<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta charset="utf-8">
<meta name="generator" content="pdf2htmlEX">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<link rel="stylesheet" href="https://static.pudn.com/base/css/base.min.css">
<link rel="stylesheet" href="https://static.pudn.com/base/css/fancy.min.css">
<link rel="stylesheet" href="https://static.pudn.com/prod/directory_preview_static/6282d8d5ebb030486d80231f/raw.css">
<script src="https://static.pudn.com/base/js/compatibility.min.js"></script>
<script src="https://static.pudn.com/base/js/pdf2htmlEX.min.js"></script>
<script>
try{
pdf2htmlEX.defaultViewer = new pdf2htmlEX.Viewer({});
}catch(e){}
</script>
<title></title>
</head>
<body>
<div id="sidebar" style="display: none">
<div id="outline">
</div>
</div>
<div id="pf1" class="pf w0 h0" data-page-no="1"><div class="pc pc1 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/6282d8d5ebb030486d80231f/bg1.jpg"><div class="t m0 x1 h2 y1 ff1 fs0 fc0 sc0 ls0 ws0">序<span class="ff2 sc1"> </span></div><div class="t m0 x2 h2 y2 ff2 fs0 fc0 sc1 ls1 ws0">W.<span class="_ _0"></span><span class="ff1 sc0 ls2">迪菲</span><span class="ls3 ws1">(Whitfield Diffie) </span></div><div class="t m0 x3 h3 y3 ff3 fs1 fc0 sc1 ls0 ws0"> </div><div class="t m0 x4 h4 y4 ff1 fs1 fc0 sc1 ls0 ws0">密码学文献有一个奇妙的发展历程,<span class="_ _1"></span>当然,<span class="_ _1"></span>密而不宣总是扮演主要角色。<span class="_ _1"></span>第一次世界大</div><div class="t m0 x3 h4 y5 ff1 fs1 fc0 sc1 ls0 ws0">战前,<span class="_ _2"></span>重要的密码学进展很少出现在公开文献中,<span class="_ _2"></span>但该领域却和其它专业学科一样向前发展。</div><div class="t m0 x3 h3 y6 ff1 fs1 fc0 sc1 ls0 ws0">直到<span class="_ _3"> </span><span class="ff3 ls4">1918<span class="_ _3"> </span></span>年,二十世纪最有影响的密码分析文章之一</div><div class="t m0 x5 h3 y7 ff4 fs2 fc0 sc1 ls0 ws0"><span class="ff3 fs1 ls5 ws2">W<span class="_ _4"></span>illiam F<span class="_ _5"></span>. Friedman<span class="_ _3"> </span><span class="ff1 ls0 ws0">的专题论文</span></span></div><div class="t m0 x3 h3 y8 ff1 fs1 fc0 sc1 ls6 ws0">《重合指数及其在密码学中的应用》作为私立的“河岸(<span class="ff3 ls7">Riverbank<span class="_ _6"></span></span>)实验室”的一份研究</div><div class="t m0 x3 h3 y9 ff1 fs1 fc0 sc1 ls0 ws0">报告问世了<span class="ff3 ls8">[577]</span>,<span class="_ _7"></span>其实,<span class="_ _7"></span>这篇著作涉及的工作是在战时完成的。<span class="_ _7"></span>同年,<span class="_ _8"></span>加州奥克兰的<span class="_ _9"> </span><span class="ff3 ls9">Edward </span></div><div class="t m0 x3 h3 ya ff3 fs1 fc0 sc1 lsa ws0">H.Hebern<span class="_"> </span><span class="ff1 ls0">申请了第一个转轮机专利</span><span class="ls8">[710]<span class="ff1 ls0">,<span class="_ _a"></span>这种装置在差不多<span class="_ _9"> </span><span class="ff3 ls4">50<span class="_"> </span></span>年里被指定为美军的主要密</span></span></div><div class="t m0 x3 h3 yb ff1 fs1 fc0 sc1 ls0 ws0">码设备。<span class="ff3"> </span></div><div class="t m0 x4 h4 yc ff1 fs1 fc0 sc1 ls0 ws0">然而,<span class="_ _1"></span>第一次世界大战后,<span class="_ _1"></span>情况开始变化,<span class="_ _1"></span>完全处于秘密工作状态的美国陆军和海军的</div><div class="t m0 x3 h3 yd ff1 fs1 fc0 sc1 ls0 ws0">机要部门开始在密码学方面取得根本性的进展。<span class="_ _8"></span>在<span class="_ _9"> </span><span class="ff3 ls4">30<span class="_"> </span></span>年代和<span class="_ _9"> </span><span class="ff3 lsb">40<span class="_"> </span></span>年代,<span class="_ _8"></span>有几篇基础性的文章</div><div class="t m0 x3 h4 ye ff1 fs1 fc0 sc1 ls0 ws0">出现在公开的文献中,<span class="_ _8"></span>有关该领域的几篇论文也发表了,<span class="_ _8"></span>只不过这些论文的内容离当时真正</div><div class="t m0 x3 h4 yf ff1 fs1 fc0 sc1 ls0 ws0">的技术水平相去甚远,<span class="_ _5"></span>战争结束时,<span class="_ _1"></span>情况急转直下,<span class="_ _5"></span>公开的文献几乎殆尽。<span class="_ _5"></span>只有一个突出的</div><div class="t m0 x3 h3 y10 ff1 fs1 fc0 sc1 ls0 ws0">例外,<span class="_ _8"></span>那就是仙农<span class="ff3 lsc ws3">(Claude Shannon)</span>的文章<span class="_ _8"></span>《保密系统的通信理论》<span class="_ _8"></span><span class="ff3 lsd">[1432]<span class="ff1 ls0">出现在<span class="_ _9"> </span></span><span class="ls4">1949<span class="_"> </span><span class="ff1 lse">年《<span class="_ _b"> </span>贝</span></span></span></div><div class="t m0 x3 h3 y11 ff1 fs1 fc0 sc1 ls0 ws0">尔系统技术杂志》上,它类似于<span class="_ _c"> </span><span class="ff3 lsf">Friedman1918<span class="_ _d"> </span></span>年的文章,也是战时工作的产物。