




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、.信息安全导论信息安全导论, 胡海波胡海波2Generally, there are four general categories of security attacks Interception 窃听窃听 Modification 修改修改 Fabrication 伪装伪装1. About IS2. WWW IS?4. S_ Services31. About IS2. WWW IS?4. S_ ServicesGenerally, there are four general categories of security attacks Interruption 阻断阻断 Modific
2、ation 修改修改 Fabrication 伪装伪装4Generally, there are four general categories of security attacks Interruption 阻断阻断 Interception 窃听窃听 Fabrication 伪装伪装1. About IS2. WWW IS?4. S_ Services5Generally, there are four general categories of security attacks Interruption 阻断阻断 Interception 窃听窃听 Modification 修改修改1
3、. About IS2. WWW IS?4. S_ Services61. About IS2. WWW IS?4. S_ ServicesThese attacks involves some modification of the data stream or the creation of a false stream, which can be subdivided into four categories: masquerade (伪装伪装) replay (重放重放) modification of messages (篡改篡改) denial of service (拒绝服务拒绝
4、服务)Active Attack Passive attackand71. About IS2. WWW IS?4. S_ ServicesPassive attacks are in the nature of eavesdropping(偷听偷听) on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are: release of message conten
5、ts (泄密泄密) traffic analysis (流量分析流量分析)Active Attack Passive attackand8Security Services Confidentiality (保密性保密性) Availability (可用性可用性) Nonrepudiation (防抵赖防抵赖) Authentication (真实性真实性) Integrity (完整性完整性) Access Control (可控性可控性)1. About IS2. WWW IS?3. S_ Attacks9Security Services Confidentiality (保密性保密性
6、) Availability (可用性可用性) Nonrepudiation (防抵赖防抵赖) Authentication (真实性真实性) Integrity (完整性完整性) Access Control (可控性可控性)1. About IS2. WWW IS?3. S_ Attacks10Security Services Confidentiality (保密性保密性) Availability (可用性可用性) Nonrepudiation (防抵赖防抵赖) Authentication (真实性真实性) Integrity (完整性完整性) Access Control (可控
7、性可控性)1. About IS2. WWW IS?3. S_ AttacksI didnt send R the message !I didnt receive the message from S !11Security Services Confidentiality (保密性保密性) Availability (可用性可用性) Nonrepudiation (防抵赖防抵赖) Authentication (真实性真实性) Integrity (完整性完整性) Access Control (可控性可控性)1. About IS2. WWW IS?3. S_ AttacksIch bi
8、n Xiaofeng + CredentialVerify User and CredentialAuthorized12Security Services Confidentiality (保密性保密性) Availability (可用性可用性) Nonrepudiation (防抵赖防抵赖) Authentication (真实性真实性) Integrity (完整性完整性) Access Control (可控性可控性)1. About IS2. WWW IS?3. S_ Attacks13Security Services Confidentiality (保密性保密性) Avail
9、ability (可用性可用性) Nonrepudiation (防抵赖防抵赖) Authentication (真实性真实性) Integrity (完整性完整性) Access Control (可控性可控性)1. About IS2. WWW IS?3. S_ AttacksReadWriteAccess142. Classic CryptographyTerminology: homoionym homoionym ( (近义词近义词) ) Cryptography 密码编码学 encrypt, decrypt encryption, decryption code, coding e
10、ncode, decode cipher, ciphering encipher, deciphermessagecodemessageencryptdecryptplaintextciphertext152. Classic CryptographyTerminology: homoionym homoionym ( (近义词近义词) ) Cryptography 密码编码学 encrypt, decrypt encryption, decryption code, coding encode, decode cipher, ciphering encipher, deciphermessa
