版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
古典密码(1)-ClassicalEncryptionTechniques1教学视频、国家级一流在线课程链接:/course/FUDAN-12063578111.古典密码
1.1对称密钥密码模型
SymmetricCipherModel2要解决的问题:通信保密安全需求SecurityRequirements安全服务SecurityServices保密性Confidentiality完整性Integrity可用性Availability3三个古典密码系统羊皮传书藏头诗Caesar4羊皮传书古希腊的斯巴达人将一条1厘米宽、20厘米左右长的羊皮带,以螺旋状绕在一根特定粗细的木棍上…...5藏头诗明才子唐伯虎:我爱兰江水悠悠,爱晚亭上枫叶稠。秋月溶溶照佛寺,香烟袅袅绕经楼。明朝解缙祝某宰相寿辰进诗:真真宰相,老老元臣,乌纱戴顶,龟鹤遐林.粗看"密文”,浑然诗句,颂扬兼祝愿,福禄寿全有;细究则密语藏头,挖苦带讽刺,诅咒"真老乌龟”6CaesarCipherearliestknownsubstitutioncipherbyJuliusCaesar
firstattesteduseinmilitaryaffairsexample:meetmeafterthetogapartyPHHWPHDIWHUWKHWRJDSDUWB7Terminologiesplaintext-theoriginalmessageciphertext-thecodedmessagekey-infousedincipherknownonlytosender/receiverencipher(encrypt)-convertingplaintexttociphertextdecipher(decrypt)-recoveringplaintextfromciphertextcipher-algorithmfortransformingplaintexttociphertext8SymmetricCipherModel9DefinitionAcryptosystemisa5-tuple
(E,D,p,K,C),wherepisthesetofplaintexts,Kthesetofkeys,Cisthesetofciphertexts,E:M×KCisthesetofEncryptionalgorithms,D:C×KMisthesetofDecryptionalgorithms.101.古典密码
1.2密码学的基础假设11三个古典系统的再讨论Caesar羊皮传书藏头诗12CaesarCiphermeetmeafterthetogapartyPHHWPHDIWHUWKHWRJDSDUWBp,C,K,E,D?13CaesarCiphercandefinetransformationas:abcdefghijklmnopqrstuvwxyzDEFGHIJKLMNOPQRSTUVWXYZABCmathematicallygiveeachletteranumberabcdefghijklm0123456789101112nopqrstuvwxyZ13141516171819202122232425thenhaveCaesarcipheras:C=E(p)=(p+k)mod(26)p=D(C)=(C–k)mod(26)14羊皮传书E,D,p,C,K?15藏头诗真真宰相,老老元臣,乌纱戴顶,龟鹤遐林.E,D,p,C,K?全诗为"密文”,其"密钥”是每句诗的首字,可串接成义,作者的真意就隐藏在诗句的首字串接文("明文”)中.Steganography,隐写术16RethinkingoftheModel17encipherdecipher(plaintextin-ciphertextout)ciphertextmsg(ciphertextin-plaintextout)(shouldunderstand
nothing
aboutthemsg)eavesdropperbla-blacmb-cmbbla-blaSharedKeyNeed
keyexchangeAliceandBobwanttoestablishasharedsecret(key)whenotherpeople(eavesdroppers)arelisteningHowto?inboundVs.outbound18AliceBobDiscursionsontheModel19Q1:Whyuseakey?Q2:Whichpartsshouldbekeptsecret?whichnot?Discussion模型合理吗?什么当保密;什么当公开?19世纪荷兰人A.Kerckhoffs就提出了一个在密码学界被公认为基础的假设,也就是著名的“Kerckhoffs假设”:秘密必须全寓于密钥。
OtherModels?2021Discussion“谁是我们的敌人,谁是我们的朋友,这个问题是革命的首要问题”——毛选易用性秘密全部寓于密钥≠算法当公开,要看应用环境(商用,军用,……)开放的系统更安全,??Terminologies(cont.)cryptography-studyofencryptionprinciples/methodscryptanalysis(codebreaking)-thestudyofprinciples/methodsofdecipheringciphertextwithoutknowingkeycryptology-thefieldofbothcryptographyandcryptanalysis22CryptographyCatalogThetypeofoperationsusedfortransforming
plaintexttociphertextSubstitution:eachelementintheplaintextismappedintoanotherelementTransposition:elementsintheplaintextarerearrangedProduct:multiplestagesofsubstitutionsandtranspositionsThenumberofthekeysusedSymmetric,single-key,secret-key,conventional
encryption:BothsenderandreceiverusethesamekeyAsymmetric,two-key,orpublic-key
encryption:thesenderandreceiveeachusesadifferentkey23CryptographyCatalogThewayinwhichtheplaintextisprocessedBlock:processestheinputoneblockofelementsatatime,producinganoutput
block
foreachinputblockStream:processestheinputelementscontinuously,producingoutputoneelementatatime,asitgoesalong.242.如何设计好的密码算法?
