版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Wireless Networks and SecurityPublic Key Cryptography & Message Authentication共三十二页Approaches to Message AuthenticationUsing conventional encryptionSymmetric encryption alone is not a suitable tool for data authenticationWe assume that only the sender and receiver share a key, so only the genuine se
2、nder would be able to encrypt a message successfullyThe receiver assumes that no alterations have been made and that sequencing is proper if the message includes an error detection code and a sequence numberIf the message includes a timestamp, the receiver assumes that the message has not been delay
3、ed beyond that normally expected for network transitWithout message encryptionAn authentication tag is generated and appended to each message for transmissionThe message itself is not encrypted and can be read at the destination independent of the authentication function at the destinationBecause th
4、e message is not encrypted, message confidentiality is not provided共三十二页共三十二页One-way Hash FunctionsAccepts a variable-size message M as input and produces a fixed-size message digest H(M) as outputDoes not take a secret key as inputTo authenticate a message, the message digest is sent with the messa
5、ge in such a way that the message digest is authentic共三十二页共三十二页Secure Hash FunctionsIs important not only in message authentication but in digital signaturesPurpose is to produce a “fingerprint” of a file, message, or other block of dataTo be useful for message authentication, a hash function H must
6、 have the following properties:1. H can be applied to a block of data of any size.2. H produces a fixed-length output.3. H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical.4. For any given code h, it is computationally infeasible to find x
7、 such that H(x) = h. A hash function with this property is referred to as one-way or preimage resistant.5. For any given block x, it is computationally infeasible to find y x with H(y) = H(x). A hash function with this property is referred to as second preimage resistant. This is sometimes referred
8、to as weak collision resistant.6. It is computationally infeasible to find any pair (x, y) such that H(x) = H(y).A hash function with this property is referred to as collision resistant. This is sometimes referred to as strong collision resistant.共三十二页Security of Hash FunctionsThere are two approach
9、es to attacking a secure hash function:CryptanalysisInvolves exploiting logical weaknesses in the algorithmBrute-force attackThe strength of a hash function against this attack depends solely on the length of the hash code produced by the algorithm共三十二页共三十二页The sha Secure Hash functionSHA was develo
10、ped by NIST and published as a federal information processing standard (FIPS 180) in 1993Was revised in 1995 as SHA-1 and published as FIPS 180-1The actual standards document is entitled “Secure Hash Standard”Based on the hash function MD4 and its design closely models MD4Produces 160-bit hash value
11、s In 2005 NIST announced the intention to phase out approval of SHA-1 and move to a reliance on SHA-2 by 2010共三十二页Table 3.1 Comparison of SHA Parameters Note: All sizes are measured in bits.共三十二页共三十二页共三十二页Sha-3Basic requirements that must be satisfied by any candidate for SHA-31. It must be possible
12、 to replace SHA-2 with SHA-3 in any application by a simple drop-in substitution. Therefore, SHA-3 must support hash value lengths of 224, 256, 384, and 512 bits.2. SHA-3 must preserve the online nature of SHA-2. That is, the algorithm must process comparatively small blocks (512 or 1024 bits) at a
13、time instead of requiring that the entire message be buffered in memory before processing it.共三十二页HMACThere has been an increased interest in developing a MAC derived from a cryptographic hash code, such as SHA-1Cryptographic hash functions generally execute faster in software than conventional encr
14、yption algorithms such as DESLibrary code for cryptographic hash functions is widely availableA hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret keyThere have been a number of proposals for the incorporati
