版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
CollegeofComputerScienceandElectronic群編程分組(A,安全安全男男男男女男女女男安全女男男男女女男男女編程分組(C安全安全女男男男男男男女男女女女男女女男女男女男男女男男女女女男男女男女女女王男UnderstandingCryptography–ATextbookforStudentsandPractitionersbyChristofPaarandJanChapter1–IntroductiontoCryptographyver.October28,2010TheseslideswerepreparedbyChristofPaarandJanSomelegalstuff(sorry):TermsofTheslidescanused ofcharge.AllcopyrightsfortheslidesremainwithChristofPaarandJanPelzl.Thetitleofthepanyingbook“UnderstandingCryptography”byandtheauthor’snamesmustremainoneachIftheslidesaremodified,appropriatecreditstothebookauthorsandbooktitlemustremainwithintheItisnotpermittedtoreproducepartsoralloftheslidesinprintedwhatsoeverwithoutwrittenconsentbythe
Chapter1ofUnderstandingCryptographybyChristofPaarandJanContentofthisOverviewonthefieldofBasicsofsymmetric SubstitutionModularShift(orCaesar)CipherandAffine
Chapter1ofUnderstandingCryptographybyChristofPaarandJanContentofthisOverviewonthefieldofBasicsofsymmetric SubstitutionModularShift(orCaesar)CipherandAffine
Chapter1ofUnderstandingCryptographybyChristofPaarandJan ClassificationoftheFieldof Symmetric Block Streamaahighlyimmature
Chapter1ofUnderstandingCryptographybyChristofPaarandJan SomeBasicAncientCrypto:EarlysignsofencryptioninEqyptinca.2000Letter-basedencryptionschemes(e.g.,Caesarcipher)populareverSymmetricciphers:Allencryptionschemesfromancienttimesuntil1976weresymmetricones.Asymmetricciphers:In1976public-key(orasymmetric)cryptographywasopenlyproposedbyDiffie, manandMerkle.HybridSchemes:Themajorityoftoday‘sprotocolsarehybridschemes,i.e.,theusesymmetricciphers(e.g.,forencryptionandmessageauthentication)asymmetricciphers(e.g.,forkeyexchangeanddigital
Chapter1ofUnderstandingCryptographybyChristofPaarandJanContentofthisOverviewonthefieldofBasicsofsymmetric SubstitutionModularShift(orCaesar)CipherandAffine
Chapter1ofUnderstandingCryptographybyChristofPaarandJan SymmetricAlternativenames:private-key,single-keyorsecret-key(badguy)Unsecurechannel(e.g.Internet)xxProblemAliceandBobwouldliketocommunicateviaaninsecurechannel(e.g.,WLANorInternet).AmaliciousthirdpartyOscar(thebadguy)haschannelaccessbutshouldnotbeabletounderstandthecommunication.
Chapter1ofUnderstandingCryptographybyChristofPaarandJan SymmetricSolution:EncryptionwithsymmetricOscarobtainsonlyciphertexty,thatlookslikerandombits
(badguy)y
insecurechannel(e.g.Internet)
e(
d() d()y yKeyKeyxis yistheKisthe
Securewhyancientpeoplechosethismodeltodevelopsymmetrickeycryptography?Setofallkeys{K1,K2,...,Kn}isthekey
Chapter1ofUnderstandingCryptographybyChristofPaarandJan Symmetric???EncryptionDecryptiony=x=EncryptionanddecryptionareinverseoperationsifthesamekeyKisusedonbothdK(y)=dK(eK(x))=ddK()istheinversefunctionof
Chapter1ofUnderstandingCryptographybyChristofPaarandJansetofallx
setofallynumbernumberofintextsEQUALtonumberpossibleciphertextswhenkeyissetofallx
setofallynumberofpossibleciphertextsisatleastequaltonumberofpossible innumberofpossibleciphertextsisatleastequaltonumberofpossible intexts,whenkeyisnotassigned SymmetricEncryptionDecryption
y=eK(x)x=EncryptionanddecryptionareinverseoperationsifthesamekeyKisusedonbothdK(y)=dK(eK(x))=Important:ThekeymustbetransmittedviaasecurechannelbetweenAliceandThesecurechannelcanberealized,e.g.,bymanuallyinstallingthekeyfortheWi-FiProtectedAccess( )protocolorahumancourier.However,thesystemisonlysecureifanattackerdoesnotlearnthekeyTheproblemofsecurecommunicationisreduced1.securetransmissionandstorageofthekey2.findpropereK()and
Chapter1ofUnderstandingCryptographybyChristofPaarandJanContentofthisOverviewonthefieldofBasicsofsymmetric SubstitutionModularShift(orCaesar)CipherandAffine
Chapter1ofUnderstandingCryptographybyChristofPaarandJan Whydoweneed calThereisnomathematicalproofofsecurityforanycalTheonlywaytohaveassurancethatacipherissecureistotrytobreakit(andfail)!
