網(wǎng)絡(luò)安全導(dǎo)論 課件 第六章 密碼學(xué)與網(wǎng)絡(luò)安全_第1頁
網(wǎng)絡(luò)安全導(dǎo)論 課件 第六章 密碼學(xué)與網(wǎng)絡(luò)安全_第2頁
網(wǎng)絡(luò)安全導(dǎo)論 課件 第六章 密碼學(xué)與網(wǎng)絡(luò)安全_第3頁
網(wǎng)絡(luò)安全導(dǎo)論 課件 第六章 密碼學(xué)與網(wǎng)絡(luò)安全_第4頁
網(wǎng)絡(luò)安全導(dǎo)論 課件 第六章 密碼學(xué)與網(wǎng)絡(luò)安全_第5頁
已閱讀5頁,還剩54頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

第6章

密碼學(xué)與網(wǎng)絡(luò)安全6主要內(nèi)容1.密碼學(xué)與安全服務(wù)2.密碼體制的安全性3.古典密碼的基本思想4.對(duì)稱密碼與公鑰密碼體制5.信息隱藏與數(shù)字水印1.密碼學(xué)的基本概念及其在信息安全中的作用openchannelShannon‘sModelofaSecrecySystem

SymmetricorSecret-KeyCryptosystemsSamekeyusedforencryptionanddecryptionKeymustbekeptabsolutelysecretSamekeycanbeusedforseveralmessages,butshouldbechangedperiodically

securekeydistributionproblem!

EncryptionEK(P)=CplaintextP

DecryptionDK(C)=PciphertextplaintextPCkey

Kkey

Kdistributionofsecret-keyoversecurechannel明文:發(fā)送方將要發(fā)送的消息。密文:明文被變換成看似無意義的隨機(jī)消息加密:上述變換過程;解密:上述變換過程逆過程,即由密文恢復(fù)出原明文的過程稱為。加密算法:密碼員對(duì)明文進(jìn)行加密時(shí)所采用的一組規(guī)則。概念解密算法:接收者對(duì)密文解密時(shí)所采用的一組規(guī)則。密鑰:加解密算法的操作通常都是在一組密鑰控制下進(jìn)行的,分別稱為加密密鑰和解密密鑰。單鑰或?qū)ΨQ密碼體制:傳統(tǒng)密碼體制所用的加密密鑰和解密密鑰相同,或?qū)嵸|(zhì)上等同,即從一個(gè)易于得出另一個(gè)。雙鑰或非對(duì)稱密碼體制:若加密密鑰和解密密鑰不相同,從一個(gè)難于推出另一個(gè)。密鑰是密碼體制安全保密的關(guān)鍵,它的產(chǎn)生和管理是密碼學(xué)中的重要研究課題。ClaudeShannon1916-2001

TheFatherofInformationTheoryInformationTheoryWorkedatMIT/BellLabs?TheMathematicalTheoryofCommunication“(1948)MaximumcapacityofanoisytransmissionchannelDefinitionofthe?binarydigit“(bit)asaunitofinformationDefinitionof?entropy“asameasureofinformationCryptographyModelofasecrecysystemDefinitionofperfectsecrecyBasicprinciplesof?confusion“and?diffusion“Cryptography

Cryptography

?Artandscienceof

keepingmessagessecure“

Cryptology

Cryptanalysis

?Artandscienceof

breakingciphertext“cryptographyCryptographyisthestudyofmathematicaltechniquesrelatedtoaspectsofinformationsecurityCryptographicgoalsConfidentialityDataintegrityAuthenticationNon-repudiation密碼學(xué)的一般研究內(nèi)容ArbitrarylengthhashfunctionsOne-waypermutationsRandomsequencesSymmetric-keyciphersArbitrarylengthhashfunctions(MACs)SignaturesPseudorandomsequencesIdentificationprimitivesPublic-keyciphersSignaturesIdentificationprimitivesUnkeyedPrimitivesSymmetric-keyPrimitivesPublic-keyPrimitivesSecurityPrimitivesBlockciphersStreamciphersCryptographicalBuildingBlocksBlock

