版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
第6章
密码学与网络安全6主要内容1.密码学与安全服务2.密码体制的安全性3.古典密码的基本思想4.对称密码与公钥密码体制5.信息隐藏与数字水印1.密码学的基本概念及其在信息安全中的作用openchannelShannon‘sModelofaSecrecySystem
SymmetricorSecret-KeyCryptosystemsSamekeyusedforencryptionanddecryptionKeymustbekeptabsolutelysecretSamekeycanbeusedforseveralmessages,butshouldbechangedperiodically
securekeydistributionproblem!
EncryptionEK(P)=CplaintextP
DecryptionDK(C)=PciphertextplaintextPCkey
Kkey
Kdistributionofsecret-keyoversecurechannel明文:发送方将要发送的消息。密文:明文被变换成看似无意义的随机消息加密:上述变换过程;解密:上述变换过程逆过程,即由密文恢复出原明文的过程称为。加密算法:密码员对明文进行加密时所采用的一组规则。概念解密算法:接收者对密文解密时所采用的一组规则。密钥:加解密算法的操作通常都是在一组密钥控制下进行的,分别称为加密密钥和解密密钥。单钥或对称密码体制:传统密码体制所用的加密密钥和解密密钥相同,或实质上等同,即从一个易于得出另一个。双钥或非对称密码体制:若加密密钥和解密密钥不相同,从一个难于推出另一个。密钥是密码体制安全保密的关键,它的产生和管理是密码学中的重要研究课题。ClaudeShannon1916-2001
TheFatherofInformationTheoryInformationTheoryWorkedatMIT/BellLabs„TheMathematicalTheoryofCommunication“(1948)MaximumcapacityofanoisytransmissionchannelDefinitionofthe„binarydigit“(bit)asaunitofinformationDefinitionof„entropy“asameasureofinformationCryptographyModelofasecrecysystemDefinitionofperfectsecrecyBasicprinciplesof„confusion“and„diffusion“Cryptography
Cryptography
„Artandscienceof
keepingmessagessecure“
Cryptology
Cryptanalysis
„Artandscienceof
breakingciphertext“cryptographyCryptographyisthestudyofmathematicaltechniquesrelatedtoaspectsofinformationsecurityCryptographicgoalsConfidentialityDataintegrityAuthenticationNon-repudiation密码学的一般研究内容ArbitrarylengthhashfunctionsOne-waypermutationsRandomsequencesSymmetric-keyciphersArbitrarylengthhashfunctions(MACs)SignaturesPseudorandomsequencesIdentificationprimitivesPublic-keyciphersSignaturesIdentificationprimitivesUnkeyedPrimitivesSymmetric-keyPrimitivesPublic-keyPrimitivesSecurityPrimitivesBlockciphersStreamciphersCryptographicalBuildingBlocksBlock
CiphersStream
CiphersSymmetricKey
CryptographyAuthenticationPrivacyEncryptionHash
FunctionsChallenge
ResponseIVsMACs
MICsMessage
DigestsNoncesPseudo
RandomRandom
SourcesSecretKeysSmart
CardsDH
RSAPublicKey
CryptographyElliptic
CurvesDigitalSignaturesData
IntegritySecureNetworkProtocolsNon-RepudiationSecureNetworkProtocolsfortheOSIStackApplicationlayerssh,S/MIME,PGP,KerberosTransportlayerSSL,TLS,WTLSNetworklayerIPsecDataLinklayerCHAP,PPTP,L2TP,WEP(WLAN)PhysicallayerFrequencyHopping,
QuantumCryptographyCommunicationlayersSecurityprotocols2密码体制的安全性HowtoconstructaSecureCipher?WorldWarIIGermanEnigmaMachineThomasJefferson‘sCipherWheel1010011101...Cryptanalysis-FundamentalAssumptionsAttackerknowseverydetailofthecryptographicalalgorithmAttackerisinpossessionofencryption/decryptionequipmentAttackerhasaccesstoanarbitrarynumberofplaintext/ciphertextpairsgeneratedwiththesame(unknown)key.Strongcipher:Bestattackshouldbebruteforcekeysearch!Thesecurityofaciphershouldrelyonthesecrecyofthekeyonly!AugusteKerckhoffs,„LaCryptographiemilitaire“,1883Cryptanalysis-TypesofAttacksCiphertext-OnlyAttackAttackerknowsciphertextofseveralmessagesencryptedwiththesamekeyand/orseveralkeysRecovertheplaintextofasmanymessagesaspossibleorevenbetterdeducethekey(orkeys)Known-PlaintextAttackKnownciphertext/plaintextpairofseveralmessagesDeducethekeyoranalgorithmtodecryptfurthermessagesChosen-PlaintextAttackAttackercanchoosetheplaintextthatgetsencryptedtherebypotentiallygettingmoreinformationaboutthekeyAdaptiveChosen-PlaintextAttackAttackercanchooseaseriesofplaintexts,basingthechoiceontheresultofpreviousencryption
differentialcryptanalysis!信息论计算复杂性理论现代密码体制中对安全的定义一般基于两种方法Information-theoreticsecurity:
absoluteuncomputability:ciphertextandplaintextarecompletelyindependent
fewmethodshavethisproperty
essence:keyandmessagehavethesamelength信息论方法Shannon‘sDefinitionofPerfectSecrecy
TheOne-TimePadmbitsofplaintextPwithentropyH(P)CompressionAlgorithmC(P)=Z
H(P)
k
mbitsof
compressedplaintextZkbitsofciphertextCOne-TimePadkbitsofrandomkeyK100110101001110110111101000111userandomkeysequenceonlyonceandthendiscardit!计算复杂性方法Complexity-theoreticsecurity(ourfocus):
conditionalintractabilityduetoourlimitation:cypher-textandplaintextarerelated
extensivelyresearchedandwidelyapplied
essence:two“grandassumptions"Duetolimitationsinourcomputationalability,intractabilitiesformoderncryptographyarebasedontwo“grandassumptions"
Computational:Thereareone-wayfunctionswhichcannotbeinvertedusingourcomputers
Decisional:Therearefunctionstogeneratepseudo-randomnumberswhichareindistinguishablefromtruerandomnumbersusingourcomputersTwo“GrandAssumptions"forComplexity-theoreticbasedSecurity单向函数单向函数对于x
X,函数值f(x)容易计算已知f(x)=y,求相应的x
X在计算上不可行陷门单向函数给出陷门信息,可以求得满足f(x)=y的x
X例:离散对数可认为离散对数的计算是单项的y=gxmodp给定
g,x,p,计算
y容易给定
g,y,p,计算
x(离散对数)困难与分解大整数类似(RSA)时间复杂度:O(e((lnp)1/3ln(lnp))2/3)3古典密码的基本思想Shannon‘sPrincipleConfusionDiffusion
ABCDEFGHIJKLMNOPQRSTUVWXYZDEFGHIJKLMNOPQRSTUVWXYZABCSubstitutionTable-Caesar‘sCipherShannon‘sPrincipleofConfusion
CaesarMonoalphabeticSubstitutionCipherMESSAGEFROMMARYSTUARTKILLTHEQUEENPHVVDJHIURPPDUBVWXDUWNLOOWKHTXHHQPHVVDJPHVVDPHVVPHPkey=3cyclicshiftsABCDEFGHIJKLMNOPQRSTUVWXYZEYUOBMDXVTHIJPRCNAKQLSGZFWGeneralSubstitutionTable26!possiblekeysJBKKEDBMARJJEAFKQLEAQHVIIQXBNLBBPA
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
ZplaintextalphabetA
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
BD
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
CE
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
DF
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
EG
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
FH
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
GI
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
HJ
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
IK
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
JL
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
KM