这篇文章</div><div class="t m0 x3 h3 y12 ff1 fs1 fc0 sc1 ls0 ws0">在第二次世界大战结束后即被解密,可能是由于失误。<span class="ff3"> </span></div><div class="t m0 x4 h3 y13 ff1 fs1 fc0 sc1 ls0 ws0">从<span class="_ _9"> </span><span class="ff3 ls4">1949<span class="_"> </span></span>年到<span class="_ _9"> </span><span class="ff3 lsb">1967<span class="_"> </span></span>年,<span class="_ _2"></span>密码学文献近乎空白。<span class="_ _2"></span>在<span class="_ _9"> </span><span class="ff3 ls4">1<span class="_ _6"></span>967<span class="_"> </span></span>年,<span class="_ _2"></span>一部与众不同的著作<span class="ff3 ls10">——David </span></div><div class="t m0 x3 h3 y14 ff3 fs1 fc0 sc1 ls11 ws0">Kahn<span class="_"> </span><span class="ff1 ls0">的《破译者》</span><span class="ls12">[794]——<span class="ff1 ls0">出现了,它没有任何新的技术思想,<span class="_ _4"></span>但却对以往的密码学历史</span></span></div><div class="t m0 x3 h4 y15 ff1 fs1 fc0 sc1 ls0 ws0">作了相当完整的记述,包括提及政府仍然认为是秘密的一<span class="_ _6"></span>些事情。<span class="_ _e"></span>《破译者》的意义不仅在</div><div class="t m0 x3 h4 y16 ff1 fs1 fc0 sc1 ls0 ws0">于它涉及到的相当广泛的领域,而且在于它使成千上万原本不知道密码学的人了解密码学。</div><div class="t m0 x3 h3 y17 ff1 fs1 fc0 sc1 ls0 ws0">新的密码学文章慢慢地开始源源不断地被编写出来了。<span class="ff3"> </span></div><div class="t m0 x4 h3 y18 ff1 fs1 fc0 sc1 ls0 ws0">大约在同一时期,<span class="_ _5"></span>早期为空军研制敌我识别装置的<span class="_ _9"> </span><span class="ff3 ls13 ws4">Horst Feistel<span class="_"> </span></span>在位于纽约约克镇高地</div><div class="t m0 x3 h3 y19 ff1 fs1 fc0 sc1 ls0 ws0">的<span class="_ _9"> </span><span class="ff3 ls14 ws5">IBM W<span class="_ _5"></span>atson<span class="_ _9"> </span><span class="ff1 ls0 ws0">实验室里花费了毕生精力致力于密码学的研究。<span class="_ _4"></span>在那里他开始着手美国数据</span></span></div><div class="t m0 x3 h3 y1a ff1 fs1 fc0 sc1 ls0 ws0">加密标准<span class="_ _4"></span>(<span class="ff3 ls15">DES</span>)的研究,<span class="_ _4"></span>到<span class="_ _b"> </span><span class="ff3 ls4">70<span class="_ _3"> </span></span>年代初期,<span class="_ _4"></span><span class="ff3">IBM<span class="_"> </span><span class="ff1">发表了<span class="_ _b"> </span></span><span class="ls16">Feistel<span class="_"> </span></span><span class="ff1">和他的同事在这个课题方面</span></span></div><div class="t m0 x3 h3 y1b ff1 fs1 fc0 sc1 ls0 ws0">的几篇技术报告<span class="ff3 ls17">[1482</span>,<span class="ff3 lsb">1484</span>,<span class="ff3 lsb">552]</span>。<span class="ff3"> </span></div><div class="t m0 x4 h3 y1c ff1 fs1 fc0 sc1 ls0 ws0">这就是我于<span class="_ _9"> </span><span class="ff3 lsb">1972<span class="_ _3"> </span></span>年底涉足密码学领域时的情形,当时密码学的文献还不丰富,但却也</div><div class="t m0 x3 h3 y1d ff1 fs1 fc0 sc1 ls0 ws0">包括一些非常有价值的东西。<span class="ff3"> </span></div><div class="t m0 x4 h4 y1e ff1 fs1 fc0 sc1 ls0 ws0">密码学提出了一个一般的学科领域都难以遇到的难题:<span class="_ _f"></span>即它需要密码学和密码分析学紧</div><div class="t m0 x3 h4 y1f ff1 fs1 fc0 sc1 ls0 ws0">密结合互为促进。<span class="_ _8"></span>这是由于缺乏实际通信检验的实情所致。<span class="_ _8"></span>提出一个表面上看似不可破的系</div><div class="t m0 x3 h4 y20 ff1 fs1 fc0 sc1 ls0 ws0">统并不难。<span class="_ _1"></span>许多学究式的设计就非常复杂,<span class="_ _1"></span>以至于密码分析家不知从何入手,<span class="_ _1"></span>分析这些设计</div><div class="t m0 x3 h4 y21 ff1 fs1 fc0 sc1 ls0 ws0">中的漏洞远比原先设计它们更难。<span class="_ _8"></span>结果是,<span class="_ _8"></span>那些能强劲推动学术研究的竞争过程在密码学中</div><div class="t m0 x3 h3 y22 ff1 fs1 fc0 sc1 ls0 ws0">并没起多大作用。<span class="ff3"> </span></div><div class="t m0 x4 h3 y23 ff1 fs1 fc0 sc1 ls0 ws0">当<span class="_ _9"> </span><span class="ff3 ls18 ws6">Martin Hell<span class="_ _6"></span>man<span class="_"> </span></span>和我在<span class="_ _b"> </span><span class="ff3 lsb">1975<span class="_"> </span></span>年提出公开密钥密码学<span class="ff3 ls8">[496]</span>时<span class="_ _4"></span>,我们的一种间接贡献是</div><div class="t m0 x3 h4 y24 ff1 fs1 fc0 sc1 ls0 ws0">引入了一个看来不易解决的难题。<span class="_ _f"></span>现在一个有抱负的密码体制设计者能够提出被认为是很聪</div><div class="t m0 x3 h3 y25 ff1 fs1 fc0 sc1 ls0 ws0">明的一些东西<span class="ff3">——</span>这些东西比只是把有意义的正文变成无意义的乱语更有用。<span class="_ _f"></span>结果研究密码</div><div class="t m0 x3 h3 y26 ff1 fs1 fc0 sc1 ls0 ws0">学的人数、召开的会议、发表的论著和文章都惊人地增加了。<span class="ff3"> </span></div><div class="t m0 x6 h5 y27 ff3 fs3 fc0 sc1 ls19 ws0"> I</div></div><div class="pi" data-data='{"ctm":[1.611639,0.000000,0.000000,1.611639,0.000000,0.000000]}'></div></div>