攻击->防御->改进->更好的密码算法->攻击…螺旋式上升过程中领会密码设计的关键问题252.如何设计好的密码算法?
2.1
Caesar密码与单字母表密码
攻击->防御->改进->更好的密码算法->攻击…螺旋式上升过程中领会密码设计的关键问题26SubstitutionTechniquesCaesarcipherEasytobreak!27CryptanalysisofCaesarCipherThereareonly25keystotryAmapstoA,B,..Zcouldsimplytryeachinturnabruteforcesearch
givenciphertext,justtryallshiftsoflettersThelanguageofPlaintextisknownandeasilyrecognizabledoneedtorecognizewhenhaveplaintexteg.breakciphertext"GCUAVQDTGCM"28MonoalphabeticCipherImprovementonCaesarCipherRatherthansubstitutingaccordingtoaregularpattern–anylettercanbesubstitutedforanyotherletter,aslongaseachletterhasauniquesubstituteletter,andviceversa.29MonoalphabeticCipherK: Plain:abcdefghijklmnopqrstuvwxyz Cipher:DKVQFIBJWPESCXHTMYAUOLRGZNPlaintext:ifwewishtoreplacelettersCiphertext:WIRFRWAJUHYFTSDVFSFUUFYA
hencekeyis26letterslong30MonoalphabeticCipherSecuritynowhaveatotalof26!=4x1026keyswithsomanykeys,mightthinkissecure
butwouldbe!!!WRONG!!!
problemislanguagecharacteristics31LanguageRedundancyandCryptanalysishumanlanguagesareredundant
lettersarenotequally
commonlyusedinEnglisheisbyfarthemostcommonletter,thenT,R,N,I,O,A,S
somelettersarefairlyrare,eg.Z,J,X,Qtablesofsingle,double&tripleletterfrequencies32FrequencyofLettersinEnglishText33UseinCryptanalysiskeyconcept-monoalphabeticsubstitutionciphersdonotchangerelativeletterfrequencies
discoveredbyArabianscientistsin9thcenturycalculateletterfrequenciesforciphertextcomparecounts/plotsagainstknownvaluesifCaesarcipherlookforcommonpeaks/troughspeaksat:A-E-Itriple,NOpair,RSTtripletroughsat:JK,X-Zformonoalphabeticmustidentifyeachlettertablesofcommondouble/triplelettershelp34CryptanalyticAttacks35对于对手而言最坏情况下,仍有一种攻击方法可用BruteForceSearch,穷举法BruteForceSearchalwayspossibletosimply
try
everykey
mostbasic
attack,proportionaltokeysizeassumeeitherknoworrecogniseplaintext36MoreDefinitionsunconditionalsecurity
nomatterhowmuch
computerpowerisavailable,theciphercannotbebrokensincetheciphertextprovidesinsufficientinformationtouniquelydeterminethecorrespondingplaintextcomputationalsecurity
givenlimited
computingresources(eg.timeneededforcalculationsisgreaterthanageofuniverse),theciphercannotbebroken
Unconditionalsecuritywouldbenice,buttheonlyknownsuchcipheristheone-timepad(later).Forallreasonable
encryptionalgorithms,havetoassumecomputationalsecuritywhereiteithertakestoolong,oristooexpensive,tobother
breakingthecipher.372.如何设计好的密码算法?
