the resistance to attack of a particular key pair, the security of the certification hierarchy must be considered when deploying public key systems. Some certificate authority – usually a purpose-built program running on a server computer – vouches for the identities assigned to specific private keys by producing a digital certificate. Public key digital certificates are typically valid for several years at a time, so the associated private keys must be held securely over that time. When a private key used for certificate creation higher in the PKI server hierarchy is compromised, or accidentally disclosed, then a "man-in-the-middle attack" is possible, making any subordinate certificate wholly insecure.

Unencrypted metadata

[edit]

Most of the available public-key encryption software does not conceal metadata in the message header, which might include the identities of the sender and recipient, the sending date, subject field, and the software they use etc. Rather, only the body of the message is concealed and can only be decrypted with the private key of the intended recipient. This means that a third party could construct quite a detailed model of participants in a communication network, along with the subjects being discussed, even if the message body itself is hidden.

However, there has been a recent demonstration of messaging with encrypted headers, which obscures the identities of the sender and recipient, and significantly reduces the available metadata to a third party.[24] The concept is based around an open repository containing separately encrypted metadata blocks and encrypted messages. Only the intended recipient is able to decrypt the metadata block, and having done so they can identify and download their messages and decrypt them. Such a messaging system is at present in an experimental phase and not yet deployed. Scaling this method would reveal to the third party only the inbox server being used by the recipient and the timestamp of sending and receiving. The server could be shared by thousands of users, making social network modelling much more challenging.

History

[edit]

During the early history of cryptography, two parties would rely upon a key that they would exchange by means of a secure, but non-cryptographic, method such as a face-to-face meeting, or a trusted courier. This key, which both parties must then keep absolutely secret, could then be used to exchange encrypted messages. A number of significant practical difficulties arise with this approach to distributing keys.

Anticipation

[edit]

In his 1874 book The Principles of Science, William Stanley Jevons wrote:[25]

Can the reader say what two numbers multiplied together will produce the number 8616460799?[26] I think it unlikely that anyone but myself will ever know.[25]

Here he described the relationship of one-way functions to cryptography, and went on to discuss specifically the factorization problem used to create a trapdoor function. In July 1996, mathematician Solomon W. Golomb said: "Jevons anticipated a key feature of the RSA Algorithm for public key cryptography, although he certainly did not invent the concept of public key cryptography."[27]

Classified discovery

[edit]

In 1970, James H. Ellis, a British cryptographer at the UK Government Communications Headquarters (GCHQ), conceived of the possibility of "non-secret encryption", (now called public key cryptography), but could see no way to implement it.[28][29]

In 1973, his colleague Clifford Cocks implemented what has become known as the RSA encryption algorithm, giving a practical method of "non-secret encryption", and in 1974 another GCHQ mathematician and cryptographer, Malcolm J. Williamson, developed what is now known as Diffie–Hellman key exchange. The scheme was also passed to the US's National Security Agency.[30] Both organisations had a military focus and only limited computing power was available in any case; the potential of public key cryptography remained unrealised by either organization:

I judged it most important for military use ... if you can share your key rapidly and electronically, you have a major advantage over your opponent. Only at the end of the evolution from Berners-Lee designing an open internet architecture for CERN, its adaptation and adoption for the Arpanet ... did public key cryptography realise its full potential.

Ralph Benjamin[30]

These discoveries were not publicly acknowledged until the research was declassified by the British government in 1997.[31]

Public discovery

[edit]

In 1976, an asymmetric key cryptosystem was published by Whitfield Diffie and Martin Hellman who, influenced by Ralph Merkle's work on public key distribution, disclosed a method of public key agreement. This method of key exchange, which uses exponentiation in a finite field, came to be known as Diffie–Hellman key exchange.[32] This was the first published practical method for establishing a shared secret-key over an authenticated (but not confidential) communications channel without using a prior shared secret. Merkle's "public key-agreement technique" became known as Merkle's Puzzles, and was invented in 1974 and only published in 1978. This makes asymmetric encryption a rather new field in cryptography although cryptography itself dates back more than 2,000 years.[33]

