




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、信息安全重要导论密码学原理及算法 page22022/7/202. 对称密码体系3. 公钥密码体系4. 密码散列函数1. 概述1. 概述安全攻击:Interruption 阻断Interception 窃听Modification 修改Fabrication 伪装Active AttackPassive Attackpage32022/7/201. 概述安全服务Confidentiality (保密性)Availability (可用性)Nonrepudiation (防抵赖)Authentication (真实性)Integrity (完整性)Access Control (可控性)page
2、42022/7/201. 概述page52022/7/20Symmetric CryptographyAsymmetric CryptographyCryptographic Hash FunctionCryptography1. 概述page62022/7/20Cryptographic Hash FunctionAsymmetric CryptographySymmetric CryptographyGeneral idea of Symmetric-key cipher 对称密码PlaintextPlaintextCiphertextCiphertextDecryptionAlgorit
3、hmEncryptionAlgorithmSecure Key-exchange ChannelInsecure ChannelSharedSecret-KeySharedSecret-KeyAliceBobEncipherment(加密)1. 概述page72022/7/20Symmetric CryptographyCryptographic Hash FunctionAsymmetric CryptographyGeneral idea of Asymmetric-key cipherPlaintextPlaintextCiphertextCiphertextDecryptionAlgo
4、rithmEncryptionAlgorithmInsecure ChannelAliceBobAlicesPrivate-KeyAlicesPublic Key1Digital Signature数字签名1. 概述page82022/7/20Symmetric CryptographyCryptographic Hash FunctionAsymmetric CryptographyGeneral idea of Asymmetric-key cipherPlaintextPlaintextCiphertextCiphertextEncryptionAlgorithmDecryptionAl
5、gorithmInsecure ChannelAliceBobAlicesPrivate-KeyAlicesPublic Key2Encipherment1. 概述page92022/7/20Symmetric CryptographyAsymmetric CryptographyCryptographic Hash FunctionGeneral idea of Hash Function for Message DigestOriginalMessageChecking integrity 完整性检验密码学原理及算法 page102022/7/202. 对称密码体系3. 公钥密码体系4.
6、密码散列函数1. 概述1. 概述page112022/7/20分组密码流密码秘钥管理对称密码2. 对称密码2.1 分组密码: 基本变换函数page122022/7/20S-BoxXORCircular ShiftSwapSplit / CombineP-BoxA P-box (置换盒) parallels the traditional transposition cipher for characters. It transposes (移动) bits. A straight(直接的) P-box is invertible(可逆的), but compression and expans
7、ion P-boxes are not.e.g.2. 对称密码2.1 分组密码: 基本变换函数page132022/7/20P-BoxXORCircular ShiftSwapSplit / CombineS-BoxAn S-box (替换盒) can be thought of as a miniature(微小的) substitution cipher. An S-box is an m n substitution unit, where m and n are not necessarily the same.110 11010 012. 对称密码2.1 分组密码: 基本变换函数pa
8、ge142022/7/20P-BoxS-BoxCircular ShiftSwapSplit / CombineXORThe exclusive-or operation is an important component in most block ciphers. XOR01001110+e.g.2. 对称密码2.1 分组密码: 基本变换函数page152022/7/20P-BoxS-BoxXORSwapSplit / CombineCircular ShiftThe circular shift operation is another component found in some m
9、odern block ciphers. e.g.2. 对称密码2.1 分组密码: 基本变换函数page162022/7/20P-BoxS-BoxXORCircular ShiftSplit / CombineSwapThe swap operation is a special case of the circular shift operation where k = n/2. e.g.EncryptionDecryption2. 对称密码2.1 分组密码: 基本变换函数page172022/7/20P-BoxS-BoxXORCircular ShiftSwapSplit / Combin
10、eTwo other operations found in some block ciphers are split and combine. e.g.SplitCombineEncryptionDecryption2. 对称密码2.1 分组密码: Feistel 密码page182022/7/20Block sizeKey sizeNumber of roundsSubkey generationRound functionFast software E/DEase of analysis2. 对称密码2.1 分组密码: DES(数据加密标准)page192022/7/20DES64bit
