




版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
Lecture12:Mid-termReviewSchoolofSoftwareEngineering,CQUFall,2021AnIntroductionto
InformationSecurity2
2025/4/2AnIntroductiontoInformationSecurityLecture1:PrefaceTheCategoriesofattacks:Generally,therearefourgeneralcategoriesofsecurityattacksInterruption阻斷Interception竊聽(tīng)Modification修改Fabrication偽裝1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesInformationsourceInformationdestinationAnassetofthesystemisdestroyedorbecomesunavailableorunusable.Thisisanattackonavailability.Examplesinclude:destructionofapieceofhardwarethecuttingofacommunicationlinethedisablingofthefilemanagementsystemDOS/DDOS(DenialofService)3
2025/4/2AnIntroductiontoInformationSecurityLecture1:Preface1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesTheCategoriesofattacks:Generally,therearefourgeneralcategoriesofsecurityattacksInterruption阻斷Interception竊聽(tīng)Modification修改Fabrication偽裝InformationsourceInformationdestinationThirdpartyAnunauthorizedpartygainsaccesstoanasset.Thisisanattackonconfidentiality(保密性).
egs:wiretapping(竊聽(tīng))
tocapturedatainanetworktheillicit(非法)copyingoffilesorprograms……4
2025/4/2AnIntroductiontoInformationSecurityLecture1:PrefaceTheCategoriesofattacks:Generally,therearefourgeneralcategoriesofsecurityattacksInterruption阻斷Interception竊聽(tīng)Modification修改Fabrication偽裝1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesInformationsourceInformationdestinationThirdpartyAnunauthorizedpartynotonlygainsaccesstobuttampers(篡改)
withanasset.Thisisanattackondeniability/integrity(完整性).Examplesare:changingvaluesinadatafilealteringaprogrammodifyingthecontentofmessages
……5
2025/4/2AnIntroductiontoInformationSecurityLecture1:PrefaceTheCategoriesofattacks:Generally,therearefourgeneralcategoriesofsecurityattacksInterruption阻斷Interception竊聽(tīng)Modification修改Fabrication偽裝1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesInformationsourceInformationdestinationThirdpartyAnunauthorizedpartyinsertscounterfeit(假冒的)objectsintothesystem.Thisisanattackonauthenticity(真實(shí)性).Examplesare:insertionofspuriousmessagesinanetworkadditionofrecordstoafile……6
2025/4/2AnIntroductiontoInformationSecurityLecture1:Preface1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesTheseattacksinvolvessomemodificationofthedatastreamorthecreationofafalsestream,whichcanbesubdividedintofourcategories:masquerade(偽裝)replay(重放)modificationofmessages(篡改)denialofservice(拒絕效勞)Activeattackspresenttheoppositecharacteristicsofpassiveattacks:Easytodetectbuthardtoprevent!ActiveAttackPassiveattackand7
2025/4/2AnIntroductiontoInformationSecurityLecture1:Preface1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesPassiveattacksareinthenatureofeavesdropping(偷聽(tīng))on,ormonitoringof,transmissions.Thegoaloftheopponentistoobtaininformationthatisbeingtransmitted.Twotypesofpassiveattacksare:
releaseofmessagecontents(泄密)
trafficanalysis(流量分析)passiveattackspresenttheoppositecharacteristicsofactiveattacks:Easytopreventbuthardtodetect!ActiveAttackPassiveattackand8
2025/4/2AnIntroductiontoInformationSecurityLecture1:PrefaceSecurityServicesConfidentiality(保密性)Availability(可用性)Nonrepudiation(防抵賴(lài))Authentication(真實(shí)性)Integrity(完整性)AccessControl(可控性)1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesEnsuresthattheinformationinanetworkandtransmittedinformationareaccessibleonlyforreadingbyauthorizedparties.AssetsAuthorizedPartyUnauthorized
Party9