In 1977, a generalization of Cocks's scheme was independently invented by Ron Rivest, Adi Shamir and Leonard Adleman, all then at MIT. The latter authors published their work in 1978 in Martin Gardner's Scientific American column, and the algorithm came to be known as RSA, from their initials.[34] RSA uses exponentiation modulo a product of two very large primes, to encrypt and decrypt, performing both public key encryption and public key digital signatures. Its security is connected to the extreme difficulty of factoring large integers, a problem for which there is no known efficient general technique. A description of the algorithm was published in the Mathematical Games column in the August 1977 issue of Scientific American.[35]

Since the 1970s, a large number and variety of encryption, digital signature, key agreement, and other techniques have been developed, including the Rabin signature, ElGamal encryption, DSA and ECC.

Examples

[edit]

Examples of well-regarded asymmetric key techniques for varied purposes include:

Examples of asymmetric key algorithms not yet widely adopted include:

Examples of notable – yet insecure – asymmetric key algorithms include:

Examples of protocols using asymmetric key algorithms include:

See also

[edit]

Notes

[edit]
  1. ^ R. Shirey (August 2007). Internet Security Glossary, Version 2. Network Working Group. doi:10.17487/RFC4949. RFC 4949. Informational.
  2. ^ Bernstein, Daniel J.; Lange, Tanja (14 September 2017). "Post-quantum cryptography". Nature. 549 (7671): 188–194. Bibcode:2017Natur.549..188B. doi:10.1038/nature23461. ISSN 0028-0836. PMID 28905891. S2CID 4446249.
  3. ^ Stallings, William (3 May 1990). Cryptography and Network Security: Principles and Practice. Prentice Hall. p. 165. ISBN 9780138690175.
  4. ^ Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio (27 June 2017). "Algorithms for Lightweight Key Exchange". Sensors. 17 (7): 1517. doi:10.3390/s17071517. ISSN 1424-8220. PMC 5551094. PMID 28654006.
  5. ^ Menezes, Alfred J.; van Oorschot, Paul C.; Vanstone, Scott A. (October 1996). "Chapter 8: Public-key encryption". Handbook of Applied Cryptography (PDF). CRC Press. pp. 425–488. ISBN 0-8493-8523-7. Retrieved 8 October 2022.
  6. ^ Bernstein, Daniel J. (1 May 2008). "Protecting communications against forgery". Algorithmic Number Theory (PDF). Vol. 44. MSRI Publications. §5: Public-key signatures, pp. 543–545. Retrieved 8 October 2022.
  7. ^ Bellare, Mihir; Goldwasser, Shafi (July 2008). "Chapter 10: Digital signatures". Lecture Notes on Cryptography (PDF). p. 168. Archived (PDF) from the original on 20 April 2022. Retrieved 11 June 2023.
  8. ^ a b Menezes, Alfred J.; van Oorschot, Paul C.; Vanstone, Scott A. (October 1996). "8: Public-key encryption". Handbook of Applied Cryptography (PDF). CRC Press. pp. 283–319. ISBN 0-8493-8523-7. Retrieved 8 October 2022.
  9. ^ Danezis, George; Diaz, Claudia; Syverson, Paul (2010). "Chapter 13: Anonymous Communication". In Rosenberg, Burton (ed.). Handbook of Financial Cryptography and Security (PDF). Chapman & Hall/CRC. pp. 341–390. ISBN 978-1420059816. Since PGP, beyond compressing the messages, does not make any further attempts to hide their size, it is trivial to follow a message in the network just by observing its length.
  10. ^ Rackoff, Charles; Simon, Daniel R. (1993). "Cryptographic defense against traffic analysis". Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing. STOC '93: ACM Symposium on the Theory of Computing. Association for Computing Machinery. pp. 672–681. doi:10.1145/167088.167260. Now, certain types of information cannot reasonably be assumed to be concealed. For instance, an upper bound on the total volume of a party's sent or received communication (of any sort) is obtainable by anyone with the resources to examine all possible physical communication channels available to that party.
  11. ^ Karger, Paul A. (May 1977). "11: Limitations of End-to-End Encryption". Non-Discretionary Access Control for Decentralized Computing Systems (S.M. thesis). Laboratory for Computer Science, Massachusetts Institute of Technology. hdl:1721.1/149471. The scenario just described would seem to be secure, because all data is encrypted before being passed to the communications processors. However, certain control information must be passed in cleartext from the host to the communications processor to allow the network to function. This control information consists of the destination address for the packet, the length of the packet, and the time between successive packet transmissions.