CiphersStream

CiphersSymmetricKey

CryptographyAuthenticationPrivacyEncryptionHash

FunctionsChallenge

ResponseIVsMACs

MICsMessage

DigestsNoncesPseudo

RandomRandom

SourcesSecretKeysSmart

CardsDH

RSAPublicKey

CryptographyElliptic

CurvesDigitalSignaturesData

IntegritySecureNetworkProtocolsNon-RepudiationSecureNetworkProtocolsfortheOSIStackApplicationlayerssh,S/MIME,PGP,KerberosTransportlayerSSL,TLS,WTLSNetworklayerIPsecDataLinklayerCHAP,PPTP,L2TP,WEP(WLAN)PhysicallayerFrequencyHopping,

QuantumCryptographyCommunicationlayersSecurityprotocols2密碼體制的安全性HowtoconstructaSecureCipher?WorldWarIIGermanEnigmaMachineThomasJefferson‘sCipherWheel1010011101...Cryptanalysis-FundamentalAssumptionsAttackerknowseverydetailofthecryptographicalalgorithmAttackerisinpossessionofencryption/decryptionequipmentAttackerhasaccesstoanarbitrarynumberofplaintext/ciphertextpairsgeneratedwiththesame(unknown)key.Strongcipher:Bestattackshouldbebruteforcekeysearch!Thesecurityofaciphershouldrelyonthesecrecyofthekeyonly!AugusteKerckhoffs,?LaCryptographiemilitaire“,1883Cryptanalysis-TypesofAttacksCiphertext-OnlyAttackAttackerknowsciphertextofseveralmessagesencryptedwiththesamekeyand/orseveralkeysRecovertheplaintextofasmanymessagesaspossibleorevenbetterdeducethekey(orkeys)Known-PlaintextAttackKnownciphertext/plaintextpairofseveralmessagesDeducethekeyoranalgorithmtodecryptfurthermessagesChosen-PlaintextAttackAttackercanchoosetheplaintextthatgetsencryptedtherebypotentiallygettingmoreinformationaboutthekeyAdaptiveChosen-PlaintextAttackAttackercanchooseaseriesofplaintexts,basingthechoiceontheresultofpreviousencryption

differentialcryptanalysis!信息論計(jì)算復(fù)雜性理論現(xiàn)代密碼體制中對(duì)安全的定義一般基于兩種方法Information-theoreticsecurity:

absoluteuncomputability:ciphertextandplaintextarecompletelyindependent

fewmethodshavethisproperty

essence:keyandmessagehavethesamelength信息論方法Shannon‘sDefinitionofPerfectSecrecy

TheOne-TimePadmbitsofplaintextPwithentropyH(P)CompressionAlgorithmC(P)=Z

H(P)

k

mbitsof

compressedplaintextZkbitsofciphertextCOne-TimePadkbitsofrandomkeyK100110101001110110111101000111userandomkeysequenceonlyonceandthendiscardit!計(jì)算復(fù)雜性方法Complexity-theoreticsecurity(ourfocus):

conditionalintractabilityduetoourlimitation:cypher-textandplaintextarerelated

extensivelyresearchedandwidelyapplied

essence:two“grandassumptions"Duetolimitationsinourcomputationalability,intractabilitiesformoderncryptographyarebasedontwo“grandassumptions"

Computational:Thereareone-wayfunctionswhichcannotbeinvertedusingourcomputers

Decisional:Therearefunctionstogeneratepseudo-randomnumberswhichareindistinguishablefromtruerandomnumbersusingourcomputersTwo“GrandAssumptions"forComplexity-theoreticbasedSecurity單向函數(shù)單向函數(shù)對(duì)于x

X,函數(shù)值f(x)容易計(jì)算已知f(x)=y,求相應(yīng)的x

X在計(jì)算上不可行陷門單向函數(shù)給出陷門信息,可以求得滿足f(x)=y的x

X例:離散對(duì)數(shù)可認(rèn)為離散對(duì)數(shù)的計(jì)算是單項(xiàng)的y=gxmodp給定

g,x,p,計(jì)算

y容易給定

g,y,p,計(jì)算

x(離散對(duì)數(shù))困難與分解大整數(shù)類似(RSA)時(shí)間復(fù)雜度:O(e((lnp)1/3ln(lnp))2/3)3古典密碼的基本思想Shannon‘sPrincipleConfusionDiffusion

ABCDEFGHIJKLMNOPQRSTUVWXYZDEFGHIJKLMNOPQRSTUVWXYZABCSubstitutionTable-Caesar‘sCipherShannon‘sPrincipleofConfusion