2025/4/2AnIntroductiontoInformationSecurityLecture1:PrefaceSecurityServicesConfidentiality(保密性)Availability(可用性)Nonrepudiation(防抵賴(lài))Authentication(真實(shí)性)Integrity(完整性)AccessControl(可控性)1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesRequiresthatcomputerassetsbeavailabletoauthorizedpartiesasneeded.AssetsAuthorizedParty10
2025/4/2AnIntroductiontoInformationSecurityLecture1:PrefaceSecurityServicesConfidentiality(保密性)Availability(可用性)Nonrepudiation(防抵賴(lài))Authentication(真實(shí)性)Integrity(完整性)AccessControl(可控性)1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesRequiresthatneitherthesendernorthereceiverofamessagebeabletodenythetransmission.ReceiverSenderIdidn’tsendRthemessage!Ididn'treceivethemessagefromS!11
2025/4/2AnIntroductiontoInformationSecurityLecture1:PrefaceSecurityServicesConfidentiality(保密性)Availability(可用性)Nonrepudiation(防抵賴(lài))Authentication(真實(shí)性)Integrity(完整性)AccessControl(可控性)1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesEnsuresthattheoriginofamessageorelectronicdocumentiscorrectlyidentified,withanassurancethattheidentityisnotfalse.AuthorityIdentityIchbinXiaofeng+CredentialVerifyUserandCredentialAuthorizedAssets12
2025/4/2AnIntroductiontoInformationSecurityLecture1:PrefaceSecurityServicesConfidentiality(保密性)Availability(可用性)Nonrepudiation(防抵賴(lài))Authentication(真實(shí)性)Integrity(完整性)AccessControl(可控性)1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesEnsurethesystemwiththecapabilitytodenyanymodificationsandtransmissionsofassetsfromun-authorizedparties.Inotherwords,onlyauthorizepartiesareabletomodifyassetsandtransmittedinformation.sourcedestinationUn-authorizedparty13
2025/4/2AnIntroductiontoInformationSecurityLecture1:PrefaceSecurityServicesConfidentiality(保密性)Availability(可用性)Nonrepudiation(防抵賴(lài))Authentication(真實(shí)性)Integrity(完整性)AccessControl(可控性)1.AboutIS2.WWWIS?3.S_Attacks4.S_ServicesRequiresthataccesstoinformationresourcesmaybecontrolled
byorforthetargetsystem.eg:UserAssetsReadWriteAccess14
2025/4/2AnIntroductiontoInformationSecurityLecture2:OverviewofCryptography1.
WWWCryptography2.ClassicCryptographyTerminology:homoionym(近義詞)Cryptography密碼編碼學(xué)encrypt,decryptencryption,decryptioncode,codingencode,decodecipher,cipheringencipher,deciphermessagecodemessageencryptdecryptplaintextciphertext15
2025/4/2AnIntroductiontoInformationSecurityLecture2:OverviewofCryptography1.
WWWCryptography2.ClassicCryptographyTerminology:homoionym(近義詞)Cryptography密碼編碼學(xué)encrypt,decryptencryption,decryptioncode,codingencode,decodecipher,cipheringencipher,deciphermessagecodemessageencryptdecryptplaintextciphertext16
2025/4/2AnIntroductiontoInformationSecurityLecture2:OverviewofCryptography1.
WWWCryptography2.ClassicCryptographyCryptographyClassicCryptography:〔byWWII〕typicallyforconfidentialusageAandBhavealreadysharedsecretinformation,toprotecttheircommunicationModernCryptography〔fromWWII〕relatedtomoresecurityservices,as:confidentiality,integrity,authentication,andnon-repudiation.SymmetricCryptographyAsymmetricCryptographyCryptographicHashFunctionModernCryptography17
2025/4/2AnIntroductiontoInformationSecurityLecture2:OverviewofCryptography1.
WWWCryptography2.ClassicCryptographySymmetricC-AsymmetricC-C-HashFunctionSymmetric-keycipher:encryptionanddecryptionwith
thesamesecretkeyGeneralideaofSymmetric-keycipherPlaintextPlaintextCiphertextCiphertextDecryption
AlgorithmEncryption
AlgorithmSecureKey-exchangeChannelInsecureChannelShared
Secret-KeyShared
Secret-KeyAliceBob18
2025/4/2AnIntroductiontoInformationSecurityLecture2:OverviewofCryptography1.
