信息安全重要導(dǎo)論_第1頁
信息安全重要導(dǎo)論_第2頁
信息安全重要導(dǎo)論_第3頁
信息安全重要導(dǎo)論_第4頁
信息安全重要導(dǎo)論_第5頁
已閱讀5頁,還剩40頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

1、信息安全重要導(dǎo)論密碼學(xué)原理及算法 page22022/7/202. 對稱密碼體系3. 公鑰密碼體系4. 密碼散列函數(shù)1. 概述1. 概述安全攻擊:Interruption 阻斷Interception 竊聽Modification 修改Fabrication 偽裝Active AttackPassive Attackpage32022/7/201. 概述安全服務(wù)Confidentiality (保密性)Availability (可用性)Nonrepudiation (防抵賴)Authentication (真實性)Integrity (完整性)Access Control (可控性)page

2、42022/7/201. 概述page52022/7/20Symmetric CryptographyAsymmetric CryptographyCryptographic Hash FunctionCryptography1. 概述page62022/7/20Cryptographic Hash FunctionAsymmetric CryptographySymmetric CryptographyGeneral idea of Symmetric-key cipher 對稱密碼PlaintextPlaintextCiphertextCiphertextDecryptionAlgorit

3、hmEncryptionAlgorithmSecure Key-exchange ChannelInsecure ChannelSharedSecret-KeySharedSecret-KeyAliceBobEncipherment(加密)1. 概述page72022/7/20Symmetric CryptographyCryptographic Hash FunctionAsymmetric CryptographyGeneral idea of Asymmetric-key cipherPlaintextPlaintextCiphertextCiphertextDecryptionAlgo

4、rithmEncryptionAlgorithmInsecure ChannelAliceBobAlicesPrivate-KeyAlicesPublic Key1Digital Signature數(shù)字簽名1. 概述page82022/7/20Symmetric CryptographyCryptographic Hash FunctionAsymmetric CryptographyGeneral idea of Asymmetric-key cipherPlaintextPlaintextCiphertextCiphertextEncryptionAlgorithmDecryptionAl

5、gorithmInsecure ChannelAliceBobAlicesPrivate-KeyAlicesPublic Key2Encipherment1. 概述page92022/7/20Symmetric CryptographyAsymmetric CryptographyCryptographic Hash FunctionGeneral idea of Hash Function for Message DigestOriginalMessageChecking integrity 完整性檢驗密碼學(xué)原理及算法 page102022/7/202. 對稱密碼體系3. 公鑰密碼體系4.

6、密碼散列函數(shù)1. 概述1. 概述page112022/7/20分組密碼流密碼秘鑰管理對稱密碼2. 對稱密碼2.1 分組密碼: 基本變換函數(shù)page122022/7/20S-BoxXORCircular ShiftSwapSplit / CombineP-BoxA P-box (置換盒) parallels the traditional transposition cipher for characters. It transposes (移動) bits. A straight(直接的) P-box is invertible(可逆的), but compression and expans

7、ion P-boxes are not.e.g.2. 對稱密碼2.1 分組密碼: 基本變換函數(shù)page132022/7/20P-BoxXORCircular ShiftSwapSplit / CombineS-BoxAn S-box (替換盒) can be thought of as a miniature(微小的) substitution cipher. An S-box is an m n substitution unit, where m and n are not necessarily the same.110 11010 012. 對稱密碼2.1 分組密碼: 基本變換函數(shù)pa

8、ge142022/7/20P-BoxS-BoxCircular ShiftSwapSplit / CombineXORThe exclusive-or operation is an important component in most block ciphers. XOR01001110+e.g.2. 對稱密碼2.1 分組密碼: 基本變換函數(shù)page152022/7/20P-BoxS-BoxXORSwapSplit / CombineCircular ShiftThe circular shift operation is another component found in some m

9、odern block ciphers. e.g.2. 對稱密碼2.1 分組密碼: 基本變換函數(shù)page162022/7/20P-BoxS-BoxXORCircular ShiftSplit / CombineSwapThe swap operation is a special case of the circular shift operation where k = n/2. e.g.EncryptionDecryption2. 對稱密碼2.1 分組密碼: 基本變換函數(shù)page172022/7/20P-BoxS-BoxXORCircular ShiftSwapSplit / Combin

10、eTwo other operations found in some block ciphers are split and combine. e.g.SplitCombineEncryptionDecryption2. 對稱密碼2.1 分組密碼: Feistel 密碼page182022/7/20Block sizeKey sizeNumber of roundsSubkey generationRound functionFast software E/DEase of analysis2. 對稱密碼2.1 分組密碼: DES(數(shù)據(jù)加密標(biāo)準(zhǔn))page192022/7/20DES64bit

