




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Wireless Networks and SecurityPublic Key Cryptography & Message Authentication共三十二页Approaches to Message AuthenticationUsing conventional encryptionSymmetric encryption alone is not a suitable tool for data authenticationWe assume that only the sender and receiver share a key, so only the genuine se
2、nder would be able to encrypt a message successfullyThe receiver assumes that no alterations have been made and that sequencing is proper if the message includes an error detection code and a sequence numberIf the message includes a timestamp, the receiver assumes that the message has not been delay
3、ed beyond that normally expected for network transitWithout message encryptionAn authentication tag is generated and appended to each message for transmissionThe message itself is not encrypted and can be read at the destination independent of the authentication function at the destinationBecause th
4、e message is not encrypted, message confidentiality is not provided共三十二页共三十二页One-way Hash FunctionsAccepts a variable-size message M as input and produces a fixed-size message digest H(M) as outputDoes not take a secret key as inputTo authenticate a message, the message digest is sent with the messa
5、ge in such a way that the message digest is authentic共三十二页共三十二页Secure Hash FunctionsIs important not only in message authentication but in digital signaturesPurpose is to produce a “fingerprint” of a file, message, or other block of dataTo be useful for message authentication, a hash function H must
6、 have the following properties:1. H can be applied to a block of data of any size.2. H produces a fixed-length output.3. H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical.4. For any given code h, it is computationally infeasible to find x
7、 such that H(x) = h. A hash function with this property is referred to as one-way or preimage resistant.5. For any given block x, it is computationally infeasible to find y x with H(y) = H(x). A hash function with this property is referred to as second preimage resistant. This is sometimes referred
8、to as weak collision resistant.6. It is computationally infeasible to find any pair (x, y) such that H(x) = H(y).A hash function with this property is referred to as collision resistant. This is sometimes referred to as strong collision resistant.共三十二页Security of Hash FunctionsThere are two approach
9、es to attacking a secure hash function:CryptanalysisInvolves exploiting logical weaknesses in the algorithmBrute-force attackThe strength of a hash function against this attack depends solely on the length of the hash code produced by the algorithm共三十二页共三十二页The sha Secure Hash functionSHA was develo
10、ped by NIST and published as a federal information processing standard (FIPS 180) in 1993Was revised in 1995 as SHA-1 and published as FIPS 180-1The actual standards document is entitled “Secure Hash Standard”Based on the hash function MD4 and its design closely models MD4Produces 160-bit hash value
11、s In 2005 NIST announced the intention to phase out approval of SHA-1 and move to a reliance on SHA-2 by 2010共三十二页Table 3.1 Comparison of SHA Parameters Note: All sizes are measured in bits.共三十二页共三十二页共三十二页Sha-3Basic requirements that must be satisfied by any candidate for SHA-31. It must be possible
12、 to replace SHA-2 with SHA-3 in any application by a simple drop-in substitution. Therefore, SHA-3 must support hash value lengths of 224, 256, 384, and 512 bits.2. SHA-3 must preserve the online nature of SHA-2. That is, the algorithm must process comparatively small blocks (512 or 1024 bits) at a
13、time instead of requiring that the entire message be buffered in memory before processing it.共三十二页HMACThere has been an increased interest in developing a MAC derived from a cryptographic hash code, such as SHA-1Cryptographic hash functions generally execute faster in software than conventional encr
14、yption algorithms such as DESLibrary code for cryptographic hash functions is widely availableA hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret keyThere have been a number of proposals for the incorporati