</body>
</html>
<div id="pf2" class="pf w0 h0" data-page-no="2"><div class="pc pc2 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/6282d8d5ebb030486d80231f/bg2.jpg"><div class="t m0 x4 h3 y28 ff1 fs1 fc0 sc1 ls1a ws0">我在接受<span class="_ _10"> </span><span class="ff3 ls1b ws7">Donald E.Fink<span class="_"> </span></span>奖(该奖是奖给在<span class="_ _10"> </span><span class="ff3 ls1c">IEEE<span class="_ _10"> </span></span>杂志上发表过最好文章的人<span class="_ _6"></span>,我和</div><div class="t m0 x3 h3 y29 ff3 fs1 fc0 sc1 ls5 ws0">Hellman<span class="_ _d"> </span><span class="ff1 ls0">在<span class="_ _11"> </span></span><span class="ls4">1980<span class="_ _c"> </span><span class="ff1 ls0">年共同获得该奖)发表演讲时,告诉听众我在写作“保密性与鉴别”一文</span></span></div><div class="t m0 x3 h4 y2a ff1 fs1 fc0 sc1 ls0 ws0">时,有一种经历</div><div class="t m0 x7 h3 y2b ff4 fs2 fc0 sc1 ls0 ws0"><span class="ff1 fs1">我相信这种经历,即使在那些参加<span class="_ _b"> </span><span class="ff3 ls14">IEEE<span class="_"> </span></span>授奖会的著名学者们当中也是</span></div><div class="t m0 x3 h4 y2c ff1 fs1 fc0 sc1 ls0 ws0">罕见的:<span class="_ _1"></span>我写的那篇文章,<span class="_ _1"></span>并非我的研究结果而是我想要研究的课题,<span class="_ _1"></span>因为在我首次沉迷于</div><div class="t m0 x3 h4 y2d ff1 fs1 fc0 sc1 ls0 ws0">密码学的时候,<span class="_ _1"></span>这类文章根本就找不到。<span class="_ _1"></span>如果那时我可以走进斯坦福书店,<span class="_ _1"></span>挑选现代密码学</div><div class="t m0 x3 h3 y2e ff1 fs1 fc0 sc1 ls0 ws0">的书籍,我也许能在多年前就了解这个领域了。但是在<span class="_ _9"> </span><span class="ff3 lsb">1972<span class="_ _3"> </span></span>年秋季,我能找到的资料仅仅</div><div class="t m0 x3 h3 y2f ff1 fs1 fc0 sc1 ls0 ws0">是几篇经典论文和一些难理解的技术报告而已。<span class="ff3"> </span></div><div class="t m0 x4 h4 y30 ff1 fs1 fc0 sc1 ls0 ws0">当代的研究人员再也没有这样的问题了。<span class="_ _f"></span>现在的问题是要在大量的文章和书籍中选择从</div><div class="t m0 x3 h4 y31 ff1 fs1 fc0 sc1 ls0 ws0">何处入手。<span class="_ _8"></span>研究人员如此,<span class="_ _8"></span>那些仅仅想利用密码学的程序员和工程师又会怎样呢?这些人会</div><div class="t m0 x3 h4 y32 ff1 fs1 fc0 sc1 ls0 ws0">转向哪里呢?直到今天,<span class="_ _8"></span>在能够设计出通俗文章中所描述的那类密码实用程序之前,<span class="_ _8"></span>花费大</div><div class="t m0 x3 h3 y33 ff1 fs1 fc0 sc1 ls0 ws0">量时间去寻找,并研究那些文献仍是很有必要的。<span class="ff3"> </span></div><div class="t m0 x4 h3 y34 ff3 fs1 fc0 sc1 ls16 ws8">Bruce Schneier<span class="_ _d"> </span><span class="ff1 ls0 ws0">的《应用密码学》正好填补了这个空白的。</span><span class="ws0">Schneier<span class="_ _d"> </span><span class="ff1 ls0">从通<span class="_ _4"></span>信保密性的目</span></span></div><div class="t m0 x3 h3 y35 ff1 fs1 fc0 sc1 ls0 ws0">的和达到目的所用的基本程序实例入手,<span class="_ _f"></span>对<span class="_ _9"> </span><span class="ff3 ls4">20<span class="_"> </span></span>年来公开研究的全部成果作了全景式的概括。</div><div class="t m0 x3 h4 y36 ff1 fs1 fc0 sc1 ls0 ws0">书名开门见山:<span class="_ _8"></span>从首次叫某人进行保密会话的世俗目的,<span class="_ _8"></span>到数字货币和以密码方式进行保密</div><div class="t m0 x3 h3 y37 ff1 fs1 fc0 sc1 ls0 ws0">选举的可能性,到处你都可以发现应用密码学的用处。<span class="ff3"> </span></div><div class="t m0 x4 h3 y38 ff3 fs1 fc0 sc1 lsf ws0">Schneier<span class="_ _10"> </span><span class="ff1 ls0">不满足于这本书仅仅涉及真实世界(因为此书叙述了直至代码的全部过程)<span class="_ _2"></span>,</span></div><div class="t m0 x3 h4 y39 ff1 fs1 fc0 sc1 ls0 ws0">他还叙述了发展密码学和应用密码学的那些领域,<span class="_ _f"></span>讨论了从国际密码研究协会直到国家安全</div><div class="t m0 x3 h3 y3a ff1 fs1 fc0 sc1 ls0 ws0">局这样的一些机构。<span class="ff3"> </span></div><div class="t m0 x4 h3 y3b ff1 fs1 fc0 sc1 ls0 ws0">在<span class="_ _0"></span><span class="ff3 lsb">70<span class="_ _12"></span></span>年代后期和<span class="_ _0"></span><span class="ff3 lsb">80<span class="_ _12"></span></span>年代初,<span class="_ _e"></span>当公众在密码学方面的兴趣显示出来时,<span class="_ _e"></span>国家安全局<span class="_ _e"></span>(<span class="ff3 ls1d">NSA<span class="_ _6"></span></span>)</div><div class="t m0 x3 h3 y3c ff1 fs1 fc0 sc1 ls0 ws0">即美国官方密码机构曾多次试图平息它。第一次是一名长期在<span class="_ _9"> </span><span class="ff3 ls1d">NS<span class="_ _6"></span>A<span class="_"> </span></span>工作的雇员的一封信,</div><div class="t m0 x3 h4 y3d ff1 fs1 fc0 sc1 ls0 ws0">据说这封信是这个雇员自己写的,<span class="_ _1"></span>此雇员自认是如此,<span class="_ _1"></span>表面上看来亦是如此。