CaesarMonoalphabeticSubstitutionCipherMESSAGEFROMMARYSTUARTKILLTHEQUEENPHVVDJHIURPPDUBVWXDUWNLOOWKHTXHHQPHVVDJPHVVDPHVVPHPkey=3cyclicshiftsABCDEFGHIJKLMNOPQRSTUVWXYZEYUOBMDXVTHIJPRCNAKQLSGZFWGeneralSubstitutionTable26!possiblekeysJBKKEDBMARJJEAFKQLEAQHVIIQXBNLBBPA

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

ZplaintextalphabetA

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

BD

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

CE

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

DF

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

D

EG

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

D

E

FH

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

D

E

F

GI

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

D

E

F

G

HJ

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

D

E

F

G

H

IK

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

D

E

F

G

H

I

JL

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

D

E

F

G

H

I

J

KM

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

D

E

F

G

H

I

J

K

LN

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

NP

Q

R

S

T

U

V

W

X

Y

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

N

OQ

R

S

T

U

V

W

X

Y

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

PR

S

T

U

V

W

X

Y

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

QS

T

U

V

W

X

Y

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

RT

U

V

W

X

Y

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

SU

V

W

X

Y

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

TV

W

X

Y

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

UW

X

Y

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

VX

Y

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

WY

Z

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

XZ

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

YHITWShannon‘sPrincipleofConfusion

VigenèrePolyalphabeticSubstitutionCipherEMESSAGEFROM...Keyword:WHITEMESSAGEFROM...WHITEWHITEWILALECLNKSIMESSAGEFROM...WHITEWHITEWMESSAGEFROM...WHITEWHITEWIMESSAGEFROM...WHITEWHITEWILMESSAGEFROM...WHITEWHITEWILAMESSAGEFROM...WHITEWHITEWILALMESSAGEFROM...WHITEWHITEWILALEMESSAGEFROM...WHITEWHITEWILALECMESSAGEFROM...WHITEWHITEWILALECLMESSAGEFROM...WHITEWHITEWILALECLNMESSAGEFROM...WHITEWHITEWILALECLNKMESSAGEFROM...WHITEWHITEWILALECLNKSVigenèresquare491753286Extendedkey:

orderofcolumns9!=362‘880keysShannon‘sPrincipleofDiffusion

TranspositionCipherMESSAGEFROMMARYSTUARTKILLTHEQUEENMESSAGE

FROM

MARY

STUART

THE

KILL

QUEENPlaintextinCiphertextoutMOAEEMRQMOAEMOAEEMRQSMTUMOAEEMRQSMTUSAKEMOAEEMRQSMTUSAKEARIE

RUHMOAEEMRQSMTUSAKEARIEGYLNMOAEEMRQSMTUSAKEARIEGYLNESL

FTTDiffusionmeanspermutationofbitorbytepositions!123456789Key=9columnsSMTUESLGYLNMOAEARIERUHSAKEFTTEMRQMostCryptoanalyticAttacksbaseonthe

RedundancyofNaturalLanguageTextsE26T18A16O16N14I13R13S12H12highfrequencygroupD8L7U6C6M6mediumfrequencygroupP4F4Y4W3G3B3V2lowfrequencygroupJ1K1X1?QZ?raregroupFrequencytableof200EnglishlettersGeorgesPerec,?Ladisparition“,1969

Bookof280pageswithoutasinglelettere

...AntonVoyln'arrivaitpasàdormir.Ilalluma.SonJazmarquaitminuitvingt.Ilpoussaunprofondsoupir,s'assitdanssonlit,s'appuyantsursonpolochon.

Ilpritunroman,ill'ouvrit,illut;maisiln'ysaisitqu'unimbroglioconfus,

ilbutaitàtoutinstantsurunmotdontilignoraitlasignification.Ilabandonnasonromansursonlit.Ilallaàsonlavabo;ilmouillaungantqu'ilpassasursonfront,sursoncou.Sonpoulsbattaittropfort.Ilavaitchaud...Excerptfrom?Ladisparition“?EditionsDen?el2024/5/31EntropyoftheEnglishLanguageSinglecharacterstatisticsEntropyH=4bits/characterWrittenEnglishtakingintoaccountthefullcontextShannon(1950): EntropyH=0.6...1.3bits/characterSimulations(1999): EntropyH=1.1bits/characterWhatabouttheentropyofCsourcecode?

for(c=0;c<256;c++){

i2=(key_data_ptr[i1]+state[c]+i2)%256;

swap_byte(&state[c],&state[i2]);

i1=(i1+1)%key_data_len;

}CompressionbeforeencryptionincreasessecurityGooddatacompressionalgorithms(e.g.Lempel-Ziv)

removeallredundancyandcomeveryclosetotheentropyoftheplaintext.