15、on of a secret key into an existing hash algorithmThe approach that has received the most support is HMACHMACHas been issued as RFC 2104Has been chosen as the mandatory-to-implement MAC for IP SecurityIs used in other Internet protocols, such as Transport Layer Security (TLS) and Secure Electronic T
16、ransaction (SET)共三十二页HMAC Design ObjectivesTo use, without modifications, available hash functions - in particular, hash functions that perform well in software, and for which code is freely and widely availableTo allow for easy replaceability of the embedded hash function in case faster or more sec
17、ure hash functions are found or requiredTo preserve the original performance of the hash function without incurring a significant degradationTo use and handle keys in a simple wayTo have a well understood cryptographic analysis of the strength of the authentication mechanism based on reasonable assu
18、mptions on the embedded hash function共三十二页共三十二页共三十二页Counter with Cipher Block Chaining-Message Authentication Code (CCM) NIST standard SP 800-38CReferred to as an authenticated encryption mode “Authenticated encryption” is a term used to describe encryption systems that simultaneously protect confid
19、entiality and authenticity of communicationsA single key is used for both encryption and MAC algorithms AES encryption algorithmCTR mode of operationCMAC authentication algorithmKey algorithmic ingredients共三十二页共三十二页Public-Key encryption structureFirst publicly proposed by Diffie and Hellman in 1976B
20、ased on mathematical functions rather than on simple operations on bit patternsIs asymmetric, involving the use of two separate keysMisconceptions:Public-key encryption is more secure from cryptanalysis than conventional encryptionPublic-key encryption is a general-purpose technique that has made co
21、nventional encryption obsoleteThere is a feeling that key distribution is trivial when using public-key encryption, compared to the rather cumbersome handshaking involved with key distribution centers for conventional encryption共三十二页共三十二页Applications for public-key cryptosystemsPublic-key systems ar
22、e characterized by the use of a cryptographic type of algorithm with two keys, one held private and one available publiclyDepending on the application, the sender uses either the senders private key, the receivers public key, or both to perform some type of cryptographic functionThe use of public-ke
23、y cryptosystems can be classified into three categories:Encryption/decryptionThe sender encrypts a message with the recipients public keyDigital signatureThe sender “signs” a message with its private keyKey exchange Two sides cooperate to exchange a session key共三十二页Table 3.2applications for public-k
24、ey cryptosystems共三十二页共三十二页共三十二页Diffie-Hellman Key ExchangeFirst published public-key algorithmA number of commercial products employ this key exchange techniquePurpose of the algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of message
25、sThe algorithm itself is limited to the exchange of the keysDepends for its effectiveness on the difficulty of computing discrete logarithms共三十二页共三十二页共三十二页Digital Signature standard (DSS)FIPS PUB 186Makes use of the SHA-1 and presents a new digital signature technique, the Digital Signature Algorith
26、m (DSA)Originally proposed in 1991 and revised in 1993 and again in 1996Uses an algorithm that is designed to provide only the digital signature functionUnlike RSA, it cannot be used for encryption or key exchange共三十二页Elliptic-curve cryptology (ECC)Technique is based on the use of a mathematical construct known as the elliptic curvePrincipal attraction of ECC compared to RSA is that it appears to offer equal security for a far smaller bit
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- (正式版)DB37∕T 1647-2010 《桑蚕鲜茧分级(茧层率法)》
- 危急值护理的临床案例
- 安全生产事故应急处置预案及方案
- 安全生产月主题方案
- 安徽省天长市2025-2026学年初三寒假延长作业语文试题含解析
- GB13495.3-2026《消防安全标志 第3部分:设置要求》修订解读
- 福建厦门华侨中学2025-2026学年中考预测金卷语文试题(安徽卷)含解析
- 重庆市长寿区市级名校2026年中考模拟语文试题试卷含解析
- 2026年江西省赣州市信丰县重点达标名校初三教学情况调研(二)英语试题含解析
- 广东省南雄市第二中学2025-2026学年中考语文试题命题比赛模拟试卷(19)含解析
- 2026年安徽卫生健康职业学院单招综合素质考试题库附答案详解(a卷)
- 2026年安徽工贸职业技术学院单招职业技能考试题库及答案详解(真题汇编)
- 新春开学第一课:小学法治教育课件
- 医疗场景人因工程学-洞察与解读
- 2026年及未来5年中国黄花菜行业市场发展现状及投资策略咨询报告
- 2026龙江森工集团权属林业局限公司春季公开招聘635人易考易错模拟试题(共500题)试卷后附参考答案
- UG NX 10.0完全自学指南
- 医疗注射治疗风险告知书范本
- 生长监测生物标志物研究进展
- 2026年高考时事政治时事政治考试题库完整参考答案
- 大专移动通信技术
评论
0/150
提交评论