<span class="_ _1"></span>这封信是发给</div><div class="t m0 x3 h3 y3e ff3 fs1 fc0 sc1 ls14 ws0">IEEE<span class="_ _10"> </span><span class="ff1 ls1a">的,它警告密码资料的出版<span class="_ _4"></span>违反了国际武器交易条例(<span class="ff3 ls1e">IT<span class="_ _5"></span>AR<span class="_ _6"></span><span class="ff1 ls0">)<span class="_ _e"></span><span class="ls1a">。然而这种观点并没有</span></span></span></span></div><div class="t m0 x3 h3 y3f ff1 fs1 fc0 sc1 ls0 ws0">被条例本身所支持,<span class="_ _13"></span>条例明显不包括已发表的资料。<span class="_ _13"></span>但这封信却为密码学的公开实践和<span class="_ _9"> </span><span class="ff3 lsb">1977</span></div><div class="t m0 x3 h3 y40 ff1 fs1 fc0 sc1 ls0 ws0">年的信息论专题研讨会做了许多意想不到的宣传。<span class="ff3"> </span></div><div class="t m0 x4 h3 y41 ff1 fs1 fc0 sc1 ls0 ws0">一个更为严重的事态发生在<span class="_ _9"> </span><span class="ff3 ls4">1980<span class="_"> </span></span><span class="ls1f">年,<span class="_ _8"></span>当<span class="_ _6"></span>时<span class="_ _b"> </span><span class="ff3 ls20">NSA<span class="_"> </span></span><span class="ls0">发现,<span class="_ _8"></span>美国教育委员会在出版物审查方</span></span></div><div class="t m0 x3 h3 y42 ff1 fs1 fc0 sc1 ls0 ws0">面说服国会对密码学领域的出版物进行合法地控制,结果与<span class="_ _9"> </span><span class="ff3 ls1d">NS<span class="_ _6"></span>A<span class="_"> </span></span>的愿望大相经庭,形成了</div><div class="t m0 x3 h4 y43 ff1 fs1 fc0 sc1 ls0 ws0">密码学论文自愿送审的程序;<span class="_ _f"></span>要求研究人员在论文发表之前需就发表出去是否有害国家利益</div><div class="t m0 x3 h3 y44 ff1 fs1 fc0 sc1 ls0 ws0">征询<span class="_ _9"> </span><span class="ff3 ls20">NSA<span class="_"> </span></span>的意见。<span class="ff3"> </span></div><div class="t m0 x4 h3 y45 ff1 fs1 fc0 sc1 ls0 ws0">随着<span class="_ _9"> </span><span class="ff3 ls4">80<span class="_"> </span></span>年代的到来,<span class="ff3 ls1d">NSA<span class="_"> </span></span>将重点更多的集中在实际应用上,而不是密码学的研究中。</div><div class="t m0 x3 h3 y46 ff1 fs1 fc0 sc1 ls0 ws0">现有的法律授权<span class="_ _9"> </span><span class="ff3 ls1d">NS<span class="_ _6"></span>A<span class="_"> </span></span>通过国务院控制密码设备的出口。随着商务活动的日益国际化和世界</div><div class="t m0 x3 h4 y47 ff1 fs1 fc0 sc1 ls0 ws0">市场上美国份额的减退,<span class="_ _8"></span>国内外市场上需要单一产品的压力增加了。<span class="_ _8"></span>这种单一产品受到出口</div><div class="t m0 x3 h3 y48 ff1 fs1 fc0 sc1 ls0 ws0">控制,于是<span class="ff3 ls20 ws9"> NSA<span class="_ _9"> </span></span>不仅对出口什么,而且也对在美国出售什么都施加了相当大的影响。<span class="ff3"> </span></div><div class="t m0 x4 h4 y49 ff1 fs1 fc0 sc1 ls0 ws0">密码学的公开使用面临一种新的挑战,<span class="_ _f"></span>政府建议在可防止涂改的芯片上用一种秘密算法</div><div class="t m0 x3 h3 y4a ff1 fs1 fc0 sc1 ls1a ws0">代替广为人知且随处可得的数据加密标准(<span class="ff3 ls21">DES</span><span class="ls0">)<span class="_ _e"></span><span class="ls1a">,这些芯片将含有政府监控所需的编纂机</span></span></div><div class="t m0 x3 h4 y4b ff1 fs1 fc0 sc1 ls0 ws0">制。<span class="_ _5"></span>这种<span class="_ _1"></span>“密<span class="_ _6"></span>钥托管”<span class="_ _1"></span>计划的弊病是它潜在地损害了个人隐私权,<span class="_ _5"></span>并且以前的软件加密不得</div><div class="t m0 x3 h4 y4c ff1 fs1 fc0 sc1 ls0 ws0">不以高价增用硬件来实现,<span class="_ _1"></span>迄今,<span class="_ _1"></span>密钥托管产品正值熊市,<span class="_ _1"></span>但这种方案却已经引起了广泛的</div><div class="t m0 x3 h4 y4d ff1 fs1 fc0 sc1 ls0 ws0">批评,<span class="_ _1"></span>特别是那些独立的密码学家怨声载道。<span class="_ _1"></span>然而,<span class="_ _1"></span>人们看到的更多是编程技术的未来而不</div><div class="t m0 x3 h3 y4e ff1 fs1 fc0 sc1 ls0 ws0">是政治,并且还加倍地努力向世界提供更强的密码,这种密码能够实现对公众的监视。<span class="ff3"> </span></div><div class="t m0 x4 h3 y4f ff1 fs1 fc0 sc1 ls0 ws0">从出口控制法律涉及第一修正案的意见来看,<span class="_ _7"></span><span class="ff3 ls4 wsa"> 19<span class="_ _6"></span>80<span class="_ _b"> </span><span class="ff1 ls0 ws0">年发生了大倒退,<span class="_ _8"></span>当时<span class="_ _8"></span>“联邦注册”</span></span></div><div class="t m0 x3 h3 y50 ff1 fs1 fc0 sc1 ls0 ws0">公布了对<span class="_ _14"> </span><span class="ff3 ls1e">IT<span class="_ _15"></span>AR<span class="_ _14"> </span><span class="ff1 ls0">的修正,其中提到:<span class="_ _e"></span>“</span></span></div><div class="t m0 x8 h4 y51 ff1 fs2 fc0 sc1 ls0 ws0">……<span class="fs1">增加的条款清楚地说明,技术数据出口的规定并</span></div><div class="t m0 x3 h4 y52 ff1 fs1 fc0 sc1 ls0 ws0">不干预第一修正案中个人的权利”<span class="_ _e"></span>,<span class="_ _f"></span>但事实上第一修正案和出口控制法的紧张关系还未消除,</div><div class="t m0 x6 h5 y27 ff3 fs3 fc0 sc1 ls22 wsb"> II</div></div><div class="pi" data-data='{"ctm":[1.611639,0.000000,0.000000,1.611639,0.000000,0.000000]}'></div></div>