  12. ^ Chaum, David L. (February 1981). Rivest, R. (ed.). "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms". Communications of the ACM. 24 (2). Association for Computing Machinery. Recently, some new solutions to the "key distribution problem" (the problem of providing each communicant with a secret key) have been suggested, under the name of public key cryptography. Another cryptographic problem, the "traffic analysis problem" (the problem of keeping confidential who converses with whom, and when they converse), will become increasingly important with the growth of electronic mail.
  13. ^ Davis, Don (2001). "Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML". Proceedings of the 2001 USENIX Annual Technical Conference. USENIX. pp. 65–78. Why is na?ve Sign & Encrypt insecure? Most simply, S&E is vulnerable to "surreptitious forwarding:" Alice signs & encrypts for Bob's eyes, but Bob re-encrypts Alice's signed message for Charlie to see. In the end, Charlie believes Alice wrote to him directly, and can't detect Bob's subterfuge.
  14. ^ An, Jee Hea (12 September 2001). Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses (Technical report). IACR Cryptology ePrint Archive. 2001/079. Retrieved 24 November 2024.
  15. ^ "Post-Quantum Cryptography: A New Security Paradigm for the Post-Quantum Era". Penta Security Inc. 5 June 2025. Retrieved 10 July 2025.
  16. ^ Escribano Pablos, José Ignacio; González Vasco, María Isabel (April 2023). "Secure post-quantum group key exchange: Implementing a solution based on Kyber". IET Communications. 17 (6): 758–773. doi:10.1049/cmu2.12561. hdl:10016/37141. ISSN 1751-8628. S2CID 255650398.
  17. ^ Stohrer, Christian; Lugrin, Thomas (2023), Mulder, Valentin; Mermoud, Alain; Lenders, Vincent; Tellenbach, Bernhard (eds.), "Asymmetric Encryption", Trends in Data Protection and Encryption Technologies, Cham: Springer Nature Switzerland, pp. 11–14, doi:10.1007/978-3-031-33386-6_3, ISBN 978-3-031-33386-6
  18. ^ Paar, Christof; Pelzl, Jan; Preneel, Bart (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer. ISBN 978-3-642-04100-6.
  19. ^ Shamir, Adi (November 1982). "A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem". 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982). pp. 145–152. doi:10.1109/SFCS.1982.5.
  20. ^ Tunggal, Abi (20 February 2020). "What Is a Man-in-the-Middle Attack and How Can It Be Prevented – What is the difference between a man-in-the-middle attack and sniffing?". UpGuard. Retrieved 26 June 2020.[self-published source?]
  21. ^ Tunggal, Abi (20 February 2020). "What Is a Man-in-the-Middle Attack and How Can It Be Prevented - Where do man-in-the-middle attacks happen?". UpGuard. Retrieved 26 June 2020.[self-published source?]
  22. ^ martin (30 January 2013). "China, GitHub and the man-in-the-middle". GreatFire. Archived from the original on 19 August 2016. Retrieved 27 June 2015.[self-published source?]
  23. ^ percy (4 September 2014). "Authorities launch man-in-the-middle attack on Google". GreatFire. Retrieved 26 June 2020.[self-published source?]
  24. ^ Bjorgvinsdottir, Hanna; Bentley, Phil (24 June 2021). "Warp2: A Method of Email and Messaging with Encrypted Addressing and Headers". arXiv:1411.6409 [cs.CR].
  25. ^ a b Jevons, W.S. (1874). The Principles of Science: A Treatise on Logic and Scientific Method. Macmillan & Co. p. 141. Retrieved 18 January 2024.
  26. ^ Weisstein, E.W. (2024). "Jevons' Number". MathWorld. Retrieved 18 January 2024.
  27. ^ Golob, Solomon W. (1996). "On Factoring Jevons' Number". Cryptologia. 20 (3): 243. doi:10.1080/0161-119691884933. S2CID 205488749.
  28. ^ Ellis, James H. (January 1970). "The Possibility of Secure Non-secret Digital Encryption" (PDF). CryptoCellar. Retrieved 18 January 2024.
  29. ^ Sawer, Patrick (11 March 2016). "The unsung genius who secured Britain's computer defences and paved the way for safe online shopping". The Telegraph.
  30. ^ a b Espiner, Tom (26 October 2010). "GCHQ pioneers on birth of public key crypto". ZDNet.
  31. ^ Singh, Simon (1999). The Code Book. Doubleday. pp. 279–292.
  32. ^ Diffie, Whitfield; Hellman, Martin E. (November 1976). "New Directions in Cryptography" (PDF). IEEE Transactions on Information Theory. 22 (6): 644–654. CiteSeerX 10.1.1.37.9720. doi:10.1109/TIT.1976.1055638. Archived (PDF) from the original on 29 November 2014.
  33. ^ "Asymmetric encryption". IONOS Digitalguide. Retrieved 9 June 2022.
  34. ^ Rivest, R.; Shamir, A.; Adleman, L. (February 1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" (PDF). Communications of the ACM. 21 (2): 120–126. CiteSeerX 10.1.1.607.2677. doi:10.1145/359340.359342. S2CID 2873616. Archived from the original (PDF) on 17 December 2008. Retrieved 15 November 2019.
  35. ^ Robinson, Sara (June 2003). "Still Guarding Secrets after Years of Attacks, RSA Earns Accolades for its Founders" (PDF). SIAM News. 36 (5).