WWWCryptography2.ClassicCryptographySymmetricC-AsymmetricC-C-HashFunctionAsymmetric-keycipher:encryptionanddecryptionwithdifferentkeysPlaintextPlaintextCiphertextCiphertextDecryption
AlgorithmEncryption
AlgorithmInsecureChannelAliceBobGeneralideaofAsymmetric-keycipher(1)Alice’s
Private-KeyAlice’sPublicKey19
2025/4/2AnIntroductiontoInformationSecurityLecture2:OverviewofCryptography1.
WWWCryptography2.ClassicCryptographySymmetricC-AsymmetricC-C-HashFunctionAsymmetric-keycipher:encryptionanddecryptionwithdifferentkeysPlaintextPlaintextCiphertextCiphertextEncryption
AlgorithmDecryption
AlgorithmInsecureChannelAliceBobGeneralideaofAsymmetric-keycipher(2)Alice’s
Private-KeyAlice’sPublicKey20
2025/4/2AnIntroductiontoInformationSecurityLecture2:OverviewofCryptography1.
WWWCryptography2.ClassicCryptographySymmetricC-AsymmetricC-C-HashFunctionCryptographicHashFunction:密碼散列函數(shù)withorwithoutsecretkeyGeneralideaofHashFunctionforMessageDigestHashFunctionHashFunctionInsecureChannelAliceBob×MdigestmessageMdigestMdigest’21
2025/4/2AnIntroductiontoInformationSecurityLecture3:OverviewofCryptography(II)1.1Kerckhoff’sPrinciplea.k.a.,Kerckhoffs'assumption,axiomorlawacryptosystemshouldbesecureevenifeverythingaboutthesystem,exceptthekey,ispublicknowledge.密碼系統(tǒng)的平安性不在于算法的保密,而在于當(dāng)對(duì)手獲知了算法和密文后分析出密鑰或明文的難度。1.MoreConceptsofCryptography3…
2…
AugusteKerckhoffs
1835-1903
What?“Theenemyknowsthesystem.〞——byClaudeShannonShannon'smaxim22
2025/4/2AnIntroductiontoInformationSecurityLecture3:OverviewofCryptography(II)1.2ConfusionandDiffusionConfusion:(混淆)makingtherelationshipbetweenthekeyandtheciphertextascomplexandinvolvedaspossible;Diffusion:(擴(kuò)散)thepropertythattheredundancyinthestatisticsoftheplaintextis"dissipated"inthestatisticsoftheciphertext;1.MoreConceptsofCryptography3…
2…
ClaudeElwoodShannon(April30,1916–February24,2001),anAmericanelectronicengineerandmathematician,isknownas"thefatherofinformationtheory".23
2025/4/2AnIntroductiontoInformationSecurityLecture3:OverviewofCryptography(II)1.3AvalancheeffectIncryptography,theavalancheeffectreferstoadesirablepropertyofcryptographicalgorithms,typicallyblockciphersandcryptographichashfunctions.Theavalancheeffectisevidentif,whenaninputischangedslightly(forexample,flippingasinglebit)theoutputchangessignificantly(e.g.,halftheoutputbitsflip)Inthecaseofqualityblockciphers,suchasmallchangeineitherthekeyortheplaintextshouldcauseadrasticchangeintheciphertext;1.MoreConceptsofCryptography3…
2…
24
2025/4/2AnIntroductiontoInformationSecurityLecture3:OverviewofCryptography(II)1.4SubstitutionCipherAsubstitutioncipherreplacesonesymbolwithanother.Substitutioncipherscanbecategorizedaseithermonoalphabeticciphersorpolyalphabeticciphers.TranspositionCipherAtranspositioncipherdoesnotsubstituteonesymbolforanother,insteaditchangesthelocationofthesymbols.1.MoreConceptsofCryptography3…
2…
25
2025/4/2AnIntroductiontoInformationSecurityLecture3:OverviewofCryptography(II)1.5
Blockcipher
andStreamCipher1.MoreConceptsofCryptography3…
2…
Agroupofplaintextsymbolsofsizem(m>1)areencryptedtogethercreatingagroupofciphertextofthesamesize.Asinglekeyisusedtoencryptthewholeblockevenifthekeyismadeofmultiplevalues.plaintext{T,X,T}=EK{e,x,t}{H,E,R}=EK{i,n,t}{C,I,P}=EK{p,l,a}CIPHERTXTEncryptionalgorithmK26