<div id="pf3" class="pf w0 h0" data-page-no="3"><div class="pc pc3 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/6282d8d5ebb030486d80231f/bg3.jpg"><div class="t m0 x3 h3 y28 ff1 fs1 fc0 sc1 ls23 ws0">最近由<span class="_ _10"> </span><span class="ff3 ls11">RSA<span class="_ _10"> </span></span>数据安全公司召开的一次会议清楚地表明了这一点,从出口控制办公室来的</div><div class="t m0 x3 h3 y29 ff3 fs1 fc0 sc1 ls20 ws0">NSA<span class="_"> </span><span class="ff1 ls0">的代表表达了意见:<span class="_ _15"></span>发表密码程序的人从法律上说是处在<span class="_ _4"></span>“灰色领域”<span class="_ _e"></span>。<span class="_ _15"></span>如果真是这样</span></div><div class="t m0 x3 h4 y2a ff1 fs1 fc0 sc1 ls0 ws0">的话,<span class="_ _5"></span>本书第一版业已曝光,<span class="_ _5"></span>内容也处在<span class="_ _15"></span>“灰色领域”<span class="_ _5"></span>中了。<span class="_ _15"></span>本书自身的出口申请已经得到</div><div class="t m0 x3 h4 y53 ff1 fs1 fc0 sc1 ls0 ws0">军需品控制委员会当局在出版物条款下的认可,<span class="_ _8"></span>但是,<span class="_ _8"></span>装在磁盘上的程序的出口申请却遭到</div><div class="t m0 x3 h3 y54 ff1 fs1 fc0 sc1 ls0 ws0">拒绝。<span class="ff3"> </span></div><div class="t m0 x4 h3 y55 ff3 fs1 fc0 sc1 ls20 ws0">NSA<span class="_ _10"> </span><span class="ff1 ls0">的策略从试图控制密码研究到紧紧抓住密码产品的开<span class="_ _6"></span>发和应用的改变,可能是由</span></div><div class="t m0 x3 h4 y56 ff1 fs1 fc0 sc1 ls23 ws0">于认识到即便世界上所有最好<span class="_ _4"></span>的密码学论文都不能保护哪怕是一比特的信息<span class="_ _4"></span>。如果置之高</div><div class="t m0 x3 h4 y57 ff1 fs1 fc0 sc1 ls0 ws0">阁,<span class="_ _1"></span>本书也许不比以前的书和文章更好,<span class="_ _1"></span>但若置于程序员编写密码的工作站旁时,<span class="_ _1"></span>这本书无</div><div class="t m0 x3 h3 y58 ff1 fs1 fc0 sc1 ls0 ws0">疑是最好的。<span class="ff3"> </span></div><div class="t m0 x4 h3 y59 ff3 fs1 fc0 sc1 ls0 ws0"> </div><div class="t m0 x9 h3 y5a ff3 fs1 fc0 sc1 ls5 ws0">Whitfield Diffie<span class="_ _b"> </span><span class="ff1 ls0">于<span class="ff3"> </span></span></div><div class="t m0 xa h3 y5b ff1 fs1 fc0 sc1 ls0 ws0">加州<span class="ff3 ls24 wsc"> Mountain <span class="_ _a"></span>V<span class="_ _4"></span>iew </span></div><div class="t m0 x6 h5 y27 ff3 fs3 fc0 sc1 ls22 wsd"> III</div></div><div class="pi" data-data='{"ctm":[1.611639,0.000000,0.000000,1.611639,0.000000,0.000000]}'></div></div>
<div id="pf4" class="pf w0 h0" data-page-no="4"><div class="pc pc4 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/6282d8d5ebb030486d80231f/bg4.jpg"><div class="t m0 xb h2 y1 ff1 fs0 fc0 sc0 ls0 ws0">前<span class="ff2 sc1 ls25"> </span>言<span class="ff2 sc1"> </span></div><div class="t m0 x4 h3 y5c ff3 fs1 fc0 sc1 ls0 ws0"> </div><div class="t m0 x4 h4 y5d ff1 fs1 fc0 sc1 ls0 ws0">世界上有两种密码:<span class="_ _8"></span>一种是防止你的小妹妹看你的文件;<span class="_ _8"></span>另一种是防止当局者阅读你的</div><div class="t m0 x3 h3 y5e ff1 fs1 fc0 sc1 ls0 ws0">文件资料。这本书写的是后一种情况。<span class="ff3"> </span></div><div class="t m0 x4 h4 y5f ff1 fs1 fc0 sc1 ls0 ws0">如果把一封信锁在保险柜中,<span class="_ _2"></span>把保险柜藏在纽约的某个地方…,<span class="_ _2"></span>然后告诉你去看这封信。</div><div class="t m0 x3 h4 y60 ff1 fs1 fc0 sc1 ls0 ws0">这并不是安全,<span class="_ _5"></span>而是隐藏。<span class="_ _1"></span>相反,<span class="_ _5"></span>如果把一封信锁在保险柜中,<span class="_ _5"></span>然后把保险柜及其设计规范</div><div class="t m0 x3 h4 y61 ff1 fs1 fc0 sc1 ls0 ws0">和许多同样的保险柜给你,<span class="_ _8"></span>以便你和世界上最好的开保险柜的专家能够研究锁的装置。<span class="_ _8"></span>而你</div><div class="t m0 x3 h3 y62 ff1 fs1 fc0 sc1 ls0 ws0">还是无法打开保险柜去读这封信,这样才是安全的。<span class="ff3"> </span></div><div class="t m0 x4 h4 y63 ff1 fs1 fc0 sc1 ls0 ws0">许多年来,<span class="_ _5"></span>这种密码学是军队独家专有的领域。<span class="_ _1"></span>美国国家安全局以及前苏联、<span class="_ _5"></span>英国、<span class="_ _5"></span>法</div><div class="t m0 x3 h4 y64 ff1 fs1 fc0 sc1 ls0 ws0">国、<span class="_ _8"></span>以色列及其它国家的安全机构已将大量的财力投入到加密自己的通信,<span class="_ _8"></span>同时又千方百计</div><div class="t m0 x3 h4 y65 ff1 fs1 fc0 sc1 ls0 ws0">地去破译别人的通信的残酷游戏之中,<span class="_ _8"></span>面对这些政府,<span class="_ _8"></span>个人既无专门知识又无足够财力保护</div><div class="t m0 x3 h3 y66 ff1 fs1 fc0 sc1 ls0 ws0">自己的秘密。<span class="ff3"> </span></div><div class="t m0 x4 h3 y67 ff1 fs1 fc0 sc1 ls0 ws0">在过去<span class="_ _9"> </span><span class="ff3 lsb">20<span class="_ _3"> </span></span>年里,公开的密码学研究爆炸性地增长。