11、 plaintext64bit ciphertextInitial permutationRound 1Round 2Round 16Final permutation.56bit keyK1K2K16Round-key generator2. 对称密码2.1 分组密码: DES(数据加密标准)page202022/7/20秘钥扩展:生成16个轮秘钥2. 对称密码2.1 分组密码: DES(数据加密标准)page212022/7/20多重加密(Multiple Encryption)Double DESC = EK2(EK1(P)M = DK1(DK2(P)meet in the middle
12、 attack:Triple DESTriple DES with 2 keysC=Ek1(Dk2(Ek1(P)P=Dk1(Ek2(Dk1(P)K1+K2: 112bitsTriple DES with 3 keysC=Ek3(Dk2(Ek1(P)P=Dk1(Ek2(Dk3(C)More secure than DES, but with more cost2. 对称密码2.1 分组密码: AES(高级数据加密标准)page222022/7/202. 对称密码2.1 分组密码: AES(高级数据加密标准)page232022/7/201) Byte Substitution2) Shift R
13、ows3) Mix Columns4) Add Round key2. 对称密码2.1 分组密码: AES(高级数据加密标准)page242022/7/20秘钥扩展2. 对称密码2.1 分组密码:加密模式对称密码算法的具体应用机制增加安全性,如完整性可以将分组加密算法用作流加密page252022/7/202. 对称密码2.1 分组密码:加密模式page262022/7/20CBCCFBOFBCTRECBThe electronic codebook (ECB) mode is the simplest mode of operation.Each block of plaintext is
14、encoded independently(独立地) using the same key.2. 对称密码page272022/7/202.1 分组密码:加密模式ECBCFBOFBCTRCBCTo transmit a lengthy message, we might employ the so called Cipher Block Chaining (CBC) mode;In this scheme, the input to the encryption algorithm is the XOR of the current plaintext block and the preced
15、ing ciphertext block; the same key is used for each block.To transmit a lengthy message, we might employ the so called Cipher Block Chaining (CBC) mode;In this scheme, the input to the encryption algorithm is the XOR of the current plaintext block and the preceding ciphertext block; the same key is
16、used for each block.2. 对称密码page282022/7/202.1 分组密码:加密模式ECBCBCOFBCTRCFB2. 对称密码page292022/7/202.1 分组密码:加密模式ECBCBCCFBCTROFBOutput Feedback Mode is Similar to CFB. Can you find the difference?2. 对称密码page302022/7/202.1 分组密码:加密模式ECBCBCCFBOFBIn the counter (CTR) mode, there is no feedback. The pseudo-rando
17、mness(伪随机) in the key stream is achieved using a counter. CTR2. 对称密码2.2 流密码page312022/7/20Structure110011000110110010100000+plaintextkey streamciphertext2. 对称密码2.2 流密码:RC4算法page322022/7/202. 对称密码2.2 流密码:RC4算法page332022/7/202. 对称密码2.2 流密码:RC4算法page342022/7/20Initialization Initialization is done in t
18、wo steps:Key Stream GenerationThe keys in the key stream are generated, one by one. 2. 对称密码2.3 秘钥分配page352022/7/20Key Distribution Scenario: preconditions(前提) A wishes to establish a logical connection with BABKDC A requires a session key from KDC to protect the communication A share a master key wi
19、th KDC, B share with KDCSecret channelSecret channel2. 对称密码2.3 秘钥分配:KDC Scenariopage362022/7/20AKDCAB12456密码学原理及算法 page372022/7/202. 对称密码体系3. 公钥密码体系 4. 密码散列函数1. 概述3. 公钥密码page382022/7/203.1 Diffie-Hellman Key Exchange Scheme3. 公钥密码3.1 Diffie-Hellman Key Exchange Schemepage392022/7/20 Global Public ElementsY:YP, Y是P的素数根P:素数 For AliceSelected private: A, ( AP )Calculate public =YA mod
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025专卖店、超市、商场员工聘用合同范本
- 库房出租合同模板二零二五年
- 土地流转居间合同书二零二五年
- 买房盖房租房合同样本
- 二零二五劳动合同劳动合同签订原则
- 系统培训方案模板
- 买期房抵押合同样本
- 居间厂房转让合同二零二五年
- 二零二五代签合同授权的委托书
- 投资收益分配股权转让定金协议二零二五年
- 金属非金属地下矿山监测监控系统建设规范
- 2024年苏州市轨道交通集团有限公司招聘笔试参考题库附带答案详解
- 新概念英语第2册课文(完整版)
- 水培吊兰的养殖方法要领
- 动物的迁徙行为与地球生态系统
- 【小学心理健康教育分析国内外文献综述4100字】
- 校园金话筒大赛(临沂赛区)策划书
- 正确使用文丘里面罩
- 破碎锤施工方案
- 2023年10月自考00161财务报表分析(一)试题及答案含评分标准
- 大学物理第8章-机械振动
评论
0/150
提交评论