2025/4/2AnIntroductiontoInformationSecurityLecture3:OverviewofCryptography(II)1.5
Blockcipher
andSteramCipher1.MoreConceptsofCryptography3…
2…
Inastreamciphertheplaintextdigitsareencryptedoneatatime,andthetransformationofsuccessivedigitsvariesduringtheencryption.plaintextP=EK3(a)I=EK2(l)C=EK1(p)CHERTXTEncryptionalgorithmK=(k1,k2,k2…)………..………..IP27
2025/4/2AnIntroductiontoInformationSecurityLecture4:BlockCipherPrinciplesP-box
S-boxXORCircularShiftSwapSplit/Combine1.ProductCipher3…
2…
AP-box(permutationbox)parallelsthetraditionaltranspositioncipherforcharacters.Ittransposes(移動(dòng))bits.Astraight(直接的)P-boxisinvertible(可逆的),butcompressionandexpansionP-boxesarenot.e.g.StraightP-boxcompressionP-boxexpansionP-box28
2025/4/2AnIntroductiontoInformationSecurityLecture4:BlockCipherPrinciplesP-boxS-box
XORCircularShiftSwapSplit/Combine1.ProductCipher3…
2…
AnS-box(substitution
box)canbethoughtofasaminiature(微小的)substitutioncipher.AnS-boxisanm×nsubstitutionunit,wheremandnarenotnecessarilythesame.110110100129
2025/4/2AnIntroductiontoInformationSecurityLecture4:BlockCipherPrinciples
P-boxS-boxXORCircularShiftSwapSplit/Combine1.ProductCipher3…
2…
Theexclusive-oroperationisanimportantcomponentinmostblockciphers.XOR01001110+e.g.AxorBxorB=?30
2025/4/2AnIntroductiontoInformationSecurityLecture4:BlockCipherPrinciples
P-boxS-boxXORCircularShiftSwapSplit/Combine1.ProductCipher3…
2…
Thecircularshiftoperationisanothercomponentfoundinsomemodernblockciphers.e.g.31
2025/4/2AnIntroductiontoInformationSecurityLecture4:BlockCipherPrinciples
P-boxS-boxXORCircularShiftSwapSplit/Combine1.ProductCipher3…
2…
Theswapoperationisaspecialcaseofthecircularshiftoperationwherek=n/2.e.g.32
2025/4/2AnIntroductiontoInformationSecurityLecture4:BlockCipherPrinciples
P-boxS-boxXORCircularShiftSwapSplit/Combine1.ProductCipher3…
2…
Twootheroperationsfoundinsomeblockciphersaresplitandcombine.e.g.SplitCombine33
2025/4/2AnIntroductiontoInformationSecurityLecture4:BlockCipherPrinciplesProductCipher:asimpleexample1.ProductCipher3…
2…
8bitplaintextblock1block2……blocknkeymixerS-box3S-box1S-box2S-box412345678P-box8bitmiddletextk18bitmiddletextk28bitciphertextRound1Round2RoundKeyGeneratorK34
2025/4/2AnIntroductiontoInformationSecurityLecture4:BlockCipherPrinciplesFeistelcipherisasymmetricstructureusedintheconstructionofblockciphersbasedonconceptofinvertibleproductcipher.implementsShannon’sS-Pnetconceptpartitionsinputblockintotwohalvesprocessthroughmultipleroundswhichbasedonroundfunctionofrighthalf&subkeythenhavepermutationswappinghalves2.TheFeistelCipher3…
1…
HorstFeistel
1915-1990LiRi+Li+1Ri+1FKiLi+1Ri+135
2025/4/2AnIntroductiontoInformationSecurityLecture4:BlockCipherPrinciplesFeistelCipher:PropertiesBlocksizeKeysizeNumberofroundsSubkeygenerationRoundfunctionFastsoftwareE/DEaseofanalysis2.TheFeistelCipher3…
1…
36
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.1DESEncryption:WholePictureTheencryptionprocessismadeof2permutations(P-boxes),whichwecallinitial(初始)andfinalpermutations,and16Feistelrounds.1.DataEncryptionStandard3…
2…
DES64bitplaintext64bitciphertextInitialpermutationRound1Round2Round16Finalpermutation.