从二次世界大战以来,当普通公民</div><div class="t m0 x3 h4 y68 ff1 fs1 fc0 sc1 ls0 ws0">还在长期使用经典密码时,<span class="_ _1"></span>计算机密码学成为世界军事的独占领域。<span class="_ _1"></span>今天,<span class="_ _1"></span>最新的计算机密</div><div class="t m0 x3 h4 y69 ff1 fs1 fc0 sc1 ls0 ws0">码学已应用到军事当局的高墙之外,<span class="_ _f"></span>现在非专业人员都可以利用密码技术去阻止最强大的敌</div><div class="t m0 x3 h3 y6a ff1 fs1 fc0 sc1 ls0 ws0">人,包括军方的安全机构。<span class="ff3"> </span></div><div class="t m0 x4 h4 y6b ff1 fs1 fc0 sc1 ls0 ws0">平头百姓真的需要这种保密性吗?是的,<span class="_ _8"></span>他们可能正策划一次政治运动,<span class="_ _8"></span>讨论税收或正</div><div class="t m0 x3 h4 y6c ff1 fs1 fc0 sc1 ls0 ws0">干一件非法的事情;<span class="_ _1"></span>他们也可能正设计一件新产品,<span class="_ _1"></span>讨论一种市场策略,<span class="_ _1"></span>或计划接管竞争对</div><div class="t m0 x3 h4 y6d ff1 fs1 fc0 sc1 ls0 ws0">手的生意,<span class="_ _1"></span>或者,<span class="_ _1"></span>他们可能生活在一个不尊重个人隐私权的国家,<span class="_ _1"></span>也可能做一些他们自己认</div><div class="t m0 x3 h4 y6e ff1 fs1 fc0 sc1 ls0 ws0">为并非违法实际却是非法的事情。不管理由是什么,他的数据和通信都是私人的、秘密的,</div><div class="t m0 x3 h3 y6f ff1 fs1 fc0 sc1 ls0 ws0">与他人无关。<span class="ff3"> </span></div><div class="t m0 x4 h3 y70 ff1 fs1 fc0 sc1 ls0 ws0">这本书正好在混乱的年代发表。<span class="_ _16"></span><span class="ff3 ls4">1994<span class="_"> </span><span class="ff1 ls0">年,<span class="_ _16"></span>克林顿当局核准了托管加密标准<span class="_ _16"></span>(包括<span class="_ _9"> </span><span class="ff3 ls26">Clipper</span></span></span></div><div class="t m0 x3 h3 y71 ff1 fs1 fc0 sc1 ls0 ws0">芯片和<span class="_ _3"> </span><span class="ff3 ls26">Fortezza<span class="_ _d"> </span></span>卡)<span class="_ _e"></span>,并将数字电话法案签署成为法律。这两个行政令企图确保政府实施电</div><div class="t m0 x3 h3 y72 ff1 fs1 fc0 sc1 ls0 ws0">子监控的能力。<span class="ff3"> </span></div><div class="t m0 x4 h3 y73 ff1 fs1 fc0 sc1 ls0 ws0">一些危险的<span class="_ _9"> </span><span class="ff3 ls27">Orwellian<span class="_ _3"> </span></span>假设在作祟:即政府有权侦听私人通信,个人对政府保守秘密是</div><div class="t m0 x3 h4 y74 ff1 fs1 fc0 sc1 ls0 ws0">错误的,<span class="_ _5"></span>如果可能,<span class="_ _1"></span>法律总有能力强制实施法院授权的监控,<span class="_ _5"></span>但是,<span class="_ _5"></span>这是公民第一次被强迫</div><div class="t m0 x3 h4 y75 ff1 fs1 fc0 sc1 ls0 ws0">采取积极措施,<span class="_ _8"></span>以使他们自己能被监控。<span class="_ _8"></span>这两个行政令并不是政府在某个模糊范围内的简单</div><div class="t m0 x3 h3 y76 ff1 fs1 fc0 sc1 ls0 ws0">倡议,而是一种先发制人的单方面尝试,旨在侵占以前属于人民的权力。<span class="ff3"> </span></div><div class="t m0 x4 h3 y77 ff3 fs1 fc0 sc1 ls28 ws0">Clipper<span class="_ _10"> </span><span class="ff1 ls0">和数字电话不保护隐私,它强迫个人无条件地相信政府将尊重他们的隐私。<span class="_ _6"></span>非</span></div><div class="t m0 x3 h3 y78 ff1 fs1 fc0 sc1 ls0 ws0">法窃听小马丁·路德·金电话的执法机构,同样也能容易地窃听用<span class="_ _9"> </span><span class="ff3 ls29">Clipper<span class="_ _3"> </span></span>保护的电话。最</div><div class="t m0 x3 h4 y79 ff1 fs1 fc0 sc1 ls0 ws0">近,<span class="_ _8"></span>地方警察机关在好些管区内都有因非法窃听而被控有罪或被提出民事诉讼的,<span class="_ _8"></span>这些地方</div><div class="t m0 x3 h4 y7a ff1 fs1 fc0 sc1 ls0 ws0">包括马里兰、<span class="_ _5"></span>康涅狄格、<span class="_ _15"></span>佛蒙特、<span class="_ _5"></span>佐治亚、<span class="_ _5"></span>密苏里和内华达。<span class="_ _15"></span>为了随时方便警察局的工作而</div><div class="t m0 x3 h3 y7b ff1 fs1 fc0 sc1 ls0 ws0">配置这种技术是很糟糕的想法。<span class="ff3"> </span></div><div class="t m0 x4 h4 y7c ff1 fs1 fc0 sc1 ls0 ws0">这儿给我们的教训是采用法律手段并不能充分保护我们自己,<span class="_ _f"></span>我们需要用数学来保护自</div><div class="t m0 x3 h3 y7d ff1 fs1 fc0 sc1 ls0 ws0">己。加密太重要了,不能让给政府独享。<span class="ff3"> </span></div><div class="t m0 x3 h3 y7e ff3 fs1 fc0 sc1 ls0 ws0"> <span class="_ _17"> </span><span class="ff1">本书为你提供了一些可用来保护自己隐私的工具。<span class="_ _7"></span>提供密码产品可能宣布为非法,<span class="_ _8"></span>但提</span></div><div class="t m0 x3 h3 y7f ff1 fs1 fc0 sc1 ls0 ws0">供有关的信息绝不会犯法。<span class="ff3"> </span></div><div class="t m0 x6 h5 y27 ff3 fs3 fc0 sc1 ls22 wse"> IV</div></div><div class="pi" data-data='{"ctm":[1.611639,0.000000,0.000000,1.611639,0.000000,0.000000]}'></div></div>
