, , ,

<<


 >>  ()
Pages:     | 1 | 2 ||

...

-- [ 3 ] --

. , , SIEBEL Brute, Dictionary attack , Rainbow attack .

, ( SIEBEL Unix SIEBEL HMAC), , , . , , . , 2 2,5 . , (, ). ( , ) SIEBEL Base64, 2 SIEBEL (35,4% 75% ). 1,5 .

, , . , , ( , . .), .

AES Round 1 Information. // http://csrc.nist.gov January 26, 2001.

1.

2. Anderson R., Biham E. Two Practical and Provably Secure Block Ciphers: BEAR and LION. //http://citeseer.ist.psu.edu 1995.

3. Anderson R., Biham E., Knudsen L. Serpent: A Proposal for the Advanced Encryption Standard. // http://csrc.nist.gov.

4. Announcing Request for Candidate Algorithm Nominations for the Advanced Encryption Standard (AES). // http://csrc.nist.gov Department of Commerce National Institute of Standards and Technology Federal Register: September 12, 1997.

5. Biham E., Dunkelman O., Keller N. Differential-Linear Cryptanalysis of Serpent.

//http://citeseer.ist.psu.edu Technion, Haifa, Israel.

Burwick C., Coppersmith D., DAvignon E., Gennaro R., Halevi S., Jutla C., Matyas 6.

S.M.Jr., OConnor L., Peyravian M., Safford D., Zunic N. MARS a candidate cipher for AES.

//http://www.ibm.com IBM Corporation Revised, September, 22 1999.

7. Courtois N., Castagnos G., Goubin L. What do DES S-boxes Say to Each Other?

//http://eprint.iacr.org Axalto Cryptographic Research & Advanced Security, Cedex, France.

8. Daemen J., Knudsen L., Rijmen V. The Block Cipher Square.

//http://www.esat.kuleuven.ac.be.

FIPS 46-3. Data Encryption Standard (DES). // http://csrc.nist.gov Reaffirmed 9.

October 25.

FIPS 81. DES Modes of Operation. // http://csrc.nist.gov 1980 December 2.

10.

11. Kocher P.C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. // http://citeseer.ist.psu.edu Cryptography Research, Inc., San Francisco, USA.

12. Nechvatal J., Barker E., Bassham L., Burr W., Dworkin M., Foti J., Roback E. Report on the Development of the Advanced Encryption Standard (AES). // http://csrc.nist.gov National Institute of Standards and Technology.

13. Nechvatal J., Barker E., Dodson D., Dworkin M., Foti J., Roback E. Status report on the first round of the development of the advanced encryption standard. // http://csrc.nist.gov National Institute of Standards and Technology.

14. Rivest R.L., Robshaw M.J.B., Sidney R., Lin Y.L. The RC6 Block Cipher.

//http://www.rsasecurity.com Version 1.1 August 20, 1998.

15. Schneier B. Description of a new variable-length key 64-bit block cipher (blowfish).

//http://www.schneier.com.

16. Schneier B., Kelsey J., Whiting D., Wagner D., Hall C., Ferguson N. Twofish: A 128-bit Block Cipher. // http://www.schneier.com 15 June 1998.

17. What are RC5 and RC6? // http://www.rsasecurity.com.

. DES . // Connect! . 18.

2006 3-6.

. , 2. // BYTE/. 19.

2006 5 . 74-79.

.., .. : 20.

. . .. . .: , 2005 176 .

.., .. 21.

. .: , 2002 656 .

. . , , 22.

. . .: .: , 2002 816 .

.., . .: . 23.

- , 2003. 280 .

. .. . .: . 24.

- , 2003. 250 .

http://www.habrahabr.ru/hub/infosecurity/2346325.php.

25.

http://www.securitylab.ru/news/405505.php.

26.

., . Perl, PHP, Apache MySQL 27.

Web-. .: , 2002. 300 .

.., .., .. 28.

050719 :

, - 2008. 19 .

.., .. ( 29.

050719 , 050704 ) : , 2008. 10 .

.. . 30.

.: , 1986. 150 .

.. , .. , .. , .. . .

31.

( - ). : , 2004 44 .

.., .. , .. . 32.

: .: , 2000. 288 .

.. Web-: PHP JavaScript. 2- . . BHV 33.

, 2008. 280 .

.. PHP, MySQL Dreamweaver. Web- 34.

. BHV-, 2007. 360 .

30494-96 . 35.

. 15 .

2.04-05-2002. . 36.

. -.: , 2002. 100 .



Pages:     | 1 | 2 ||
 
 >>  ()





 
<<     |    
2013 www.libed.ru - -

, .
, , , , 1-2 .