...
..56bitkeyK1K2K16Round-keygenerator37
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.1DESEncryption:InitialandFinalPermutationsInitialPermutations:IPFinalPermutations:IP-1TheinitialandfinalpermutationsarestraightP-boxesthatareinverses(互逆的)ofeachother.Theyhavenomuchcryptographicsignificance(意義)inDES.1.DataEncryptionStandard3…
2…
38
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.1DESEncryption:RoundsDESuses16rounds.EachroundofDESisaFeistelcipher.1.DataEncryptionStandard3…
2…
AroundinDES(encryptionsite)Li=Ri-1Ri=Li-1f(Ri-1,Ki)+39
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.1DESEncryption:FeistelFunction(DESFunction)TheheartofDESistheDESfunction.TheDESfunctionappliesa48-bitround-
keytotherightmost32bitstoproduce
a32-bitoutput.1.DataEncryptionStandard3…
2…
DESfunction40
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.1DESEncryption:FeistelFunction(DESFunction)1.DataEncryptionStandard3…
2…
E-PboxSinceRi?1isa32-bitinputandKiisa48-bitkey,wefirstneedtoexpandRi?1to48bits.41
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.1DESEncryption:FeistelFunction(DESFunction)1.DataEncryptionStandard3…
2…
XOR:“Add〞RoundKeyAftertheexpansionpermutation,DESusestheXORoperationontheexpandedrightsectionandtheroundkey.Notethatboththerightsectionandthekeyare48-bitsinlength.Alsonotethat
theroundkeyisusedonlyinthisoperation.42
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.1DESEncryption:FeistelFunction(DESFunction)1.DataEncryptionStandard3…
2…
S-boxTheS-boxesdotherealmixing(confusion).
DESuses8S-boxes,eachwitha6-bitinputanda4-bitoutput.43
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.1DESEncryption:FeistelFunction(DESFunction)1.DataEncryptionStandard3…
2…
S-boxTheS-boxesdotherealmixing(confusion).
DESuses8S-boxes,eachwitha6-bitinputanda4-bitoutput.44
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.1DESEncryption:FeistelFunction(DESFunction)1.DataEncryptionStandard3…
2…
S-boxe.g.inputbits:110100Whataretheoutputbits:??TheS-boxesdotherealmixing(confusion).
DESuses8S-boxes,eachwitha6-bitinputanda4-bitoutput.45
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.1DESEncryption:FeistelFunction(DESFunction)1.DataEncryptionStandard3…
2…
S-box46
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.1DESEncryption:FeistelFunction(DESFunction)1.DataEncryptionStandard3…
2…
S-PboxThelastoperationis
StraightPermutation
withaP-boxasfollow.47
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.2DESDecryption:ThesamealgorithmasencryptionUseK1->K16asencryption,
butk16->K1asdecryption1.DataEncryptionStandard3…
2…
48
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandard2.3KeyGenerationandExpansion(擴(kuò)展)64bitsRandomNumberDrop8bitsandpermutated
to
56bitsKeyTheround-keygeneratorcreates
sixteen48-bitkeysoutofa56-bit
cipherkey.Expand16sub-keyssplit56bitsto2halvesshifteachhalfcombinethemdocompresspermutationto
48bitsround-key1.DataEncryptionStandard3…
2…
49
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandardWhyMultipleEncryption?alternativestoDESexpandkeysize3.MultipleEncryptionand3-DES1…
2…
DESDESK1K2PlaintextMidtextCiphertext50