<div id="pf5" class="pf w0 h0" data-page-no="5"><div class="pc pc5 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/6282d8d5ebb030486d80231f/bg5.jpg"><div class="t m0 x3 h6 y80 ff1 fs1 fc0 sc0 ls1a ws0">怎样读这本书?<span class="ff2 sc1 ls0"> </span></div><div class="t m0 x4 h4 y81 ff1 fs1 fc0 sc1 ls0 ws0">我写<span class="_ _1"></span>《应用密码学》<span class="_ _1"></span>一书是为了在真实介绍密码学的同时给出全面的参考文献。<span class="_ _1"></span>我尽量</div><div class="t m0 x3 h4 y82 ff1 fs1 fc0 sc1 ls0 ws0">在不损失正确性的情况下保持文本的可读性。<span class="_ _8"></span>这本书不想成为一本数学书。<span class="_ _8"></span>虽然我无意给出</div><div class="t m0 x3 h4 y83 ff1 fs1 fc0 sc1 ls0 ws0">任何错误信息,<span class="_ _1"></span>但匆忙中理论难免有失严谨。<span class="_ _1"></span>对形式方法感兴趣的人,<span class="_ _1"></span>可以参考大量的学术</div><div class="t m0 x3 h3 y84 ff1 fs1 fc0 sc1 ls0 ws0">文献。<span class="ff3"> </span></div><div class="t m0 x4 h3 y85 ff1 fs1 fc0 sc1 ls0 ws0">第一章介绍了密码学,定义了许多术语,简要讨论了计算机出现前密码学的情况。<span class="ff3"> </span></div><div class="t m0 x4 h3 y86 ff1 fs1 fc0 sc1 ls0 ws0">第一篇(第二<span class="ff3">~</span>六章)描述密码学的各种协议:人们能用密码学做什么。协议范围从简</div><div class="t m0 x3 h4 y87 ff1 fs1 fc0 sc1 ls0 ws0">单<span class="_ _5"></span>(一人向另一人发送加密消息)<span class="_ _5"></span>到复杂<span class="_ _15"></span>(在电话上抛掷硬币)<span class="_ _5"></span>再到深奥的<span class="_ _15"></span>(秘密的和匿名</div><div class="t m0 x3 h4 y88 ff1 fs1 fc0 sc1 ls0 ws0">的数字货币交易)<span class="_ _e"></span>。这些协议中有些<span class="_ _6"></span>一目了然,有些却十分奇异。密码术能够解决大多数人</div><div class="t m0 x3 h3 y89 ff1 fs1 fc0 sc1 ls0 ws0">绝没有认识到的许多问题。<span class="ff3"> </span></div><div class="t m0 x4 h3 y8a ff1 fs1 fc0 sc1 ls0 ws0">第二篇(第<span class="_ _9"> </span><span class="ff3 ls2a">7~10<span class="_"> </span></span>章)讨论密码技术。对密码学的大多数基本应用来说,这一部分的四</div><div class="t m0 x3 h4 y8b ff1 fs1 fc0 sc1 ls0 ws0">章都是很重要的。<span class="_ _7"></span>第七章和第八章讨论密钥:<span class="_ _8"></span>密钥应选多长才能保密,<span class="_ _8"></span>怎样产生、<span class="_ _7"></span>存储密钥,</div><div class="t m0 x3 h4 y8c ff1 fs1 fc0 sc1 ls0 ws0">怎样处理密钥等等。密钥管理是密码学最困难的一部分,经常是保密系统的一个致命弱点;</div><div class="t m0 x3 h4 y8d ff1 fs1 fc0 sc1 ls0 ws0">第九章讨论了使用密码算法的不同方法;<span class="_ _1"></span>第十章给出了与算法有关的细节:<span class="_ _1"></span>怎样选择、<span class="_ _1"></span>实现</div><div class="t m0 x3 h3 y8e ff1 fs1 fc0 sc1 ls0 ws0">和使用算法。<span class="ff3"> </span></div><div class="t m0 x4 h3 y8f ff1 fs1 fc0 sc1 ls0 ws0">第三篇<span class="_ _5"></span>(第<span class="_ _b"> </span><span class="ff3 ls2a">9~23<span class="_"> </span></span>章)<span class="_ _5"></span>列出了多个算法。<span class="_ _5"></span>第<span class="_ _b"> </span><span class="ff3 ls2b">11<span class="_ _d"> </span></span>章提<span class="_ _4"></span>供了数学背景,<span class="_ _5"></span>如果你对公开密钥算</div><div class="t m0 x3 h3 y90 ff1 fs1 fc0 sc1 ls0 ws0">法感兴趣,这一章是需要了解的。<span class="_ _4"></span>如果你只想实现<span class="_ _9"> </span><span class="ff3 ls15">DES</span>(或类似的东西)<span class="_ _e"></span>,<span class="_ _4"></span>你可以跳过这一</div><div class="t m0 x3 h3 y91 ff1 fs1 fc0 sc1 ls0 ws0">章;<span class="_ _15"></span>第<span class="_ _9"> </span><span class="ff3 lsb">12<span class="_"> </span></span><span class="ls1f">章讨论<span class="_ _9"> </span><span class="ff3 ls15">DES</span></span>:<span class="_ _4"></span><span class="ff3 ls2c">DES<span class="_"> </span><span class="ff1 ls0">算法、<span class="_ _15"></span>它的历史、<span class="_ _15"></span>它的安全性和它的一些变形;<span class="_ _15"></span>第<span class="_ _9"> </span><span class="ff3 lsb">13</span>、<span class="_ _15"></span><span class="ff3 ls4">14<span class="_ _6"></span><span class="ff1 ls0">、<span class="_ _5"></span><span class="ff3 lsb">15</span></span></span></span></span></div><div class="t m0 x3 h3 y92 ff1 fs1 fc0 sc1 ls0 ws0">章讨论其它的分组算法。<span class="_ _15"></span>如果你需要比<span class="_ _9"> </span><span class="ff3 ls15">DES<span class="_"> </span></span>更保密的算法,<span class="_ _4"></span>请阅读<span class="_ _9"> </span><span class="ff3 lsa">IDEA<span class="_"> </span></span>和三重<span class="_ _9"> </span><span class="ff3 ls15">DES<span class="_"> </span></span>算法</div><div class="t m0 x3 h3 y93 ff1 fs1 fc0 sc1 ls0 ws0">这节。