版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、2013年4月19日计算机安全技术与实践 分组密码其他内容双重DES,总密钥量 2112 bit 加 密 解 密DESDESDES-1DES-1双重DES,绝对不是一个DES 加 密 解 密DESDESDES-1DES-1CK3DES中间相遇攻击,恢复密钥DESDESPC?(P,C)是一个明密文对中间相遇攻击,原理DESPC11DESP1C1DESPC22DESP12DESPC256256DESP256256CCC2 =P256K1=1K2=256DESPC11DESPC22DESPC256256DESP256256C 记录查记录中间相遇攻击,总计算量 256 bit中间相遇攻击,结果DESD
2、ESPC2256三重DES(双密钥) 加 密 解 密DESDESDES-1DES-1DESDES-1三重DES(三重密钥) 加 密 解 密DESDESDES-1DES-1DESDES-1K3K3分组密码工作模式1:ECB时刻 1 时刻 2 时刻 N加密解密加密加密加密解密解密解密ECB的弱点:相同的明文片段得到相同的密文片段原始文件ECB模式加密后的文件资料来源:/en-us/magazine/cc163522.aspx,转载请注明分组密码工作模式2:CBC时刻 1 时刻 2 时刻 N加密加密加密解密解密解密加密解密CBC模式加密的优点原始文件CBC模式加密后的文件资料来源:/en-us/ma
3、gazine/cc163522.aspx,转载请注明CBC模式的弱点IV必须为收发双方共享IV必须受到保护分组密码工作模式3:CFB分组密码工作模式4:OFB密文有一位取反,则解密后的明文这位也取反,即抗篡改能力弱分组密码工作模式5:CTR明文不满一个字,则丢尾巴不用填充可并行可与计算可随机访问可证明安全加解密相似工作模式反馈特征CBCCFBOFBCRT存储加密的特征和要求 攻击者可随意获取密文 明文密文的大小一样 分组单位互相独立,可单独访问 加密以16字节的分组为单位 除数据分组外,无其他元数据 不同地方的相同明文加密后得到不同密文,但再次写到相同位置时总是相同密文 由一个同标准相容的设备
4、加密数据面向存储设备的XTS-AESXTS-AESCryptography and Network SecurityChapter 7Fifth Editionby William StallingsLecture slides by Lawrie Brown22Chapter 7 Stream Ciphers and Random Number GenerationThe comparatively late rise of the theory of probability shows how hard it is to grasp, and the many paradoxes show
5、 clearly that we, as humans, lack a well grounded intuition in this matter. In probability theory there is a great deal of art in setting up the model, in solving the problem, and in applying the results back to the real world actions that will follow. The Art of Probability, Richard Hamming23Random
6、 Numbersmany uses of random numbers in cryptography nonces in authentication protocols to prevent replaysession keyspublic key generationkeystream for a one-time padin all cases its critical that these values be statistically random, uniform distribution, independentunpredictability of future values
7、 from previous valuestrue random numbers provide thiscare needed with generated random numbers24Pseudorandom Number Generators (PRNGs)often use deterministic algorithmic techniques to create “random numbers”although are not truly randomcan pass many tests of “randomness”known as “pseudorandom number
8、s”created by “Pseudorandom Number Generators (PRNGs)”25Random & Pseudorandom Number Generators26PRNG Requirementsrandomnessuniformity, scalability, consistencyunpredictabilityforward & backward unpredictabilityuse same tests to checkcharacteristics of the seedsecureif known adversary can determine o
9、utputso must be random or pseudorandom number27Linear CongruentialGeneratorcommon iterative technique using:Xn+1 = (aXn + c) mod mgiven suitable values of parameters can produce a long random-like sequencesuitable criteria to have are:function generates a full-periodgenerated sequence should appear
10、randomefficient implementation with 32-bit arithmeticnote that an attacker can reconstruct sequence given a small number of valueshave possibilities for making this harder28Blum Blum Shub Generatorbased on public key algorithmsuse least significant bit from iterative equation:xi = xi-12 mod n where
