华工密码学老师上课课件ch03 (5)

上传人:f****u 文档编号:116087737 上传时间:2019-11-15 格式:PDF 页数:40 大小:1.95MB
返回 下载 相关 举报
华工密码学老师上课课件ch03 (5)_第1页
第1页 / 共40页
华工密码学老师上课课件ch03 (5)_第2页
第2页 / 共40页
华工密码学老师上课课件ch03 (5)_第3页
第3页 / 共40页
华工密码学老师上课课件ch03 (5)_第4页
第4页 / 共40页
华工密码学老师上课课件ch03 (5)_第5页
第5页 / 共40页
点击查看更多>>
资源描述

《华工密码学老师上课课件ch03 (5)》由会员分享,可在线阅读,更多相关《华工密码学老师上课课件ch03 (5)(40页珍藏版)》请在金锄头文库上搜索。

1、Cryptography and Cryptography and Cryptography and Cryptography and Cryptography and Cryptography and Cryptography and Cryptography and Network SecurityNetwork SecurityNetwork SecurityNetwork SecurityNetwork SecurityNetwork SecurityNetwork SecurityNetwork Security Chapter Chapter Chapter Chapter Cha

2、pter Chapter Chapter Chapter 3 3 3 3 3 3 3 3 F Fif ifth Editionth Edition by William Stallingsby William Stallings - - Lecture slides by Lawrie BrownLecture slides by Lawrie Brown Zhang JingZhang Jing Chapter 3 Chapter 3 Chapter 3 Chapter 3 Chapter 3 Chapter 3 Chapter 3 Chapter 3 Block Ciphers and B

3、lock Ciphers and Block Ciphers and Block Ciphers and Block Ciphers and Block Ciphers and Block Ciphers and Block Ciphers and the Data Encryption the Data Encryption the Data Encryption the Data Encryption the Data Encryption the Data Encryption the Data Encryption the Data Encryption StandardStandar

4、dStandardStandardStandardStandardStandardStandard(DES)(DES)(DES)(DES)(DES)(DES)(DES)(DES) Modern Block CiphersModern Block CiphersModern Block CiphersModern Block CiphersModern Block CiphersModern Block CiphersModern Block CiphersModern Block Ciphers one of the most widely used types of one of the m

5、ost widely used types of cryptographic algorithms cryptographic algorithms provide secrecy /authentication servicesprovide secrecy /authentication services focus on DES (Data Encryption Standard)focus on DES (Data Encryption Standard) to illustrate block cipher design principlesto illustrate block c

6、ipher design principles Block vs Stream CiphersBlock vs Stream CiphersBlock vs Stream CiphersBlock vs Stream CiphersBlock vs Stream CiphersBlock vs Stream CiphersBlock vs Stream CiphersBlock vs Stream Ciphers block ciphers process messages in blocks, block ciphers process messages in blocks, each of

7、 which is then en/decrypted each of which is then en/decrypted like a substitution on very big characterslike a substitution on very big characters 64-bits or more 64-bits or more stream ciphers stream ciphers process messages a bit or process messages a bit or byte at a time when en/decryptingbyte

8、at a time when en/decrypting many current ciphers are block ciphersmany current ciphers are block ciphers broader range of applicationsbroader range of applications Block vs Stream CiphersBlock vs Stream CiphersBlock vs Stream CiphersBlock vs Stream CiphersBlock vs Stream CiphersBlock vs Stream Ciph

9、ersBlock vs Stream CiphersBlock vs Stream Ciphers Block Cipher PrinciplesBlock Cipher PrinciplesBlock Cipher PrinciplesBlock Cipher PrinciplesBlock Cipher PrinciplesBlock Cipher PrinciplesBlock Cipher PrinciplesBlock Cipher Principles most symmetric block ciphers are based on a most symmetric block

10、ciphers are based on a Feistel Cipher StructureFeistel Cipher StructureFeistel Cipher StructureFeistel Cipher StructureFeistel Cipher StructureFeistel Cipher StructureFeistel Cipher StructureFeistel Cipher Structure needed since must be able to needed since must be able to decryptdecryptdecryptdecry

11、ptdecryptdecryptdecryptdecrypt ciphertext ciphertext to recover messages efficientlyto recover messages efficiently block ciphers look like an extremely large block ciphers look like an extremely large substitution substitution would need table of 2would need table of 264 64 entries for a 64-bit blo

12、ck entries for a 64-bit block instead create from smaller building blocks instead create from smaller building blocks using idea of a product cipherusing idea of a product cipher Ideal Block CipherIdeal Block CipherIdeal Block CipherIdeal Block CipherIdeal Block CipherIdeal Block CipherIdeal Block C

13、ipherIdeal Block Cipher Claude Shannon and Substitution-Claude Shannon and Substitution-Claude Shannon and Substitution-Claude Shannon and Substitution-Claude Shannon and Substitution-Claude Shannon and Substitution-Claude Shannon and Substitution-Claude Shannon and Substitution- Permutation Ciphers

14、Permutation CiphersPermutation CiphersPermutation CiphersPermutation CiphersPermutation CiphersPermutation CiphersPermutation Ciphers Claude Shannon introduced idea of substitution-Claude Shannon introduced idea of substitution- permutation (S-P) networks in 1949 paperpermutation (S-P) networks in 1

15、949 paper form basis of modern block ciphers form basis of modern block ciphers S-P nets are based on the two primitive S-P nets are based on the two primitive cryptographic operations seen before: cryptographic operations seen before: substitutionsubstitution (S-box) (S-box) permutation permutation

16、 (P-box)(P-box) provide provide confusionconfusion ; ; ; ; ; ; ; R R R R R R R R i i i i i i i i = L = L = L = L = L = L = L = Li-1 i-1i-1i-1i-1i-1i-1i-1 F(RF(RF(RF(RF(RF(RF(RF(Ri-1 i-1i-1i-1i-1i-1i-1i-1,K ,K,K,K,K,K,K,K i i i i i i i i ) ) ) ) ) ) ) ) Feistel Cipher Design ElementsFeistel Cipher Design ElementsFeistel Cipher Design ElementsFeistel Cipher Design ElementsFeistel Cipher Desig

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 办公文档 > 其它办公文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号