2.2
Playfair密码
攻击->防御->改进->更好的密码算法->攻击…螺旋式上升过程中领会密码设计的关键问题38MonoalphabeticCipherSecuritynowhaveatotalof26!=4x1026keyswithsomanykeys,mightthinkissecure
butwouldbe!!!WRONG!!!
problemislanguagecharacteristics39提高单字母表密码安全性两个角度“多”对“一”
Playfair“一”对“多”
Vigenère40PlayfairCiphernoteventhelargenumberofkeysinamonoalphabeticcipherprovidessecurity
oneapproachtoimprovingsecuritywastoencryptmultiplelettersthePlayfairCipherisanexampleinventedbyCharlesWheatstonein1854,butnamedafterhisfriendBaronPlayfair
4142PlayfairKeyMatrixa5X5matrixoflettersbasedonakeywordfillinlettersofkeyword(sansduplicates)fillrestofmatrixwithotherletterseg.usingthekeywordMONARCHYMONARCHYBDEFGIKLPQSTUVWXZ43EncryptingandDecryptingplaintextencryptedtwolettersatatime:ifapairisarepeatedletter,insertafillerlike'X', eg."balloon"encryptsas"balxloon"ifbothlettersfallinthesame
row,replaceeachwithlettertoright(wrappingbacktostartfromend), eg.“ar"encryptsas"RM"ifbothlettersfallinthesame
column,replaceeachwiththeletterbelowit(againwrappingtotopfrombottom),eg.“mu"encryptsto"CM"otherwiseeachletterisreplacedbytheoneinitsrowinthecolumnof
theotherletterofthepair,eg.“hs"encryptsto"BP",and“ea"to"IM"or"JM"(asdesired)44SecurityofthePlayfairCiphersecuritymuchimproved
overmonoalphabeticsincehave26x26=676digramswouldneeda676entryfrequencytabletoanalyse(verses26foramonoalphabetic)andcorrespondinglymoreciphertextwaswidelyusedformanyyears(eg.US&BritishmilitaryinWW1)itcanbebroken,givenafewhundredletterssincestillhasmuchofplaintextstructure452.如何设计好的密码算法?
2.3
Vigenère密码
攻击->防御->改进->更好的密码算法->攻击…螺旋式上升过程中领会密码设计的关键问题46PolyalphabeticCiphersanotherapproachtoimprovingsecurityistousemultiplecipheralphabets
calledpolyalphabetic
substitution
ciphers
makescryptanalysisharderwithmorealphabetstoguessandflatterfrequencydistributionuseakeytoselectwhichalphabetisusedforeachletterofthemessageuseeachalphabetinturnrepeatfromstartafterendofkeyisreached47VigenèreCiphersimplestpolyalphabeticsubstitutioncipheristheVigenèreCipher
effectivelymultiplecaesarcipherskeyismultipleletterslongK=k1k2...kdithletterspecifiesithalphabettouseuseeachalphabetinturnrepeatfromstartafterdlettersinmessagedecryptionsimplyworksinreverse48VigenèreCipher49PlaintextKeyExamplewritetheplaintextoutwritethekeywordrepeatedaboveituseeachkeyletterasacaesarcipherkeyencryptthecorrespondingplaintextletteregusingkeyworddeceptiveKey:deceptivedeceptivedeceptivePlaintext:wearediscoveredsaveyourselfCiphertext:ZICVTWQNGRZGVTWAVZHCQYGLM
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年甲乙双方增强现实设备电脑采购合同
- 2024-2025学年桂林市永福县数学三上期末调研模拟试题含解析
- 办公场所的电力安全与防范措施
- 医疗背景下儿童音乐的情绪调节功能研究
- 2025中国铁塔社会招聘28人高频重点提升(共500题)附带答案详解
- 2025中国移动广东分公司校园招聘高频重点提升(共500题)附带答案详解
- 2025中国农业科学院北京畜牧兽医研究所奶产品质量与风险评估科技创新团队公开招聘高频重点提升(共500题)附带答案详解
- 2025中国一冶集团限公司交通工程公司招聘80人高频重点提升(共500题)附带答案详解
- 2025东方电气集团(成都)共享服务限公司招聘1名高频重点提升(共500题)附带答案详解
- 2025下半年贵州黔南三都水族自治县事业单位人才引进15人高频重点提升(共500题)附带答案详解
- 北京市海淀区2021-2022学年第一学期四年级期末考试语文试卷(含答案)
- 2024-2030年中国企业大学行业运作模式发展规划分析报告
- 电动力学-选择题填空题判断题和问答题2018
- 房地产激励培训
- 山东省济南市2023-2024学年高二上学期期末考试地理试题 附答案
- 【MOOC】微型计算机原理与接口技术-南京邮电大学 中国大学慕课MOOC答案
- 违章建筑举报范文
- “小城镇建设”论文(六篇)
- 人人爱设计学习通超星期末考试答案章节答案2024年
- 福建省厦门市翔安区2023-2024学年八年级上学期期末语文试题
- 模块一:外贸业务操作技能试题
评论
0/150
提交评论