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandardDoubleDESC=EK2(EK1(P))P=DK1(DK2(C))C=DK2(EK1(P))P=DK1(EK2(C))Meet-in-the-middleattack:3.MultipleEncryptionand3-DES1…
2…
51
2025/4/2AnIntroductiontoInformationSecurityLecture5:DataEncryptionStandardTripleDESTripleDESwith2keysC=Ek1(Dk2(Ek1(P)))P=Dk1(Ek2(Dk1(C)))K1+K2:112bitsTripleDESwith3keysC=Ek3(Dk2(Ek1(P)))P=Dk1(Ek2(Dk3(C)))MoresecurethanDES,butwithmorecost3.MultipleEncryptionand3-DES1…
2…
52
2025/4/2AnIntroductiontoInformationSecurity2.1TheAESCipher:wholepicture2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕BasicDescription:1.Blocksize:128bits2.Keysize:128/192/256bits3.Rounds:10/12/144.Roundkeysize:128bits5.NotFeistelCipher
Notethat:Addroundkeybeforeround1;Nomix-columnsinlastround
53
2025/4/2AnIntroductiontoInformationSecurity2.1TheAESCipher:wholepicture2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕54
2025/4/2AnIntroductiontoInformationSecurity2.2TheAESCipher:importantconceptsfordataunitBit:1or0Byte:8bitsWord:32bitsBlock:128-bits,forinputplaintext
andoutputciphertextState:128-bits,datablockinmidstage2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕01010010010100101101011001111110110011115252D67ECFAC8723242612BAC79954D2B4177609DA55
2025/4/2AnIntroductiontoInformationSecurity2.3TheAESCipher:roundtransformations2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕1)ByteSubstitution2)ShiftRows3)MixColumns4)AddRoundkey56
2025/4/2AnIntroductiontoInformationSecurity2.3TheAESCipher:roundtransformations2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕1)ByteSubstitution2)ShiftRows3)MixColumns4)AddRoundkey57
2025/4/2AnIntroductiontoInformationSecurity2.3TheAESCipher:roundtransformations2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕1)ByteSubstitution2)ShiftRows3)MixColumns4)AddRoundkey0123456789ABCDEF0123456789ABCDEFAC2612BA87C7995423D2B417247609DA91F7C9F417C6EE2026B58DF036380157FindthelocationsinS-boxtosubstituteinputbytes915758
2025/4/2AnIntroductiontoInformationSecurity2.3TheAESCipher:roundtransformations2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕1)ByteSubstitution2)ShiftRows3)MixColumns4)AddRoundkeyAESEncryption:S-boxeg:S-box({AC})={91}AESDecryption:S-box-1eg:S-box-1({91})={AC}S-box、S-Box-1的構(gòu)造過(guò)程:P11059
2025/4/2AnIntroductiontoInformationSecurity2.3TheAESCipher:roundtransformations2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕1)ByteSubstitution2)ShiftRows3)MixColumns4)AddRoundkeyThisisatransposition/permutationoperationonrows.60
2025/4/2AnIntroductiontoInformationSecurity2.3TheAESCipher:roundtransformations2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕1)ByteSubstitution2)ShiftRows3)MixColumns4)AddRoundkeyThemostcomplicatedoperationinAES61
2025/4/2AnIntroductiontoInformationSecurity2.3TheAESCipher:roundtransformations2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕1)ByteSubstitution2)ShiftRows3)MixColumns4)AddRoundkey62
2025/4/2AnIntroductiontoInformationSecurity91F7C9F4C6EE20178DF026B53638015702030101010203010101020301010203×91C68D57={02}⊙{10010001}{03}⊙{11000110}{01}⊙{10001101}{01}⊙{01010111}⊕⊕⊕=00111001010100011000110101010111⊕⊕⊕10110010B2E5xxxxxxxxxxxxxxxxxxxxxxxx32xxn×n矩陣的乘法,繼續(xù)…Example3MixColumnsLecture6:AdvancedEncryptionStandard〔AES〕63
