Читать книгу Information Security - Mark Stamp - Страница 47
Notes
Оглавление1 1 This is the only black box you'll find in this book!
2 2 Public key crypto is also known as asymmetric crypto, in reference to the fact that the encryption and decryption keys are different—in contrast to symmetric key crypto.
3 3 Historians generally agree that the Caesar's cipher was named after the Roman dictator, not the salad.
4 4 In 1998 the Electronic Frontier Foundation (EFF) built a special‐purpose key cracking machine for attacking the Data Encryption Standard (DES). This machine, which cost $220,000, used about processors, each of which ran at 40 MHz and, overall, it was capable of testing about 2.5 million keys per second. Extrapolating this to a PC with a single 4 GHz processor, Trudy could test fewer than keys per second on one such machine. If Trudy had access to 1000 such machines, she could test about keys per second.
5 5 On rare occasion, an Electoral College delegate is a “faithless elector,″ meaning that the delegate votes for a different candidate than the one the elector is pledged to support.
6 6 Foreshadowing the U.S. presidential election of the year 2000, one of these four disputed states was, believe it or not, Florida.
7 7 Apparently, this message had not initially attracted attention because it was not encrypted. The lesson here is that, ironically, encryption with a weak cipher may be worse than no encryption at all. We have more to say about this issue in Chapter 7.
8 8 David Greenglass served ten years of a fifteen year sentence for his part in the crime. He later claimed that he lied in crucial testimony about his sister Ethyl Rosenberg's level of involvement—testimony that may have been decisive in her being sentenced to death.
9 9 Remarkably, the Polish cryptanalysts were not allowed to continue their work on the Enigma in Britain.
10 10 NBS has since been rechristened as the National Institute of Standards and Technology, or NIST, perhaps in an effort to recycle three‐letter acronyms and thereby delay their eventual exhaustion by government agencies.
11 11 Cryptographic hash functions are not to be confused with the hash functions that you may have seen in other computing contexts. As compared to non‐cryptographic hash functions, weĺl have very stringent requirements for our cryptographic hash functions, as you will see in Chapter 5.