信息安全基础2(密码编码学与网络安全)

上传人:自*** 文档编号:26054898 上传时间:2017-12-22 格式:PPT 页数:181 大小:4.05MB
返回 下载 相关 举报
信息安全基础2(密码编码学与网络安全)_第1页
第1页 / 共181页
信息安全基础2(密码编码学与网络安全)_第2页
第2页 / 共181页
信息安全基础2(密码编码学与网络安全)_第3页
第3页 / 共181页
信息安全基础2(密码编码学与网络安全)_第4页
第4页 / 共181页
信息安全基础2(密码编码学与网络安全)_第5页
第5页 / 共181页
点击查看更多>>
资源描述

《信息安全基础2(密码编码学与网络安全)》由会员分享,可在线阅读,更多相关《信息安全基础2(密码编码学与网络安全)(181页珍藏版)》请在金锄头文库上搜索。

1、Chapter 2 Cryptography,2012,Foundation of Information Security,1,2,3,4,Overview,Overview of Cryptography,Classical Ciphers,Block Ciphers,5,6,1 Overview of Cryptography,1.1 History of Cryptography,1.2 Cryptosystem,1.3 Cryptanalysis,1.4 Cryptography,Before 1949 Classical Encryption古典加密 Before computer

2、 was invented, cryptography was art more than science. There were some cipher algorithms, encryption machines & simple cryptanalysis密码分析 ways. The main encryption objects are alphabet character. The security of data is based on the secrecy of algorithms.,1.1 History of Cryptography密码学历史,The Phaistos

3、 (1700 BC),Encryption Machines in Early 20th Century,19491976 Shannon published “The Communication Theory of Secret Systems” in 1949, which indicated cryptography became a formal subject. The development of computer enabled ciphers on complex computing. The security of data is based on the secrecy o

4、f secret key instead of cipher algorithm.,History of Cryptography (cont d),After 1976 Diffie & Hellman published “New Directions in Cryptography” in 1976, in which put forward asymmetric cryptography不对称密码体制. Rivest, Shamir & Adleman bring forward RSA public key algorithm. Public key cryptography ena

5、bles secret communication without key transmission between sender & receiver which is well fit for digital signature 数字签名.,History of Cryptography (cont d),Diffie & Hellman published “New Directions in Cryptography” in 1976Government of the United States enacted 颁布“Data Encryption Standard”-DES in 1

6、977Government of the United States enacted new encryption standard-EES in 1993Doctor from the Bell Lab broke EES in 1995DES was broken in 1997Government of the United States recruited 征集 new standard for computer encryption-AES all over the world in 1997AES was enacted in 2001 after strict selection

7、,Memorabilia大事记 of Modern Cryptography,Hypothesize that attacker knows the cipher algorithm usedSecurity of a cryptosystem should rely on the secrecy of the key instead of the cipher algorithmAs a result, the design of cryptosystem should follow the public principle,Kerckhoffs Principle (1883),Defin

8、ition Cryptography密码编制学 study of encryption principles/methods Cryptanalysis密码分析学 study of principles/ methods of deciphering ciphertext密文 without knowing key Cryptology密码学 the field of both cryptography and cryptanalysisPrinciple Camouflaging伪装 message, preventing unauthorized user from knowing wha

9、t it means,1.2 Cryptosystem密码体制,Plaintext(Message)明文 - the original message Ciphertext密文 - the coded message Key密钥 - info used in encryption & decryption, known only to sender/receiver, which should be kept secret K=Encipher加密算法 (encrypt) - converting plaintext to ciphertext CE(M,Ke)Decipher解密算法 (de

10、crypt) - recovering plaintext from ciphertext MD(C,Kd),Component of Cryptosystem,Two requirements for secure use of symmetric encryption对称加密:- a strong encryption algorithm- a secret key known only to sender / receiverAssume encryption algorithm is knownExist a secure channel to distribute key,Requi

11、rements,CiphertextC xlcm,CiphertextC xlcm,cryptanalyst,Source,Destination,encryption key,decryptionkey,Plaintext M love,secure channel,Ke,Kd,Key,Encryption,PlaintextMlove,channel,Decryption,Contents of keep secret - Restricted algorithm: secrecy of algorithmClassical Cipher - Key-based algorithm: se

12、crecy of keyModern CipherNumber of keys used- Hash functions: no key- Secret key cryptography: one key (Symmetric Cipher对称密码/ Conventional Cipher传统密码/ Single-Key Cipher单钥密码)- Public key cryptography: two keys - public, private (Asymmetric Cipher非对称密码/ Public-Key Cipher公钥密码/ Two-Key Cipher双钥密码)Way in

13、 which plaintext is processed- Block分组密码: process input & output as block- Stream流密码/序列密码: process input & output as bit or character,Classification of Cryptography,Symmetric Cipher Ke=KdAsymmetric CipherKeKd Ke KdSo, make Ke public, keep Kd secret,Symmetric Cipher & Asymmetric Cipher,Conventional C

14、ipher- Block CipherDES IDEA EES AES - Stream CipherRC4Public Key Cipher - RSA ElGamal ECC,Examples of Modern Cipher Type,Advantages of Conventional Cipher- speedy for encryption & decryptionDisadvantages of Conventional Cipher - hard to distribute & manage key, realize digital signatureAdvantages of

15、 Public Key Cipher - easy to distribute & manage key, realize digital signatureDisadvantages of Public Key Cipher - hard to generate key, slow for encryption & decryption,Advantages & Disadvantages,Definition The process of attempting to discover M or K or both is known as cryptanalysis.Brute Force

16、Attack 暴力破解攻击(穷举攻击)Statistics Analyse Attack 统计分析攻击Mathematics Analyse Attack 数学分析攻击,1.3 Cryptanalysis,Decrypt ciphertext by trying every possible key according to the length of key space, until getting possible right plaintextCan break any cryptosystem by theoryOn average, half of all possible keys must be tried to achieve success,

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号