4.對(duì)稱密碼與公鑰密碼體制

對(duì)稱加密技術(shù)加密明文密文明文解密對(duì)稱密鑰SymmetricKeyCryptosystems

StreamCiphersPseudo-RandomSequenceGeneratorPlaintextBitstreamCiphertextBitstreamKey11111111000000…10011010110100…01100101110100…PlaintextStreamPseudo-RandomStreamCiphertextStreamStreamCiphers

LinearFeedbackShiftRegisters(LFSRs)Maximumpossiblesequencelengthis2n-1withnregistersLFSRsareoftenusedasbuildingblocksforstreamciphersGSMA5isacipherwith3LFSRsoflengths19,22,and23Key11010LoadKeyR0R1R2Rn-2Rn-1SymmetricKeyCryptosystems

BlockCiphersciphertextblocksnbitsnbitsplaintextblocksnbitsnbitsCommonBlockSizes:

n=64,128,256bitsCommonKeySizes:

k=40,56,

64,80,128,

168,192,256bitskbitsKeyBlockCiphernbitsBlockCipherModes

ElectronicCodeBookMode(ECB)P1P2P3C1EDP1C1EC3C3DP3SenderReceiverEC2DP2C2SomePopularBlockCiphersBlockSizeNameofAlgorithmKeySizeDES(DataEncryptionStandard,IBM)64563DES(TripleDES)64168IDEA(Lai/Massey,ETHZürich)64128RC2(RonRivest,RSA)6440...1024CAST(Canada)64128Blowfish(BruceSchneier)64128...448Skipjack(NSA,clipperchip,wasclassified)6480RC5(RonRivest,RSA)64...25664...256DataEncryptionStandard(DES)

RoundsofConfusionandDiffusionInitialPermutationStripParity(56bits)Key(64bits)Round1Round2Round16ReversePermutationPlaintextBlock(64bits)CiphertextBlock(64bits)OneRoundofDESExpansionPermutation48P-BoxPermutationS-BoxSubstitution32ShiftShift48Compression

PermutationFeistelNetwork563232Keyi-1Ri-1Li-1KeyiRiLi323256對(duì)稱密鑰密碼體制優(yōu)點(diǎn)加密速度快密鑰相對(duì)短(64、128或156比特)易于硬件或其他機(jī)械裝置實(shí)現(xiàn)缺點(diǎn)初始化困難需要用戶雙方保守秘密n個(gè)用戶需要管理O(n2)密鑰更新周期短對(duì)稱密碼體制Sharingsecretkeys初始化比較困難:在加密消息之前需要通過安全信道或直接聯(lián)系A(chǔ)與B通信完成后,要與C通信,需要重新生成對(duì)稱密鑰彼此雙方需要絕對(duì)信任,A與B通信那么A要相信B不會(huì)把密鑰腳給C。DESTripleDES、RC5、RC6、AES在通信之前需要雙方協(xié)商共享密鑰Fig.公鑰加密技術(shù)加密明文密文明文解密公鑰私鑰公鑰密碼學(xué)的歷史(一)76年Diffie和Hellman發(fā)表了“密碼學(xué)的新方向”,奠定了公鑰密碼學(xué)的基礎(chǔ)公鑰技術(shù)是二十世紀(jì)最偉大的思想之一改變了密鑰分發(fā)的方式可以廣泛用于數(shù)字簽名和身份認(rèn)證服務(wù)78年,RSA算法公鑰密碼學(xué)的歷史(二)McEliece,1978,基于代數(shù)編碼Rabin,1979,等價(jià)于大整數(shù)分解ElGamal,1985,基于離散對(duì)數(shù)Ellipticcurves,1985,基于橢圓曲線點(diǎn)的離散對(duì)數(shù)NTRU,1996,基于格問題LUC

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論