密码算法与协议1密码学原理课件_第1页
密码算法与协议1密码学原理课件_第2页
密码算法与协议1密码学原理课件_第3页
密码算法与协议1密码学原理课件_第4页
密码算法与协议1密码学原理课件_第5页
已阅读5页,还剩74页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

2023/10/61Chapter1.

OverviewofCryptographicProtocol2023/10/62课程教学大纲

课程名称:现代密码协议/AdvancedCryptographicProtocols学 时(课内/课外*):54(44/10)先修课程:密码算法教材、教学参考书:主要教材:书名:CryptographicProtocols

作者:BerrrySchoenmakers

出版社:www.win.tue.nl/~berry/2WC01/LectureNotes-v0.9.pdf

出版日期:Version0.9,March3,2004参考教材:1书名:《通信网的安全-理论与技术》作者:王育民出版社:西安电子科技大学出版社出版日期:1999年2书名:《应用密码学-协议、算法与C源程序》作者:(美)BruceSchneier

出版社:机械工业出版社

出版日期:2000年

2023/10/63课程的性质、地位、任务密码学是信息安全的核心,围绕着密码理论和应用分为几个不同的层次,最底层是数学、逻辑等基础;然后是基本的密码算法(分组密码、公钥密码、Hash函数等),接下来是在此基础上具有普适性的密码协议,最上面是一些针对具体应用的协议。

本课程的重点是讨论一般的密码协议,并在此基础上介绍几个应用广泛的应用协议,使学生对现代密码协议的基本理论以及它们的应用情况有基本的认识,为以后的进一步研究和工作打下基础。2023/10/64课程的教学内容和基本要求

教学内容包括:密码协议引论,密钥交换协议,比特承诺协议,身份鉴别协议,零知识证明协议,门限密码协议,安全多方计算,签名与盲签名协议,协议的形式化分析,应用协议1:网络认证,应用协议2:电子支付,应用协议3:无线安全,密码协议的国际标准,密码协议的研究进展等。要求了解相关密码协议的内容,并初步掌握密码协议的分析设计方法。考核形式:考试(70%)+研究报告

(20%)+平时表现(10%)2023/10/65InformationsecurityandcryptographyCryptographyisthestudyofmathematicaltechniquesrelatedtoaspectsofinformationsecurityCryptographicgoalsConfidentialityDataintegrityAuthenticationNon-repudiation2023/10/66BackgroundonFunctions(ctd)one-wayfunctioniff(x)iseasytocomputeforallx

X,butitiscomputationallyinfeasibletofindanyx

Xsuchthatf(x)=y.trapdoorone-wayfunctionifgiventrapdoorinformation,itbecomesfeasibletofindanx