11、gecodemessageencryptdecryptplaintextciphertext162. Classic CryptographyCryptographyClassic Cryptography:(by WWII) typically for confidential usage A and B have already shared secret information, to protect their communicationModern Cryptography (from WWII) related to more security services, as: conf
12、identiality, integrity, authentication, and non-repudiation.172. Classic CryptographySymmetric C-Asymmetric C-C- Hash Function DecryptionAlgorithmEncryptionAlgorithm182. Classic CryptographySymmetric C-Asymmetric C-C- Hash FunctionDecryptionAlgorithmEncryptionAlgorithm192. Classic CryptographySymmet
13、ric C-Asymmetric C-C- Hash FunctionEncryptionAlgorithmDecryptionAlgorithm202. Classic CryptographySymmetric C-Asymmetric C-C- Hash FunctionHash FunctionHash Function213 2 Auguste Kerckhoffs1835-1903223 2 233 2 243 2 253 2 A group of plaintext symbols of size m (m 1) are encrypted together creating a
14、 group of ciphertext of the same size. A single key is used to encrypt the whole block even if the key is made of multiple values.T,X,T = EKe,x,tH,E,R = EKi,n,tC,I,P = EKp,l,a263 2 In a stream cipher the plaintext digits are encrypted one at a time, and the transformation of successive digits varies
15、 during the encryption.P = EK3(a)I I = EK2(l)C = EK1(p)273 2 e.g.283 2 e.g.132121001111xxxyye.g.2110 11010 01293 2 XORXOR0 01 10 00 01 11 11 10 0+e.g.303 2 e.g.313 2 e.g.323 2 e.g.SplitCombine333 2 8 bit plain textblock1block2blocknkey mixerS-box 3S-box 1S-box 2S-box 412345678P-box8 bit middle textk
16、18 bit middle textk28 bit cipher textRound 1Round 2Round Key GeneratorK343 1 Horst Feistel 1915-1990LiRi+Li+1Ri+1FKiLi+1Ri+1353 1 363 2 DES64bit plaintext64bit ciphertextInitial permutationRound 1Round 2Round 16Final permutation.56bit keyK1K2K16Round-key generator373 2 383 2 A round in DES (encrypti
17、on site)Li = Ri-1Ri = Li-1 f(Ri-1, Ki)+39 The heart of DES is the DES function. The DES function applies a 48-bit round-key to the rightmost 32 bits to produce a 32-bit output.3 2 DES function403 2 Since Ri1 is a 32-bit input and Ki is a 48-bit key, we first need to expand Ri1 to 48 bits. 413 2 Afte
18、r the expansion permutation, DES uses the XOR operation on the expanded right section and the round key. Note that both the right section and the key are 48-bits in length. Also note that the round key is used only in this operation.423 2 The S-boxes do the real mixing (confusion). DES uses 8 S-boxe
19、s, each with a 6-bit input and a 4-bit output.433 2 The S-boxes do the real mixing (confusion). DES uses 8 S-boxes, each with a 6-bit input and a 4-bit output.443 2 e.g. input bits: 110100What are the output bits: ?The S-boxes do the real mixing (confusion). DES uses 8 S-boxes, each with a 6-bit inp
20、ut and a 4-bit output.453 2 463 2 The last operation is Straight Permutation with a P-box as follow. 473 2 483 2 491 2 DESDESK1K2PlaintextMidtextCiphertext501 2 511 2 523 1 Basic Description:4 1. Block size:128 bits4 2. Key size:128 / 192 / 256 bits4 3. Rounds: 10 / 12 / 144 4. Round key size:128 bi