<span class="_ _5"></span>如果你想阅读一系列比<span class="_ _9"> </span><span class="ff3 ls15">DES<span class="_"> </span></span>算法更安全的算法,<span class="_ _15"></span>就请读完整章;<span class="_ _15"></span>第<span class="_ _9"> </span><span class="ff3 lsb">16</span>、<span class="_ _5"></span><span class="ff3 ls4">17<span class="_"> </span><span class="ff1 ls0">章讨论序</span></span></div><div class="t m0 x3 h3 y94 ff1 fs1 fc0 sc1 ls0 ws0">列密码算法;<span class="_ _15"></span>第<span class="_ _9"> </span><span class="ff3 ls4">18<span class="_"> </span></span>章集中讨论单向<span class="_ _9"> </span><span class="ff3 ls2d">hash<span class="_"> </span></span>函数;<span class="_ _15"></span>虽然讨论了好些单向<span class="_ _9"> </span><span class="ff3 ls24">hash<span class="_"> </span></span>函数,<span class="_ _5"></span>但<span class="_ _9"> </span><span class="ff3 ls14">MD5<span class="_ _3"> </span></span>和</div><div class="t m0 x3 h3 y95 ff3 fs1 fc0 sc1 ls20 ws0">SHA<span class="_"> </span><span class="ff1 ls0">是最通用的;<span class="_ _5"></span>第<span class="_ _9"> </span><span class="ff3 ls4">19<span class="_"> </span></span>章讨论公开密钥加密算法。<span class="_ _5"></span>第<span class="_ _9"> </span><span class="ff3 ls4">20<span class="_ _3"> </span></span>章讨论了公开密钥数字签名算法;</span></div><div class="t m0 x3 h3 y96 ff1 fs1 fc0 sc1 ls0 ws0">第<span class="_ _9"> </span><span class="ff3 ls4">21<span class="_"> </span></span>章讨论了公开密钥鉴别算法;<span class="_ _8"></span>第<span class="_ _9"> </span><span class="ff3 ls4">22<span class="_"> </span></span>章讨论了公开密钥密钥交换算法。<span class="_ _8"></span>几种重要的公开</div><div class="t m0 x3 h3 y97 ff1 fs1 fc0 sc1 ls0 ws0">密钥算法分别是<span class="_ _d"> </span><span class="ff3 ls11">RSA</span>、<span class="ff3 ls20">DSA</span>、<span class="ff3 ls2e">Fiat-Sham<span class="_ _4"></span>i<span class="_ _6"></span>r<span class="_ _3"> </span><span class="ff1 ls0">和<span class="_ _d"> </span></span><span class="ls5">Diffie-hellm<span class="_ _4"></span>an<span class="_ _d"> </span><span class="ff1 ls0">算法;第<span class="_ _d"> </span></span><span class="ls4">23<span class="_ _d"> </span><span class="ff1 ls0">章<span class="_ _4"></span>有更深奥的公开</span></span></span></span></div><div class="t m0 x3 h3 y98 ff1 fs1 fc0 sc1 ls0 ws0">密钥算法和协议。这一章的数学知识是非常复杂的,请系好你的安全带。<span class="ff3"> </span></div><div class="t m0 x4 h3 y99 ff1 fs1 fc0 sc1 ls0 ws0">第四篇(第<span class="_ _9"> </span><span class="ff3 ls2f">24~25<span class="_"> </span></span>章)转向密码学的真实世界。第<span class="_ _b"> </span><span class="ff3 lsb">24<span class="_"> </span></span>章讨论这些算法和协议的一些实</div><div class="t m0 x3 h3 y9a ff1 fs1 fc0 sc1 ls0 ws0">际实现;第<span class="_ _9"> </span><span class="ff3 lsb">25<span class="_"> </span></span>章接触到围绕密码学的一些政治问题,这些章节并不全面。<span class="ff3"> </span></div><div class="t m0 x4 h3 y9b ff1 fs1 fc0 sc1 ls0 ws0">此外,书中还包括在第三篇中讨论的<span class="_ _9"> </span><span class="ff3 lsb">10<span class="_ _3"> </span></span>个算法的源代码清单,由于篇幅的限制,我不</div><div class="t m0 x3 h4 y9c ff1 fs1 fc0 sc1 ls0 ws0">可能涉及所有的源代码,<span class="_ _5"></span>况且,<span class="_ _1"></span>密码<span class="_ _6"></span>的源代码不能出口<span class="_ _1"></span>(非常奇怪的是,<span class="_ _5"></span>国务院允许本书的</div><div class="t m0 x3 h4 y9d ff1 fs1 fc0 sc1 ls0 ws0">第一版和源代码出口,但不允许含有同样源代码的计算机<span class="_ _6"></span>磁盘的出口)<span class="_ _e"></span>。配套的源代码盘包</div><div class="t m0 x3 h4 y9e ff1 fs1 fc0 sc1 ls0 ws0">括的源代码比本书中列出的要多得多;<span class="_ _8"></span>这也许是除军事机构以外的最大的密码源代码集。<span class="_ _8"></span>我</div><div class="t m0 x3 h4 y9f ff1 fs1 fc0 sc1 ls0 ws0">只能发送源代码盘给住在美国和加拿大的美国和加拿大公民,<span class="_ _f"></span>但我希望有一天这种情况会改</div><div class="t m0 x3 h4 ya0 ff1 fs1 fc0 sc1 ls0 ws0">变。<span class="_ _1"></span>如果你对这本书的实现或密码算法均感兴趣的话,<span class="_ _1"></span>设法得到这个磁盘。<span class="_ _1"></span>详细情况请看本</div><div class="t m0 x3 h3 ya1 ff1 fs1 fc0 sc1 ls0 ws0">书的最后一页。<span class="ff3"> </span></div><div class="t m0 x4 h4 ya2 ff1 fs1 fc0 sc1 ls0 ws0">对这本书的一种批评,<span class="_ _1"></span>是它的广博性代替了可读性。<span class="_ _1"></span>这是对的,<span class="_ _1"></span>但我想给可能是偶然在</div><div class="t m0 x3 h4 ya3 ff1 fs1 fc0 sc1 ls0 ws0">学术文献或产品中需要一个算法的人提供一个参考。<span class="_ _8"></span>对于那些对教材更感兴趣的人,<span class="_ _8"></span>我只能</div><div class="t m0 x3 h4 ya4 ff1 fs1 fc0 sc1 ls0 ws0">抱歉。<span class="_ _5"></span>密码学领域正日趋热门,<span class="_ _1"></span>这是第一次把这么多资料收集在一本书中。<span class="_ _5"></span>即使这样,<span class="_ _5"></span>还是</div><div class="t m0 x3 h4 ya5 ff1 fs1 fc0 sc1 ls0 ws0">有许多东西限于篇幅舍弃了,<span class="_ _8"></span>我尽量保留了那些我认为是重要的、<span class="_ _8"></span>有实用价值的或者是有趣</div><div class="t m0 x6 h5 y27 ff3 fs3 fc0 sc1 ls30 ws0"> V</div></div><div class="pi" data-data='{"ctm":[1.611639,0.000000,0.000000,1.611639,0.000000,0.000000]}'></div></div>