Chapter1ofUnderstandingCryptographybyChristofPaarandJan ernments(U.S., ,Russia,etc)intentionallydesignflawedcryptosystemsand usethemtoocostlytore proofofciphersecurity)?wasaDutchlinguistandcryptographerwhowasprofessoroflanguagesattheécoledesHautesétudesCommercialesinParisinthelate19thcentury.“即使 Whydoweneed Thereisnomathematicalproofofsecurityforanypracticalandfail)Theonlywaytohaveassurancethatacipherissecureistotrytoandfail)Kerckhoffs‘sPrincipleisparamountinmodernAAcryptosystemshouldbesecureeveniftheattacker(Oscar)knowsalldetailsaboutthesystem,withtheexceptionofthesecretkey.isisopensourcesoftwaremoresecurethanclosedsourcesoftware?
Chapter1ofUnderstandingCryptographybyChristofPaarandJan Whydoweneed Thereisnomathematicalproofofsecurityforanypracticalandfail)Theonlywaytohaveassurancethatacipherissecureistotrytoandfail)Kerckhoffs‘sPrincipleisparamountinmodernAAcryptosystemshouldbesecureeveniftheattacker(Oscar)knowsalldetailsaboutthesystem,withtheexceptionofthesecretkey.InordertoachieveKerckhoffs‘sPrincipleinOnlyusewidelyknownciphersthathavebeencrypt yzedforseveralyearsbygoodcryptographers!(UnderstandingCryptographyonlytreatssuchciphers)Remark:Itistemptingtoassumethatacipheris?moresecure“ifitsdetailsaresecret.However,historyhasshowntimeandagainthatsecretcipherscanalmostalwaysbeenbrokenoncetheyhavebeenreversedengineered.(Example:ContentScramblingSystem(CSS)forDVDcontentprotection.)
Chapter1ofUnderstandingCryptographybyChristofPaarandJan ysis:Attacking ImplementationAttack:Trytoextractkeythroughreverseengineeringorpowermeasurement,e.g.,forabankingsmartcard.SocialEngineering:E.g.,trickauserintogivingupher
Chapter1ofUnderstandingCryptographybyChristofPaarandJan Attack(orExhaustiveKeySearch)againstSymmetricTreatsthecipherasablackRequires(atleast) intext-ciphertextpair(x0,CheckallpossiblekeysuntilconditionisdK(y0)= HowmanykeystoweneedinbitKeySecuritylife asbestpossibleShortterm(fewdaysorLong-term(severaldecadesintheabsenceofquantumLong-term(alsoresistantagainstquantumcomputers–notethatQCdonotexistatthemomentandmightneverexist)Important:Anadversaryonlyneedstosucceedwithoneattack.Thus,alongkeyspacedoesnothelpifotherattacks(e.g.,socialengineering)arepossible..