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
LN
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
NP
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
OQ
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
PR
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
QS
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
RT
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
SU
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
TV
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
UW
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
VX
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
WY
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
XZ
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
YHITWShannon‘sPrincipleofConfusion
VigenèrePolyalphabeticSubstitutionCipherEMESSAGEFROM...Keyword:WHITEMESSAGEFROM...WHITEWHITEWILALECLNKSIMESSAGEFROM...WHITEWHITEWMESSAGEFROM...WHITEWHITEWIMESSAGEFROM...WHITEWHITEWILMESSAGEFROM...WHITEWHITEWILAMESSAGEFROM...WHITEWHITEWILALMESSAGEFROM...WHITEWHITEWILALEMESSAGEFROM...WHITEWHITEWILALECMESSAGEFROM...WHITEWHITEWILALECLMESSAGEFROM...WHITEWHITEWILALECLNMESSAGEFROM...WHITEWHITEWILALECLNKMESSAGEFROM...WHITEWHITEWILALECLNKSVigenèresquare491753286Extendedkey:
orderofcolumns9!=362‘880keysShannon‘sPrincipleofDiffusion
TranspositionCipherMESSAGEFROMMARYSTUARTKILLTHEQUEENMESSAGE
FROM
MARY
STUART
THE
KILL
QUEENPlaintextinCiphertextoutMOAEEMRQMOAEMOAEEMRQSMTUMOAEEMRQSMTUSAKEMOAEEMRQSMTUSAKEARIE
RUHMOAEEMRQSMTUSAKEARIEGYLNMOAEEMRQSMTUSAKEARIEGYLNESL
FTTDiffusionmeanspermutationofbitorbytepositions!123456789Key=9columnsSMTUESLGYLNMOAEARIERUHSAKEFTTEMRQMostCryptoanalyticAttacksbaseonthe
RedundancyofNaturalLanguageTextsE26T18A16O16N14I13R13S12H12highfrequencygroupD8L7U6C6M6mediumfrequencygroupP4F4Y4W3G3B3V2lowfrequencygroupJ1K1X1½QZ½raregroupFrequencytableof200EnglishlettersGeorgesPerec,„Ladisparition“,1969
Bookof280pageswithoutasinglelettere
...AntonVoyln'arrivaitpasàdormir.Ilalluma.SonJazmarquaitminuitvingt.Ilpoussaunprofondsoupir,s'assitdanssonlit,s'appuyantsursonpolochon.
Ilpritunroman,ill'ouvrit,illut;maisiln'ysaisitqu'unimbroglioconfus,
ilbutaitàtoutinstantsurunmotdontilignoraitlasignification.Ilabandonnasonromansursonlit.Ilallaàsonlavabo;ilmouillaungantqu'ilpassasursonfront,sursoncou.Sonpoulsbattaittropfort.Ilavaitchaud...Excerptfrom„Ladisparition“©EditionsDenöel2024/5/31EntropyoftheEnglishLanguageSinglecharacterstatisticsEntropyH=4bits/characterWrittenEnglishtakingintoaccountthefullcontextShannon(1950): EntropyH=0.6...1.3bits/characterSimulations(1999): EntropyH=1.1bits/characterWhatabouttheentropyofCsourcecode?
for(c=0;c<256;c++){
i2=(key_data_ptr[i1]+state[c]+i2)%256;
swap_byte(&state[c],&state[i2]);
i1=(i1+1)%key_data_len;
}CompressionbeforeencryptionincreasessecurityGooddatacompressionalgorithms(e.g.Lempel-Ziv)
removeallredundancyandcomeveryclosetotheentropyoftheplaintext.