Xsuchthatf(x)=y.2023/10/67Symmetric-keyciphersBlockcipherbreaksuptheplaintextintoblocksofafixedlength,andthenencryptsoneblockatatime.Streamciphertakestheplaintextstringandproducesaciphertextstringusingkeystreamspecificcaseofblockcipherwiththesizeof12023/10/68Symmetric-keycryptographyAdvantageshighdatathroughputrelativelyshortsizeprimitivestoconstructvariouscryptographicmechanismsDisadvantagesthekeymustremainsecretatbothends.O(n2)keystobemanaged.relativelyshortlifetimeofthekey2023/10/69Public-keycryptographyAdvantagesOnlytheprivatekeymustbekeptsecretrelativelylonglifetimeofthekeyrelativelyefficientdigitalsignaturemechanismssmallerverificationkeyO(n)keystobemanagedDisadvantageslowdatathroughputmuchlargerkeysizes2023/10/610DigitalsignaturesNomenclatureM:messagesS:signaturesSA:signingtransformationforAVA:verificationtransformationforADefinitionSAandVAprovideadigitalsignaturescheme(ormechanism)forA.2023/10/611AuthenticationEntityauthentication(Identification)corroborationoftheidentityofanentity(e.g.,aperson,acomputerterminal,acreditcard,etc.).Messageauthentication(Dataoriginauthentication)corroboratingthesourceofinformation2023/10/612Summaryofcomparisonpublic-keycryptographysignatures(particularly,non-repudiation)andkeymanagementsymmetric-keycryptographyencryptionandsomedataintegrityapplicationsKeysizesPrivatekeysmustbelarger(e.g.,1024bitsforRSA)thansecretkeys(e.g.,64or128bits)mostattackonsymmetric-keysystemsisanexhaustivekeysearchpublic-keysystemsaresubjectto“short-cut”attacks(e.g.,factoring)2023/10/613ProtocolsandmechanismsCryptographicalgorithmwell-definedtransformation,whichonagiveninputvalueproducesanoutputvalue,achievingcertainsecurityobjectives.CryptographicprotocoldistributedalgorithmdefinedbyasequenceofstepspreciselyspecifyingtheactionsrequiredoftwoormoreentitiesCryptographicmechanismmoregeneraltermencompassingprotocols,algorithms,andnon-cryptographictechniques2023/10/614KeyestablishmentandmanagementKeyestablishmentprocesstoestablishasharedsecretkeyavailabletotwoormorepartiessubdividedintokeyagreementandkeytransport.Keymanagementthesetofprocessesandmechanismswhichsupportkeyestablishmentandthemaintenanceofongoingkeyingrelationshipsbetweenparties2023/10/615Keymanagementthroughsymmetric-keytech.Advantageseasytoaddandremoveentitiesneedstostoreonlyonelong-termsecretkey.DisadvantagesinitialinteractionwiththeTTP.nlong-termsecretkeysmaintainedbyTTPTTPcanreadallmessages.IfTTPiscompromised,allcommunicationsareinsecure2023/10/616Keymanagementthroughpublic-keytech.AdvantagesNoTTPisrequiredduringkeyagreementorupdate.OnlynpublickeysneedtobestoredDisadvantagesActiveadversarycancompromisethekeymanagementscheme(e.g.man-in-the-middleattack)NeedTTP(e.g.,CA)tocertifythepublickeyofeachentity.2023/10/617Public-keycertificationAdvantagespreventsanactiveadversaryfromimpersonationTTPcannotmonitorcommunications.DisadvantagesIfthesigningkeyoftheTTPiscompromised,allcommunicationsbecomeinsecure.2023/10/618AttacksonencryptionschemesCiphertext-onlyattackdeducethedecryptionkeyorplaintextbyonlyobservingciphertext.Known-plaintextattackusingaquantityofplaintextandcorrespondingciphertext.Chosen-plaintextattackchoosesplaintextandisthengivencorrespondingciphertext.Adaptivechosen-plaintextattackchosen-plaintextattackwherethechoiceofplaintextmaydependontheciphertextreceivedfrompreviousrequests.Chosen-ciphertextattackselectstheciphertextandisthengiventhecorrespondingplaintext.Adaptivechosen-ciphertextattackchosen-ciphertextattackwherethechoiceofciphertextmaydependontheplaintextreceivedfrompreviousrequests.2023/10/619Attacksonprotocolsknown-keyattackusespreviouslyusedkeystodeterminenewkeysreplayattackrecordsacommunicationsessionandreplaysthatsessionimpersonationattackdeceivestheidentityofoneofthelegitimatepartiesdictionaryattackusingcodebookforwardsearchattackifmessagespaceissmallorpredictableinterleavingattackimpersonationorotherdeceptioninvolvingselectivecombinationofinformationfromparallelsessions2023/10/620OverviewBasicnotionsofcryptographic(security)protocolsProblemswithcryptographicprotocolsDesignprinciplesforcryptographicprotocolsAnalysisofcryptographicprotocols2023/10/621BasicNotions2023/10/622BasicNotions2023/10/623BasicNotions2023/10/624BasicNotions2023/10/625ASimpleProtocol(inDetail)2023/10/626ASimpleProtocol(inDetail)2023/10/627BasicNotions(ctd.)2023/10/628BasicNotions2023/10/629BasicNotions2023/10/630BasicNotions2023/10/631BasicNotions2023/10/632BasicNotions--ASimpleProtocol(ctd.)2023/10/633BasicNotions--ASimpleProtocol(ctd.)2023/10/634BasicNotions--ASimpleProtocol(ctd.)2023/10/635BasicNotions--ASimpleProtocol(ctd.)2023/10/636BasicNotions--ASimpleProtocol(ctd.)2023/10/637BasicNotions--ASimpleProtocol(ctd.)2023/10/638BasicNotions--ASimpleProtocol(ctd.)2023/10/639BasicNotions2023/10/640BasicNotions--ASimpleProtocol(ctd.)2023/10/641ASimpleProtocol(inDetail)2023/10/642ProblemswithProtocols2023/10/643ProblemswithProtocols2023/10/644ProblemswithProtocols2023/10/645ProblemswithProtocols2023/10/646ProblemswithProtocols2023/10/647ProblemswithProtocols2023/10/648ProblemswithProtocols2023/10/649ProblemswithProtocols2023/10/650ProblemswithProtocols2023/10/651ProblemswithProtocols2023/10/652ProblemswithProtocols2023/10/653ProblemswithProtocols2023/10/654ProblemswithProtocols2023/10/655ProblemswithProtocols2023/10/656ProblemswithProtocols2023/10/657ProblemswithProtocols2023/10/658ProblemswithProtocols2023/10/659PrinciplesforDesigningSecu

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论