2025/4/2AnIntroductiontoInformationSecurity2.3TheAESCipher:roundtransformations2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕1)ByteSubstitution2)ShiftRows3)MixColumns4)AddRoundkeyAESencryption:CAESdecryption:C-164
2025/4/2AnIntroductiontoInformationSecurity2.3TheAESCipher:roundtransformations2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕1)ByteSubstitution2)ShiftRows3)MixColumns4)AddRoundkeyAddRoundKeyproceedsonecolumnatatime.AddRoundKeyaddsaroundkeywordwitheachstatecolumnmatrix;theoperationinAddRoundKeyismatrixaddition.TheAddRoundKeytransformationistheinverseofitself65
2025/4/2AnIntroductiontoInformationSecurity2.3TheAESCipher:DecryptionDecryptionisthereverseprocess
ofencryptionRemarks:Sub-BytesS-boxforencryptionS-box-1fordecryptionMix-columnmatrixCfordecryptionmatrixC-1fordecryptionReverseroundkeys2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕66
2025/4/2AnIntroductiontoInformationSecurity2.4AESKeyExpansionTocreateroundkeysforeachround,AESusesakey-expansionprocess.IfthenumberofroundsisNr,thekey-expansionroutinecreatesNr+1128-bitroundkeysfromonesingle128-bitcipherkey.2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕67
2025/4/2AnIntroductiontoInformationSecurity2.4AESKey
Expansion2.AESAlgorithm3…
1…
Lecture6:AdvancedEncryptionStandard〔AES〕68
2025/4/2AnIntroductiontoInformationSecurityLecture7:BlockCipherModesofOperation2.1ECB2.2CBC2.3CFB2.4OFB2.5CTR2.BlockCipherModesofOperation1…
TheElectronicCodeBook(電子密碼本模式):simplestmodeEachblockofplaintextisencodedindependently(獨(dú)立地)usingthesamekeyPencryptKThefirstm-bitofPTime=1Thesecondm-bitofPTime=2Thesecondm-bitofCencryptKThenthm-bitofPTime=NThenthm-bitofCencryptKThefirstm-bitofCCAnyProblem?69
2025/4/2AnIntroductiontoInformationSecurityLecture7:BlockCipherModesofOperation2.1ECB2.2CBC2.3CFB2.4OFB2.5CTR2.BlockCipherModesofOperation1…
TheElectronicCodeBookCommentstoECBthesameblockofplaintext,ifitappearsmorethanonceinthemessage,alwaysproducesthesameciphertext.Cannotprev
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 農(nóng)村留守兒童教育現(xiàn)狀與改進(jìn)策略
- 2025年財(cái)務(wù)部下半年工作方案
- 配電箱實(shí)務(wù)知識(shí)培訓(xùn)課件
- 商品的品類(lèi)管理與談判技巧培訓(xùn)教材
- 蘭州理工大學(xué)《中學(xué)信息技術(shù)學(xué)科教學(xué)論》2023-2024學(xué)年第二學(xué)期期末試卷
- 江蘇省南京市棲霞區(qū)、雨花區(qū)、江寧區(qū)2025屆中考最后沖刺模擬(一)物理試題文試題含解析
- 畢節(jié)職業(yè)技術(shù)學(xué)院《高級(jí)英語(yǔ)Ⅰ》2023-2024學(xué)年第一學(xué)期期末試卷
- 武漢大學(xué)《工程倫理學(xué)B》2023-2024學(xué)年第二學(xué)期期末試卷
- 湖南城建職業(yè)技術(shù)學(xué)院《食品無(wú)損檢測(cè)》2023-2024學(xué)年第一學(xué)期期末試卷
- 2025屆浙江省金華市金東區(qū)初三下學(xué)期定時(shí)訓(xùn)練化學(xué)試題含解析
- 《檢驗(yàn)檢測(cè)機(jī)構(gòu)監(jiān)督管理辦法》培訓(xùn)結(jié)業(yè)考核試題附答案
- DB13(J)∕T 105-2017 預(yù)應(yīng)力混凝土管樁基礎(chǔ)技術(shù)規(guī)程
- 加壓氣化操作規(guī)程(共115頁(yè))
- 標(biāo)準(zhǔn)魯班尺尺寸對(duì)比表
- 初中綜合實(shí)踐課程標(biāo)準(zhǔn)
- 基于STC89C52單片機(jī)-紅外智能循跡小車(chē)
- PackingList外貿(mào)裝箱單模板
- 談文旅融合發(fā)展的深層意義
- 自考勞動(dòng)法名詞解釋和論述歷年真題重要考點(diǎn)必須掌握
- 第三章-件雜貨裝卸工藝
- 數(shù)據(jù)中心項(xiàng)目運(yùn)營(yíng)方案-范文參考
評(píng)論
0/150
提交評(píng)論