版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
1、2013年4月19日計算機安全技術(shù)與實踐 分組密碼其他內(nèi)容雙重DES,總密鑰量 2112 bit 加 密 解 密DESDESDES-1DES-1雙重DES,絕對不是一個DES 加 密 解 密DESDESDES-1DES-1CK3DES中間相遇攻擊,恢復(fù)密鑰DESDESPC?(P,C)是一個明密文對中間相遇攻擊,原理DESPC11DESP1C1DESPC22DESP12DESPC256256DESP256256CCC2 =P256K1=1K2=256DESPC11DESPC22DESPC256256DESP256256C 記錄查記錄中間相遇攻擊,總計算量 256 bit中間相遇攻擊,結(jié)果DESD
2、ESPC2256三重DES(雙密鑰) 加 密 解 密DESDESDES-1DES-1DESDES-1三重DES(三重密鑰) 加 密 解 密DESDESDES-1DES-1DESDES-1K3K3分組密碼工作模式1:ECB時刻 1 時刻 2 時刻 N加密解密加密加密加密解密解密解密ECB的弱點:相同的明文片段得到相同的密文片段原始文件ECB模式加密后的文件資料來源:/en-us/magazine/cc163522.aspx,轉(zhuǎn)載請注明分組密碼工作模式2:CBC時刻 1 時刻 2 時刻 N加密加密加密解密解密解密加密解密CBC模式加密的優(yōu)點原始文件CBC模式加密后的文件資料來源:/en-us/ma
3、gazine/cc163522.aspx,轉(zhuǎn)載請注明CBC模式的弱點IV必須為收發(fā)雙方共享IV必須受到保護分組密碼工作模式3:CFB分組密碼工作模式4:OFB密文有一位取反,則解密后的明文這位也取反,即抗篡改能力弱分組密碼工作模式5:CTR明文不滿一個字,則丟尾巴不用填充可并行可與計算可隨機訪問可證明安全加解密相似工作模式反饋特征CBCCFBOFBCRT存儲加密的特征和要求 攻擊者可隨意獲取密文 明文密文的大小一樣 分組單位互相獨立,可單獨訪問 加密以16字節(jié)的分組為單位 除數(shù)據(jù)分組外,無其他元數(shù)據(jù) 不同地方的相同明文加密后得到不同密文,但再次寫到相同位置時總是相同密文 由一個同標準相容的設(shè)備
4、加密數(shù)據(jù)面向存儲設(shè)備的XTS-AESXTS-AESCryptography and Network SecurityChapter 7Fifth Editionby William StallingsLecture slides by Lawrie Brown22Chapter 7 Stream Ciphers and Random Number GenerationThe comparatively late rise of the theory of probability shows how hard it is to grasp, and the many paradoxes show
5、 clearly that we, as humans, lack a well grounded intuition in this matter. In probability theory there is a great deal of art in setting up the model, in solving the problem, and in applying the results back to the real world actions that will follow. The Art of Probability, Richard Hamming23Random
6、 Numbersmany uses of random numbers in cryptography nonces in authentication protocols to prevent replaysession keyspublic key generationkeystream for a one-time padin all cases its critical that these values be statistically random, uniform distribution, independentunpredictability of future values
7、 from previous valuestrue random numbers provide thiscare needed with generated random numbers24Pseudorandom Number Generators (PRNGs)often use deterministic algorithmic techniques to create “random numbers”although are not truly randomcan pass many tests of “randomness”known as “pseudorandom number
8、s”created by “Pseudorandom Number Generators (PRNGs)”25Random & Pseudorandom Number Generators26PRNG Requirementsrandomnessuniformity, scalability, consistencyunpredictabilityforward & backward unpredictabilityuse same tests to checkcharacteristics of the seedsecureif known adversary can determine o
9、utputso must be random or pseudorandom number27Linear CongruentialGeneratorcommon iterative technique using:Xn+1 = (aXn + c) mod mgiven suitable values of parameters can produce a long random-like sequencesuitable criteria to have are:function generates a full-periodgenerated sequence should appear
10、randomefficient implementation with 32-bit arithmeticnote that an attacker can reconstruct sequence given a small number of valueshave possibilities for making this harder28Blum Blum Shub Generatorbased on public key algorithmsuse least significant bit from iterative equation:xi = xi-12 mod n where