11、n=p.q, and primes p,q=3 mod 4unpredictable, passes next-bit testsecurity rests on difficulty of factoring N is unpredictable given any run of bits slow, since very large numbers must be usedtoo slow for cipher use, good for key generation 29Using Block Ciphers as PRNGsfor cryptographic applications,
12、 can use a block cipher to generate random numbersoften for creating session keys from master keyCTRXi = EKViOFBXi = EKXi-130ANSI X9.17 PRG31Stream Ciphersprocess message bit by bit (as a stream) have a pseudo random keystreamcombined (XOR) with plaintext bit by bit randomness of stream key complete
13、ly destroys statistically properties in message Ci = Mi XOR StreamKeyi but must never reuse stream keyotherwise can recover messages (cf book cipher)32Stream Cipher Structure33Stream Cipher Propertiessome design considerations are:long period with no repetitions statistically random depends on large
14、 enough keylarge linear complexityproperly designed, can be as secure as a block cipher with same size keybut usually simpler & faster34RC4a proprietary cipher owned by RSA DSI another Ron Rivest design, simple but effectivevariable key size, byte-oriented stream cipher widely used (web SSL/TLS, wir
15、eless WEP/WPA) key forms random permutation of all 8-bit values uses that permutation to scramble input info processed a byte at a time 35RC4 Key Schedule starts with an array S of numbers: 0.255 use key to well and truly shuffle S forms internal state of the cipher for i = 0 to 255 doSi = iTi = Ki
16、mod keylen)j = 0for i = 0 to 255 do j = (j + Si + Ti) (mod 256) swap (Si, Sj)36RC4 Encryptionencryption continues shuffling array valuessum of shuffled pair selects stream key value from permutationXOR St with next byte of message to en/decrypti = j = 0 for each message byte Mii = (i + 1) (mod 256)j
17、 = (j + Si) (mod 256)swap(Si, Sj)t = (Si + Sj) (mod 256) Ci = Mi XOR St37RC4 Overview38RC4 Securityclaimed secure against known attackshave some analyses, none practical result is very non-linear since RC4 is a stream cipher, must never reuse a key have a concern with WEP, but due to key handling ra
18、ther than RC4 itself 39Natural Random Noisebest source is natural randomness in real world find a regular but random event and monitor do generally need special h/w to do this eg. radiation counters, radio noise, audio noise, thermal noise in diodes, leaky capacitors, mercury discharge tubes etc starting to see such h/w in new CPUs problems of bias or une
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 分物游戏(说课稿)-2024-2025学年二年级上册数学北师大版
- 二零二五年度建筑工程安全生产环保验收合同3篇
- 全国人教版初中信息技术七年级上册第四单元第13课七、《插入更新日期》说课稿
- 山东省泰安市肥城市2024-2025学年六年级上学期末考试道德与法治试题(含答案)
- 200万套基于AI大模型的新能源汽车热泵空调部件柔性制造智能工厂项目可行性研究报告写作模板-申批备案
- Unit6 Meet my family B Lets talk Lets learn(说课稿)-2024-2025学年人教PEP版英语四年级上册
- 河南省信阳市浉河区2024-2025学年三年级上学期期末学业质量监测数学试题参考答案
- 湖南省娄底市(2024年-2025年小学六年级语文)部编版阶段练习(上学期)试卷及答案
- 贵州盛华职业学院《建筑设备(暖通空调)》2023-2024学年第一学期期末试卷
- 贵州轻工职业技术学院《医疗诊断前沿技术与创新应用》2023-2024学年第一学期期末试卷
- 2024年高考物理一轮复习讲义(新人教版):第七章动量守恒定律
- 浙江省宁波市慈溪市2023-2024学年高三上学期语文期末测试试卷
- 草学类专业生涯发展展示
- 法理学课件马工程
- 《玉米种植技术》课件
- 第47届世界技能大赛江苏省选拔赛计算机软件测试项目技术工作文件
- 2023年湖北省公务员录用考试《行测》答案解析
- M200a电路分析(电源、蓝牙、FM)
- 2024-2030年全球及中国洞察引擎行业市场现状供需分析及市场深度研究发展前景及规划可行性分析研究报告
- 建筑工程施工图设计文件审查办法
- 置业顾问考核方案
评论
0/150
提交评论