11、 plaintext64bit ciphertextInitial permutationRound 1Round 2Round 16Final permutation.56bit keyK1K2K16Round-key generator2. 對稱密碼2.1 分組密碼: DES(數(shù)據(jù)加密標(biāo)準(zhǔn))page202022/7/20秘鑰擴展:生成16個輪秘鑰2. 對稱密碼2.1 分組密碼: DES(數(shù)據(jù)加密標(biāo)準(zhǔn))page212022/7/20多重加密(Multiple Encryption)Double DESC = EK2(EK1(P)M = DK1(DK2(P)meet in the middle

12、 attack:Triple DESTriple DES with 2 keysC=Ek1(Dk2(Ek1(P)P=Dk1(Ek2(Dk1(P)K1+K2: 112bitsTriple DES with 3 keysC=Ek3(Dk2(Ek1(P)P=Dk1(Ek2(Dk3(C)More secure than DES, but with more cost2. 對稱密碼2.1 分組密碼: AES(高級數(shù)據(jù)加密標(biāo)準(zhǔn))page222022/7/202. 對稱密碼2.1 分組密碼: AES(高級數(shù)據(jù)加密標(biāo)準(zhǔn))page232022/7/201) Byte Substitution2) Shift R

13、ows3) Mix Columns4) Add Round key2. 對稱密碼2.1 分組密碼: AES(高級數(shù)據(jù)加密標(biāo)準(zhǔn))page242022/7/20秘鑰擴展2. 對稱密碼2.1 分組密碼:加密模式對稱密碼算法的具體應(yīng)用機制增加安全性,如完整性可以將分組加密算法用作流加密page252022/7/202. 對稱密碼2.1 分組密碼:加密模式page262022/7/20CBCCFBOFBCTRECBThe electronic codebook (ECB) mode is the simplest mode of operation.Each block of plaintext is

14、encoded independently(獨立地) using the same key.2. 對稱密碼page272022/7/202.1 分組密碼:加密模式ECBCFBOFBCTRCBCTo transmit a lengthy message, we might employ the so called Cipher Block Chaining (CBC) mode;In this scheme, the input to the encryption algorithm is the XOR of the current plaintext block and the preced

15、ing ciphertext block; the same key is used for each block.To transmit a lengthy message, we might employ the so called Cipher Block Chaining (CBC) mode;In this scheme, the input to the encryption algorithm is the XOR of the current plaintext block and the preceding ciphertext block; the same key is

16、used for each block.2. 對稱密碼page282022/7/202.1 分組密碼:加密模式ECBCBCOFBCTRCFB2. 對稱密碼page292022/7/202.1 分組密碼:加密模式ECBCBCCFBCTROFBOutput Feedback Mode is Similar to CFB. Can you find the difference?2. 對稱密碼page302022/7/202.1 分組密碼:加密模式ECBCBCCFBOFBIn the counter (CTR) mode, there is no feedback. The pseudo-rando

17、mness(偽隨機) in the key stream is achieved using a counter. CTR2. 對稱密碼2.2 流密碼page312022/7/20Structure110011000110110010100000+plaintextkey streamciphertext2. 對稱密碼2.2 流密碼:RC4算法page322022/7/202. 對稱密碼2.2 流密碼:RC4算法page332022/7/202. 對稱密碼2.2 流密碼:RC4算法page342022/7/20Initialization Initialization is done in t

18、wo steps:Key Stream GenerationThe keys in the key stream are generated, one by one. 2. 對稱密碼2.3 秘鑰分配page352022/7/20Key Distribution Scenario: preconditions(前提) A wishes to establish a logical connection with BABKDC A requires a session key from KDC to protect the communication A share a master key wi

19、th KDC, B share with KDCSecret channelSecret channel2. 對稱密碼2.3 秘鑰分配:KDC Scenariopage362022/7/20AKDCAB12456密碼學(xué)原理及算法 page372022/7/202. 對稱密碼體系3. 公鑰密碼體系 4. 密碼散列函數(shù)1. 概述3. 公鑰密碼page382022/7/203.1 Diffie-Hellman Key Exchange Scheme3. 公鑰密碼3.1 Diffie-Hellman Key Exchange Schemepage392022/7/20 Global Public ElementsY:YP, Y是P的素數(shù)根P:素數(shù) For AliceSelected private: A, ( AP )Calculate public =YA mod

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論