11、n=p.q, and primes p,q=3 mod 4unpredictable, passes next-bit testsecurity rests on difficulty of factoring N is unpredictable given any run of bits slow, since very large numbers must be usedtoo slow for cipher use, good for key generation 29Using Block Ciphers as PRNGsfor cryptographic applications,
12、 can use a block cipher to generate random numbersoften for creating session keys from master keyCTRXi = EKViOFBXi = EKXi-130ANSI X9.17 PRG31Stream Ciphersprocess message bit by bit (as a stream) have a pseudo random keystreamcombined (XOR) with plaintext bit by bit randomness of stream key complete
13、ly destroys statistically properties in message Ci = Mi XOR StreamKeyi but must never reuse stream keyotherwise can recover messages (cf book cipher)32Stream Cipher Structure33Stream Cipher Propertiessome design considerations are:long period with no repetitions statistically random depends on large
14、 enough keylarge linear complexityproperly designed, can be as secure as a block cipher with same size keybut usually simpler & faster34RC4a proprietary cipher owned by RSA DSI another Ron Rivest design, simple but effectivevariable key size, byte-oriented stream cipher widely used (web SSL/TLS, wir
15、eless WEP/WPA) key forms random permutation of all 8-bit values uses that permutation to scramble input info processed a byte at a time 35RC4 Key Schedule starts with an array S of numbers: 0.255 use key to well and truly shuffle S forms internal state of the cipher for i = 0 to 255 doSi = iTi = Ki
16、mod keylen)j = 0for i = 0 to 255 do j = (j + Si + Ti) (mod 256) swap (Si, Sj)36RC4 Encryptionencryption continues shuffling array valuessum of shuffled pair selects stream key value from permutationXOR St with next byte of message to en/decrypti = j = 0 for each message byte Mii = (i + 1) (mod 256)j
17、 = (j + Si) (mod 256)swap(Si, Sj)t = (Si + Sj) (mod 256) Ci = Mi XOR St37RC4 Overview38RC4 Securityclaimed secure against known attackshave some analyses, none practical result is very non-linear since RC4 is a stream cipher, must never reuse a key have a concern with WEP, but due to key handling ra
18、ther than RC4 itself 39Natural Random Noisebest source is natural randomness in real world find a regular but random event and monitor do generally need special h/w to do this eg. radiation counters, radio noise, audio noise, thermal noise in diodes, leaky capacitors, mercury discharge tubes etc starting to see such h/w in new CPUs problems of bias or une
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年度模特時尚產(chǎn)業(yè)模特聘用合同-@-12
- 二零二五年度出租車公司股權(quán)轉(zhuǎn)讓與綠色出行推廣協(xié)議4篇
- 上海車位購買協(xié)議范本(2024版)版B版
- 二零二五版廢舊設(shè)備買賣及環(huán)境評估協(xié)議3篇
- 二零二五年度食堂承包與營養(yǎng)搭配服務(wù)合同3篇
- 2025年生物科技企業(yè)部分股權(quán)增資擴股合同3篇
- 2025年鮮羊奶行業(yè)新型經(jīng)銷商合作模式合同范本3篇
- 二零二五年度原創(chuàng)動漫角色形象知識產(chǎn)權(quán)歸屬協(xié)議下載2篇
- 二零二五年空壓機設(shè)備銷售與安裝驗收合同2篇
- 2025年度高速公路服務(wù)區(qū)智能停車場車位租用合同范本
- 青島版二年級下冊三位數(shù)加減三位數(shù)豎式計算題200道及答案
- GB/T 12723-2024單位產(chǎn)品能源消耗限額編制通則
- GB/T 16288-2024塑料制品的標志
- 麻風(fēng)病防治知識課件
- 干部職級晉升積分制管理辦法
- TSG ZF003-2011《爆破片裝置安全技術(shù)監(jiān)察規(guī)程》
- 2024年代理記賬工作總結(jié)6篇
- 電氣工程預(yù)算實例:清單與計價樣本
- VOC廢氣治理工程中電化學(xué)氧化技術(shù)的研究與應(yīng)用
- 煤礦機電設(shè)備培訓(xùn)課件
- 高考寫作指導(dǎo)議論文標準語段寫作課件32張
評論
0/150
提交評論