15、on of a secret key into an existing hash algorithmThe approach that has received the most support is HMACHMACHas been issued as RFC 2104Has been chosen as the mandatory-to-implement MAC for IP SecurityIs used in other Internet protocols, such as Transport Layer Security (TLS) and Secure Electronic T
16、ransaction (SET)共三十二页HMAC Design ObjectivesTo use, without modifications, available hash functions - in particular, hash functions that perform well in software, and for which code is freely and widely availableTo allow for easy replaceability of the embedded hash function in case faster or more sec
17、ure hash functions are found or requiredTo preserve the original performance of the hash function without incurring a significant degradationTo use and handle keys in a simple wayTo have a well understood cryptographic analysis of the strength of the authentication mechanism based on reasonable assu
18、mptions on the embedded hash function共三十二页共三十二页共三十二页Counter with Cipher Block Chaining-Message Authentication Code (CCM) NIST standard SP 800-38CReferred to as an authenticated encryption mode “Authenticated encryption” is a term used to describe encryption systems that simultaneously protect confid
19、entiality and authenticity of communicationsA single key is used for both encryption and MAC algorithms AES encryption algorithmCTR mode of operationCMAC authentication algorithmKey algorithmic ingredients共三十二页共三十二页Public-Key encryption structureFirst publicly proposed by Diffie and Hellman in 1976B
20、ased on mathematical functions rather than on simple operations on bit patternsIs asymmetric, involving the use of two separate keysMisconceptions:Public-key encryption is more secure from cryptanalysis than conventional encryptionPublic-key encryption is a general-purpose technique that has made co
21、nventional encryption obsoleteThere is a feeling that key distribution is trivial when using public-key encryption, compared to the rather cumbersome handshaking involved with key distribution centers for conventional encryption共三十二页共三十二页Applications for public-key cryptosystemsPublic-key systems ar
22、e characterized by the use of a cryptographic type of algorithm with two keys, one held private and one available publiclyDepending on the application, the sender uses either the senders private key, the receivers public key, or both to perform some type of cryptographic functionThe use of public-ke
23、y cryptosystems can be classified into three categories:Encryption/decryptionThe sender encrypts a message with the recipients public keyDigital signatureThe sender “signs” a message with its private keyKey exchange Two sides cooperate to exchange a session key共三十二页Table 3.2applications for public-k
24、ey cryptosystems共三十二页共三十二页共三十二页Diffie-Hellman Key ExchangeFirst published public-key algorithmA number of commercial products employ this key exchange techniquePurpose of the algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of message
25、sThe algorithm itself is limited to the exchange of the keysDepends for its effectiveness on the difficulty of computing discrete logarithms共三十二页共三十二页共三十二页Digital Signature standard (DSS)FIPS PUB 186Makes use of the SHA-1 and presents a new digital signature technique, the Digital Signature Algorith
26、m (DSA)Originally proposed in 1991 and revised in 1993 and again in 1996Uses an algorithm that is designed to provide only the digital signature functionUnlike RSA, it cannot be used for encryption or key exchange共三十二页Elliptic-curve cryptology (ECC)Technique is based on the use of a mathematical construct known as the elliptic curvePrincipal attraction of ECC compared to RSA is that it appears to offer equal security for a far smaller bit
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 户外广告材料丝印染工艺与数字印刷技术的结合考核试卷
- 聚合物生物膜考核试卷
- 体育场馆运营中的环保节能措施考核试卷
- 保温容器生产设备故障诊断技术考核试卷
- 园林植物配置中的植物组合艺术考核试卷
- 乐器制作中装饰细节误差对美观度的影响考核试卷
- 农业机械租赁业务售后服务培训考核试卷
- 2025年中国PTC控制元件数据监测报告
- 2025年中国PC硬化喷涂线数据监测报告
- 2025年中国HDPE中空壁缠绕管数据监测研究报告
- 蝶阀试水方案
- 贵州省黔东南苗族侗族自治州(2024年-2025年小学二年级语文)部编版期末考试试卷(含答案)
- 小米公司4P营销策略分析与优化
- 疑难病例讨论课件
- AA-6880原子吸收操作规程
- NB-T25036-2014发电厂离相封闭母线技术要求
- MBTI完美版测试题
- 2024年安徽普通高中学业水平选择性考试化学试题及答案
- 江苏省淮安市淮安中学2025届数学高一下期末教学质量检测试题含解析2
- 《取水许可核验报告编制导则(试行)(征求意见稿)》
- 老年消防知识讲座
评论
0/150
提交评论