无线网络安全英文课件3_第1页
无线网络安全英文课件3_第2页
无线网络安全英文课件3_第3页
无线网络安全英文课件3_第4页
无线网络安全英文课件3_第5页
已阅读5页,还剩27页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Wireless Networks and SecurityPublic Key Cryptography & Message Authentication共三十二页Approaches to Message AuthenticationUsing conventional encryptionSymmetric encryption alone is not a suitable tool for data authenticationWe assume that only the sender and receiver share a key, so only the genuine se

2、nder would be able to encrypt a message successfullyThe receiver assumes that no alterations have been made and that sequencing is proper if the message includes an error detection code and a sequence numberIf the message includes a timestamp, the receiver assumes that the message has not been delay

3、ed beyond that normally expected for network transitWithout message encryptionAn authentication tag is generated and appended to each message for transmissionThe message itself is not encrypted and can be read at the destination independent of the authentication function at the destinationBecause th

4、e message is not encrypted, message confidentiality is not provided共三十二页共三十二页One-way Hash FunctionsAccepts a variable-size message M as input and produces a fixed-size message digest H(M) as outputDoes not take a secret key as inputTo authenticate a message, the message digest is sent with the messa

5、ge in such a way that the message digest is authentic共三十二页共三十二页Secure Hash FunctionsIs important not only in message authentication but in digital signaturesPurpose is to produce a “fingerprint” of a file, message, or other block of dataTo be useful for message authentication, a hash function H must

6、 have the following properties:1. H can be applied to a block of data of any size.2. H produces a fixed-length output.3. H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical.4. For any given code h, it is computationally infeasible to find x

7、 such that H(x) = h. A hash function with this property is referred to as one-way or preimage resistant.5. For any given block x, it is computationally infeasible to find y x with H(y) = H(x). A hash function with this property is referred to as second preimage resistant. This is sometimes referred

8、to as weak collision resistant.6. It is computationally infeasible to find any pair (x, y) such that H(x) = H(y).A hash function with this property is referred to as collision resistant. This is sometimes referred to as strong collision resistant.共三十二页Security of Hash FunctionsThere are two approach

9、es to attacking a secure hash function:CryptanalysisInvolves exploiting logical weaknesses in the algorithmBrute-force attackThe strength of a hash function against this attack depends solely on the length of the hash code produced by the algorithm共三十二页共三十二页The sha Secure Hash functionSHA was develo

10、ped by NIST and published as a federal information processing standard (FIPS 180) in 1993Was revised in 1995 as SHA-1 and published as FIPS 180-1The actual standards document is entitled “Secure Hash Standard”Based on the hash function MD4 and its design closely models MD4Produces 160-bit hash value

11、s In 2005 NIST announced the intention to phase out approval of SHA-1 and move to a reliance on SHA-2 by 2010共三十二页Table 3.1 Comparison of SHA Parameters Note: All sizes are measured in bits.共三十二页共三十二页共三十二页Sha-3Basic requirements that must be satisfied by any candidate for SHA-31. It must be possible

12、 to replace SHA-2 with SHA-3 in any application by a simple drop-in substitution. Therefore, SHA-3 must support hash value lengths of 224, 256, 384, and 512 bits.2. SHA-3 must preserve the online nature of SHA-2. That is, the algorithm must process comparatively small blocks (512 or 1024 bits) at a

13、time instead of requiring that the entire message be buffered in memory before processing it.共三十二页HMACThere has been an increased interest in developing a MAC derived from a cryptographic hash code, such as SHA-1Cryptographic hash functions generally execute faster in software than conventional encr

14、yption algorithms such as DESLibrary code for cryptographic hash functions is widely availableA hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret keyThere have been a number of proposals for the incorporati

15、on of a secret key into an existing hash algorithmThe approach that has received the most support is HMACHMACHas been issued as RFC 2104Has been chosen as the mandatory-to-implement MAC for IP SecurityIs used in other Internet protocols, such as Transport Layer Security (TLS) and Secure Electronic T

16、ransaction (SET)共三十二页HMAC Design ObjectivesTo use, without modifications, available hash functions - in particular, hash functions that perform well in software, and for which code is freely and widely availableTo allow for easy replaceability of the embedded hash function in case faster or more sec

17、ure hash functions are found or requiredTo preserve the original performance of the hash function without incurring a significant degradationTo use and handle keys in a simple wayTo have a well understood cryptographic analysis of the strength of the authentication mechanism based on reasonable assu

18、mptions on the embedded hash function共三十二页共三十二页共三十二页Counter with Cipher Block Chaining-Message Authentication Code (CCM) NIST standard SP 800-38CReferred to as an authenticated encryption mode “Authenticated encryption” is a term used to describe encryption systems that simultaneously protect confid

19、entiality and authenticity of communicationsA single key is used for both encryption and MAC algorithms AES encryption algorithmCTR mode of operationCMAC authentication algorithmKey algorithmic ingredients共三十二页共三十二页Public-Key encryption structureFirst publicly proposed by Diffie and Hellman in 1976B

20、ased on mathematical functions rather than on simple operations on bit patternsIs asymmetric, involving the use of two separate keysMisconceptions:Public-key encryption is more secure from cryptanalysis than conventional encryptionPublic-key encryption is a general-purpose technique that has made co

21、nventional encryption obsoleteThere is a feeling that key distribution is trivial when using public-key encryption, compared to the rather cumbersome handshaking involved with key distribution centers for conventional encryption共三十二页共三十二页Applications for public-key cryptosystemsPublic-key systems ar

22、e characterized by the use of a cryptographic type of algorithm with two keys, one held private and one available publiclyDepending on the application, the sender uses either the senders private key, the receivers public key, or both to perform some type of cryptographic functionThe use of public-ke

23、y cryptosystems can be classified into three categories:Encryption/decryptionThe sender encrypts a message with the recipients public keyDigital signatureThe sender “signs” a message with its private keyKey exchange Two sides cooperate to exchange a session key共三十二页Table 3.2applications for public-k

24、ey cryptosystems共三十二页共三十二页共三十二页Diffie-Hellman Key ExchangeFirst published public-key algorithmA number of commercial products employ this key exchange techniquePurpose of the algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of message

25、sThe algorithm itself is limited to the exchange of the keysDepends for its effectiveness on the difficulty of computing discrete logarithms共三十二页共三十二页共三十二页Digital Signature standard (DSS)FIPS PUB 186Makes use of the SHA-1 and presents a new digital signature technique, the Digital Signature Algorith

26、m (DSA)Originally proposed in 1991 and revised in 1993 and again in 1996Uses an algorithm that is designed to provide only the digital signature functionUnlike RSA, it cannot be used for encryption or key exchange共三十二页Elliptic-curve cryptology (ECC)Technique is based on the use of a mathematical construct known as the elliptic curvePrincipal attraction of ECC compared to RSA is that it appears to offer equal security for a far smaller bit

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论