Chapter1ofUnderstandingCryptographybyChristofPaarandJanContentofthisOverviewonthefieldofBasicsofsymmetric SubstitutionModularShift(orCaesar)CipherandAffine
Chapter1ofUnderstandingCryptographybyChristofPaarandJan SubstitutionHistoricalGreattoolforunderstanding yticalEncryptslettersratherthanbits(likeallciphersuntilafterWWIdea: ce intextletterbyafixedotherAkBdCwforinstance,ABBAwouldbeencryptedasExampleiqifccvqqrfbrdqvfllcqnardqcfjwhwzhrbnnbhcchwwhbsqvqbrehwqvhlqHowsecureistheSubstitutionCipher?Let‘slookat
Chapter1ofUnderstandingCryptographybyChristofPaarandJan AttacksagainsttheSubstitutionAttack:ExhaustiveKeySearch Simplytryeverypossiblesubsititutiontableuntilanin intextappears(notethateachsubstitutiontableisakey)..Howmanysubstitutiontables(=keys)are26x25x…x3x2x1=26!?Searchthrough288keysiscomple yinfeasiblewithtoday‘scomputers!(cf.earliertableonkeylengths)Q:Canwenowconcludethatthesubstitutioncipherissecuresinceabrute-attackisnotfeasible?A:No!Wehavetoprotectagainstallpossible
Chapter1ofUnderstandingCryptographybyChristofPaarandJan 2.Attack:Letter ysis LettershaveverydifferentfrequenciesintheEnglishMoreover:thefrequency intextlettersis intheForinstance,“e“isthemostcommonletterinEnglish;almost13%ofalllettersinatypicalEnglishtextare“e“.Thenextmostcommononeis“t“withaboutLetterLetterfrequenciesinEnglish..
Chapter1ofUnderstandingCryptographybyChristofPaarandJan BreakingtheSubstitutionCipherwithLetterFrequencyLet‘sreturntoourexampleandidentifythemostfrequentiqifccvqqrfbrdqvfllcqnardqcfjwhwzhrbnnbhcchwwhbsqvqbrehwqvhlqWe cetheciphertextletterqbyEandiEifccvEErfbrdEvfllcEnardEcfjwhwzhrbnnbhcchwwhbsEvEbrehwEvhlEByfurtherguessingbasedonthefr
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 貴州財經(jīng)職業(yè)學(xué)院《大學(xué)英語跨文化交際》2023-2024學(xué)年第一學(xué)期期末試卷
- 2025年上海市建筑安全員-B證(項目經(jīng)理)考試題庫
- 2025重慶建筑安全員-C證考試題庫
- 貴陽信息科技學(xué)院《證券投資學(xué)實驗》2023-2024學(xué)年第一學(xué)期期末試卷
- 2025年浙江建筑安全員《C證》考試題庫及答案
- 廣州幼兒師范高等??茖W(xué)校《生物技術(shù)綜合性實驗?zāi)K》2023-2024學(xué)年第一學(xué)期期末試卷
- 2025廣東省安全員-A證考試題庫附答案
- 廣州新華學(xué)院《影視導(dǎo)演實訓(xùn)》2023-2024學(xué)年第一學(xué)期期末試卷
- 2025年天津建筑安全員考試題庫
- 2025年四川省安全員知識題庫附答案
- 相關(guān)方人員入場安全告知書
- 建設(shè)項目環(huán)境監(jiān)理 環(huán)境監(jiān)理大綱的編制 環(huán)境監(jiān)理大綱的編制
- 項目工程安全管理責(zé)任區(qū)域劃分表
- 教育培訓(xùn)學(xué)校(機構(gòu))課堂教學(xué)反饋表
- 成功公司年度績效考核方案
- GB/T 17684-2008貴金屬及其合金術(shù)語
- 安全管理流程圖加強完善版
- 第一講-研發(fā)創(chuàng)新型企業(yè)需要IPD(下)徐驥課程-
- 2022年08月北京外交學(xué)院非事業(yè)編科研助理招聘14人高頻考點卷叁(3套)答案詳解篇
- 甲狀腺結(jié)節(jié)的超聲規(guī)范化診斷教學(xué)課件
- 職業(yè)健康監(jiān)護(hù)技術(shù)規(guī)范
評論
0/150
提交評論