4.对称密码与公钥密码体制
对称加密技术加密明文密文明文解密对称密钥SymmetricKeyCryptosystems
StreamCiphersPseudo-RandomSequenceGeneratorPlaintextBitstreamCiphertextBitstreamKey11111111000000…10011010110100…01100101110100…PlaintextStreamPseudo-RandomStreamCiphertextStreamStreamCiphers
LinearFeedbackShiftRegisters(LFSRs)Maximumpossiblesequencelengthis2n-1withnregistersLFSRsareoftenusedasbuildingblocksforstreamciphersGSMA5isacipherwith3LFSRsoflengths19,22,and23Key11010LoadKeyR0R1R2Rn-2Rn-1SymmetricKeyCryptosystems
BlockCiphersciphertextblocksnbitsnbitsplaintextblocksnbitsnbitsCommonBlockSizes:
n=64,128,256bitsCommonKeySizes:
k=40,56,
64,80,128,
168,192,256bitskbitsKeyBlockCiphernbitsBlockCipherModes
ElectronicCodeBookMode(ECB)P1P2P3C1EDP1C1EC3C3DP3SenderReceiverEC2DP2C2SomePopularBlockCiphersBlockSizeNameofAlgorithmKeySizeDES(DataEncryptionStandard,IBM)64563DES(TripleDES)64168IDEA(Lai/Massey,ETHZürich)64128RC2(RonRivest,RSA)6440...1024CAST(Canada)64128Blowfish(BruceSchneier)64128...448Skipjack(NSA,clipperchip,wasclassified)6480RC5(RonRivest,RSA)64...25664...256DataEncryptionStandard(DES)
RoundsofConfusionandDiffusionInitialPermutationStripParity(56bits)Key(64bits)Round1Round2Round16ReversePermutationPlaintextBlock(64bits)CiphertextBlock(64bits)OneRoundofDESExpansionPermutation48P-BoxPermutationS-BoxSubstitution32ShiftShift48Compression
PermutationFeistelNetwork563232Keyi-1Ri-1Li-1KeyiRiLi323256对称密钥密码体制优点加密速度快密钥相对短(64、128或156比特)易于硬件或其他机械装置实现缺点初始化困难需要用户双方保守秘密n个用户需要管理O(n2)密钥更新周期短对称密码体制Sharingsecretkeys初始化比较困难:在加密消息之前需要通过安全信道或直接联系A与B通信完成后,要与C通信,需要重新生成对称密钥彼此双方需要绝对信任,A与B通信那么A要相信B不会把密钥脚给C。DESTripleDES、RC5、RC6、AES在通信之前需要双方协商共享密钥Fig.公钥加密技术加密明文密文明文解密公钥私钥公钥密码学的历史(一)76年Diffie和Hellman发表了“密码学的新方向”,奠定了公钥密码学的基础公钥技术是二十世纪最伟大的思想之一改变了密钥分发的方式可以广泛用于数字签名和身份认证服务78年,RSA算法公钥密码学的历史(二)McEliece,1978,基于代数编码Rabin,1979,等价于大整数分解ElGamal,1985,基于离散对数Ellipticcurves,1985,基于椭圆曲线点的离散对数NTRU,1996,基于格问题LUC
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年度版权维权合同2篇
- 2024年度花店绿植租赁合同3篇
- 居间工程设计2024年度合作协议5篇
- 《小儿支气管肺炎》课件
- 《手卫生规范管理》课件
- 2024电子商务平台知识产权保护合同2篇
- 2024版库房货物保管服务承包协议3篇
- 2024年度建筑工程质量保修检测合同3篇
- 工厂代加工的合同
- 《天狼指标功能介绍》课件
- TDACS 001.1-2024 现代奶业评价 奶牛场定级与评价
- 四年级劳动教育《我是小小志愿者》教学设计
- 石油钻采设备采购与供应链管理考核试卷
- 2023八年级语文上册 第三单元 名著导读《红星照耀中国》纪实作品的阅读配套教案 新人教版
- 2024-2030年中国应急柴油发电机行业市场发展趋势与前景展望战略分析报告
- 工业产品质量安全日管控、周排查、月调度工作制度
- 上海2024年上海工程技术大学招聘笔试历年典型考题及考点附答案解析
- 偏差行为、卓越一生3.0版
- 山东省青岛市(2024年)小学语文部编版竞赛(复习)完整试卷(含答案)
- 小班建构指南领域目标
- 大学会计生涯发展展示
评论
0/150
提交评论