




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
2023/10/61Chapter1.
OverviewofCryptographicProtocol2023/10/62课程教学大纲
课程名称:现代密码协议/AdvancedCryptographicProtocols学 时(课内/课外*):54(44/10)先修课程:密码算法教材、教学参考书:主要教材:书名:CryptographicProtocols
作者:BerrrySchoenmakers
出版社:www.win.tue.nl/~berry/2WC01/LectureNotes-v0.9.pdf
出版日期:Version0.9,March3,2004参考教材:1书名:《通信网的安全-理论与技术》作者:王育民出版社:西安电子科技大学出版社出版日期:1999年2书名:《应用密码学-协议、算法与C源程序》作者:(美)BruceSchneier
出版社:机械工业出版社
出版日期:2000年
2023/10/63课程的性质、地位、任务密码学是信息安全的核心,围绕着密码理论和应用分为几个不同的层次,最底层是数学、逻辑等基础;然后是基本的密码算法(分组密码、公钥密码、Hash函数等),接下来是在此基础上具有普适性的密码协议,最上面是一些针对具体应用的协议。
本课程的重点是讨论一般的密码协议,并在此基础上介绍几个应用广泛的应用协议,使学生对现代密码协议的基本理论以及它们的应用情况有基本的认识,为以后的进一步研究和工作打下基础。2023/10/64课程的教学内容和基本要求
教学内容包括:密码协议引论,密钥交换协议,比特承诺协议,身份鉴别协议,零知识证明协议,门限密码协议,安全多方计算,签名与盲签名协议,协议的形式化分析,应用协议1:网络认证,应用协议2:电子支付,应用协议3:无线安全,密码协议的国际标准,密码协议的研究进展等。要求了解相关密码协议的内容,并初步掌握密码协议的分析设计方法。考核形式:考试(70%)+研究报告
(20%)+平时表现(10%)2023/10/65InformationsecurityandcryptographyCryptographyisthestudyofmathematicaltechniquesrelatedtoaspectsofinformationsecurityCryptographicgoalsConfidentialityDataintegrityAuthenticationNon-repudiation2023/10/66BackgroundonFunctions(ctd)one-wayfunctioniff(x)iseasytocomputeforallx
X,butitiscomputationallyinfeasibletofindanyx
Xsuchthatf(x)=y.trapdoorone-wayfunctionifgiventrapdoorinformation,itbecomesfeasibletofindanx
Xsuchthatf(x)=y.2023/10/67Symmetric-keyciphersBlockcipherbreaksuptheplaintextintoblocksofafixedlength,andthenencryptsoneblockatatime.Streamciphertakestheplaintextstringandproducesaciphertextstringusingkeystreamspecificcaseofblockcipherwiththesizeof12023/10/68Symmetric-keycryptographyAdvantageshighdatathroughputrelativelyshortsizeprimitivestoconstructvariouscryptographicmechanismsDisadvantagesthekeymustremainsecretatbothends.O(n2)keystobemanaged.relativelyshortlifetimeofthekey2023/10/69Public-keycryptographyAdvantagesOnlytheprivatekeymustbekeptsecretrelativelylonglifetimeofthekeyrelativelyefficientdigitalsignaturemechanismssmallerverificationkeyO(n)keystobemanagedDisadvantageslowdatathroughputmuchlargerkeysizes2023/10/610DigitalsignaturesNomenclatureM:messagesS:signaturesSA:signingtransformationforAVA:verificationtransformationforADefinitionSAandVAprovideadigitalsignaturescheme(ormechanism)forA.2023/10/611AuthenticationEntityauthentication(Identification)corroborationoftheidentityofanentity(e.g.,aperson,acomputerterminal,acreditcard,etc.).Messageauthentication(Dataoriginauthentication)corroboratingthesourceofinformation2023/10/612Summaryofcomparisonpublic-keycryptographysignatures(particularly,non-repudiation)andkeymanagementsymmetric-keycryptographyencryptionandsomedataintegrityapplicationsKeysizesPrivatekeysmustbelarger(e.g.,1024bitsforRSA)thansecretkeys(e.g.,64or128bits)mostattackonsymmetric-keysystemsisanexhaustivekeysearchpublic-keysystemsaresubjectto“short-cut”attacks(e.g.,factoring)2023/10/613ProtocolsandmechanismsCryptographicalgorithmwell-definedtransformation,whichonagiveninputvalueproducesanoutputvalue,achievingcertainsecurityobjectives.CryptographicprotocoldistributedalgorithmdefinedbyasequenceofstepspreciselyspecifyingtheactionsrequiredoftwoormoreentitiesCryptographicmechanismmoregeneraltermencompassingprotocols,algorithms,andnon-cryptographictechniques2023/10/614KeyestablishmentandmanagementKeyestablishmentprocesstoestablishasharedsecretkeyavailabletotwoormorepartiessubdividedintokeyagreementandkeytransport.Keymanagementthesetofprocessesandmechanismswhichsupportkeyestablishmentandthemaintenanceofongoingkeyingrelationshipsbetweenparties2023/10/615Keymanagementthroughsymmetric-keytech.Advantageseasytoaddandremoveentitiesneedstostoreonlyonelong-termsecretkey.DisadvantagesinitialinteractionwiththeTTP.nlong-termsecretkeysmaintainedbyTTPTTPcanreadallmessages.IfTTPiscompromised,allcommunicationsareinsecure2023/10/616Keymanagementthroughpublic-keytech.AdvantagesNoTTPisrequiredduringkeyagreementorupdate.OnlynpublickeysneedtobestoredDisadvantagesActiveadversarycancompromisethekeymanagementscheme(e.g.man-in-the-middleattack)NeedTTP(e.g.,CA)tocertifythepublickeyofeachentity.2023/10/617Public-keycertificationAdvantagespreventsanactiveadversaryfromimpersonationTTPcannotmonitorcommunications.DisadvantagesIfthesigningkeyoftheTTPiscompromised,allcommunicationsbecomeinsecure.2023/10/618AttacksonencryptionschemesCiphertext-onlyattackdeducethedecryptionkeyorplaintextbyonlyobservingciphertext.Known-plaintextattackusingaquantityofplaintextandcorrespondingciphertext.Chosen-plaintextattackchoosesplaintextandisthengivencorrespondingciphertext.Adaptivechosen-plaintextattackchosen-plaintextattackwherethechoiceofplaintextmaydependontheciphertextreceivedfrompreviousrequests.Chosen-ciphertextattackselectstheciphertextandisthengiventhecorrespondingplaintext.Adaptivechosen-ciphertextattackchosen-ciphertextattackwherethechoiceofciphertextmaydependontheplaintextreceivedfrompreviousrequests.2023/10/619Attacksonprotocolsknown-keyattackusespreviouslyusedkeystodeterminenewkeysreplayattackrecordsacommunicationsessionandreplaysthatsessionimpersonationattackdeceivestheidentityofoneofthelegitimatepartiesdictionaryattackusingcodebookforwardsearchattackifmessagespaceissmallorpredictableinterleavingattackimpersonationorotherdeceptioninvolvingselectivecombinationofinformationfromparallelsessions2023/10/620OverviewBasicnotionsofcryptographic(security)protocolsProblemswithcryptographicprotocolsDesignprinciplesforcryptographicprotocolsAnalysisofcryptographicprotocols2023/10/621BasicNotions2023/10/622BasicNotions2023/10/623BasicNotions2023/10/624BasicNotions2023/10/625ASimpleProtocol(inDetail)2023/10/626ASimpleProtocol(inDetail)2023/10/627BasicNotions(ctd.)2023/10/628BasicNotions2023/10/629BasicNotions2023/10/630BasicNotions2023/10/631BasicNotions2023/10/632BasicNotions--ASimpleProtocol(ctd.)2023/10/633BasicNotions--ASimpleProtocol(ctd.)2023/10/634BasicNotions--ASimpleProtocol(ctd.)2023/10/635BasicNotions--ASimpleProtocol(ctd.)2023/10/636BasicNotions--ASimpleProtocol(ctd.)2023/10/637BasicNotions--ASimpleProtocol(ctd.)2023/10/638BasicNotions--ASimpleProtocol(ctd.)2023/10/639BasicNotions2023/10/640BasicNotions--ASimpleProtocol(ctd.)2023/10/641ASimpleProtocol(inDetail)2023/10/642ProblemswithProtocols2023/10/643ProblemswithProtocols2023/10/644ProblemswithProtocols2023/10/645ProblemswithProtocols2023/10/646ProblemswithProtocols2023/10/647ProblemswithProtocols2023/10/648ProblemswithProtocols2023/10/649ProblemswithProtocols2023/10/650ProblemswithProtocols2023/10/651ProblemswithProtocols2023/10/652ProblemswithProtocols2023/10/653ProblemswithProtocols2023/10/654ProblemswithProtocols2023/10/655ProblemswithProtocols2023/10/656ProblemswithProtocols2023/10/657ProblemswithProtocols2023/10/658ProblemswithProtocols2023/10/659PrinciplesforDesigningSecu
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 激光癌症诊断仪项目投资可行性研究分析报告(2024-2030版)
- 2023-2029年中国粗粮饼干行业发展监测及投资前景展望报告
- 2025年 锅炉水处理作业G3证考试练习题附答案
- 2025年中国无花果行业市场调研分析及投资战略咨询报告
- 2025年 扶风县职业教育中心招聘考试笔试试题附答案
- 2023-2028年中国制造执行系统行业发展前景预测及投资战略咨询报告
- 2025年中国导爪行业市场发展前景及发展趋势与投资战略研究报告
- 红薯系列产品加工项目可行性研究报告
- 中国高端礼品酒行业市场全景分析及发展趋势预测报告
- 公司辉县市生活垃圾焚烧发电项目环境影响报告书的批复
- 橡胶生产企业设备设施及作业活动风险分级管控清单
- 连带责任担保借条(四篇)
- 2023年计算机图形学试题级考试A卷
- GB/T 42104-2022游乐园安全安全管理体系
- 八年级下册人教版英语单项选择(50题)练习题含答案含答案
- 河北省大众滑雪等级标准(试行)
- GB/T 3863-2008工业氧
- GB/T 31125-2014胶粘带初粘性试验方法环形法
- 班主任班级管理(课堂)课件
- 学院辅导答疑情况记录表
- 31个级地区国家重点监控企业自行监测信息公开平台及污染源监督性监测信息公开网址
评论
0/150
提交评论