References

[edit]
[edit]
田字出头是什么字 莞字五行属什么 舌头发紫是什么原因 捡什么废品最值钱 ppd是什么
右肾肾盂分离什么意思 肺部不好有什么症状 重复肾是什么意思 长孙是什么意思 秦始皇原名叫什么名字
女人要的是什么 beko是什么牌子 什么颜色对眼睛有好处 为什么喝水血糖也会高 草字头的字和什么有关
一什么手 鱼平念什么 鼻子上长痘痘是什么原因 离婚带什么证件才能办理 蔷薇是什么意思
三七粉主要治疗什么病hcv8jop7ns0r.cn 追龙什么意思hcv9jop8ns1r.cn 泾渭分明是什么意思hcv8jop7ns1r.cn 鱼肝油什么时候吃最好hcv9jop2ns5r.cn 不怀孕是什么原因引起的0297y7.com
鳗鱼吃什么食物hcv8jop5ns4r.cn 血精是什么原因hcv7jop9ns8r.cn 骨龄挂什么科hcv9jop1ns1r.cn 朝鲜和韩国什么时候分开的hcv9jop3ns7r.cn 胸口痛吃什么药hcv9jop5ns3r.cn
什么花香huizhijixie.com 儿童c反应蛋白高说明什么hcv8jop2ns0r.cn 掉头发是什么原因女性hcv9jop8ns3r.cn 子宫内膜厚是什么原因引起的hcv7jop6ns1r.cn 椰土是什么hcv9jop1ns9r.cn
查激素挂什么科mmeoe.com 吃知柏地黄丸有什么副作用hcv8jop0ns6r.cn mc什么意思hcv9jop6ns6r.cn 独角仙吃什么食物cl108k.com 喝什么解酒快hcv8jop0ns7r.cn
百度