21、ts4 5. Not Feistel Cipher Note that:Add round key before round 1;i.No mix-columns in last round 533 1 543 1 0101001001010010 11010110 01111110 110011115252D67ECFAC8723242612BAC79954D2B4177609DA553 1 1) Byte Substitution2) Shift Rows3) Mix Columns4) Add Round key563 1 1) Byte Substitution2) Shift Row
22、s3) Mix Columns4) Add Round key573 1 1) Byte Substitution2) Shift Rows3) Mix Columns4) Add Round key0 01 12 23 34 45 56 67 78 89 9A AB BC CD DE EF F0 01 12 23 34 45 56 67 78 89 9A AB BC CD DE EF FAC2612BA87C7995423D2B417247609DA91F7C9F417C6EE2026B58DF036380157Find the locations in S-box to substitut
23、e input bytes9157583 1 1) Byte Substitution2) Shift Rows3) Mix Columns4) Add Round key AES Encryption:S-box eg: S-box(AC) =91 AES Decryption:S-box-1 eg:S-box-1(91)=AC S-box、S-Box-1的构造过程:的构造过程:P110593 1 1) Byte Substitution2) Shift Rows3) Mix Columns4) Add Round key This is a transposition/permutatio
24、n operation on rows.603 1 1) Byte Substitution2) Shift Rows3) Mix Columns4) Add Round key The most complicated operation in AES613 1 1) Byte Substitution2) Shift Rows3) Mix Columns4) Add Round key6291F7C9F4C6EE20178DF026B5363801570203010101020301010102030101020391C68D57=02 1001 000103 1100 0110 01 1
25、000 110101 0101 0111=0011 10010101 0001 1000 11010101 01111011 0010B2E5xxxxxxxxxxxxxxxxxxxxxxxx32xxnn矩阵的乘法,继续Example3 Mix Columns633 1 1) Byte Substitution2) Shift Rows3) Mix Columns4) Add Round key AES encryption:C AES decryption:C-1643 1 1) Byte Substitution2) Shift Rows3) Mix Columns4) Add Round
26、key AddRoundKey proceeds one column at a time. AddRoundKey adds a round key word with each state column matrix; the operation in AddRoundKey is matrix addition. The AddRoundKey transformation is the inverse of itself653 1 663 1 673 1 681 Any Problem?69 1 70 1 +IV+CN-1Q1: Decryption?71 1 +IV+CN-1Q1:
27、Decryption?Q2: whats IV?72 1 73 1 n bitsk1S1T1IV+r bitsr bitsr bitsr bitsP1C1N-r bitsk2S2T2+r bitsr bitsr bitsP2C2C1N-r bitskNSNTM+r bitsr bitsr bitsPNCNCN-1r bitsr bitsQ1: Decryption?74 1 n bitsk1S1T1IV+r bitsr bitsr bitsr bitsP1C1N-r bitsk2S2T2+r bitsr bitsr bitsP2C2C1N-r bitskNSNTM+r bitsr bitsr
28、bitsPNCNCN-1r bitsr bitsQ1: Decryption?75 1 Any Problem?76 1 77 1 n bitsk1S1T1IV+r bitsr bitsr bitsr bitsP1C1N-r bitsk2S2T2+r bitsr bitsr bitsP2C2k1N-r bitskNSNTM+r bitsr bitsr bitsPNCNkN-1r bitsr bitsError Propagation?78 1 79 1 8080 RC4 : Structure1 8181 RC4 : Structure1 8282 Stream Cipher: Procedure1 83S00000000S0=000000001S1=100000010S2=200000011S3=300000100S4=400000101S5=5.11111111S255=255Kxxxxxxxxxxxxxxxxxxxxxxxxk1knTxxxxxxxxxxxxxxxxxxxxxxxxk1knKxxxxxxxxxxxxxxxx
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 房地产守价议价及SP配合培训
- 风电技能培训课件图片素材
- 各种护理导管防滑脱措施
- 小学教导处常规管理汇报
- 肺炎的公休座谈会
- 颈椎病健康教育课件
- 领航职业英语课件下载
- 预防踩踏班会课件
- 岗前培训结业汇报
- 预防小学生溺水课件
- 2024年全国环保产业职业技能竞赛(工业废水处理工)考试题库(含答案)
- 房屋及相关设施零星维修项目环境保护管理体系与措施
- 2024汽车行业社媒营销趋势【微播易CAA中国广告协会】-2024-数字化
- 医院药房质量控制制度
- 《乌鲁木齐市国土空间总体规划(2021-2035年)》
- HJ 651-2013 矿山生态环境保护与恢复治理技术规范(试行)
- SY-T 5333-2023 钻井工程设计规范
- 冠脉介入进修汇报
- 叙事护理学智慧树知到期末考试答案章节答案2024年中国人民解放军海军军医大学
- 2024四川省南部县事业单位招聘45人历年公开引进高层次人才和急需紧缺人才笔试参考题库(共500题)答案详解版
- PDCA提高卧床患者踝泵运动的执行率
评论
0/150
提交评论