河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第08章 密码学精讲 Details of Cryptography

SECURITY IN COMPUTING FIETH EDITION Chapter 8: Details of Cryptography 授课教师:高海波 可南中医药大学 信息管理与信息系统教研室 From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
SECURITY IN COMPUTING, FIFTH EDITION Chapter 8: Details of Cryptography From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 1 授课教师:高海波 河南中医药大学 信息管理与信息系统教研室

2 Chapter 8 Objectives Learn basic terms and primitives of cryptography Deep dive into how symmetric encryption algorithms work Study the rsa asymmetric encryption algorithm Compare message digest algorithms Explain the math behind digital signatures Learn the concepts behind quantum cryptography From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Chapter 8 Objectives • Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography 2 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

3 Methods of Cryptanalysis Break(decrypt) a single message Recognize patterns in encrypted messages Infer some meaning without even breaking the encryption such as from the length or frequency of messages Easily deduce the key to break one message and perhaps subsequent ones Find weaknesses in the implementation or environment of use of encryption by the sender Find general weaknesses in an encryption algorithm From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Methods of Cryptanalysis • Break (decrypt) a single message • Recognize patterns in encrypted messages • Infer some meaning without even breaking the encryption, such as from the length or frequency of messages • Easily deduce the key to break one message and perhaps subsequent ones • Find weaknesses in the implementation or environment of use of encryption by the sender • Find general weaknesses in an encryption algorithm 3 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

Cryptanalysis Inputs Ciphertext only Look for patterns, similarities, and discontinuities among many messages that are encrypted alike Plaintext and ciphertext, so the cryptanalyst can see what transformations occurred Known plaintext Probable plaintext Chosen plaintext From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Cryptanalysis Inputs • Ciphertext only • Look for patterns, similarities, and discontinuities among many messages that are encrypted alike • Plaintext and ciphertext, so the cryptanalyst can see what transformations occurred • Known plaintext • Probable plaintext • Chosen plaintext 4 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

5 Cryptographic Primitives Substitution One set of bits is exchanged for another Transposition Rearranging the order of the ciphertext to break any repeating patterns in the underlying plaintext Confusion An algorithm providing good confusion has a complex functional relationship between the plaintext/key pair and the ciphertext, so that changing one character in the plaintext causes unpredictable changes to the resulting ciphertext Diffusion Distributes the information from single plaintext characters over the entire ciphertext output, so that even small changes to the plaintext result in broad changes to the ciphertext From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Cryptographic Primitives • Substitution • One set of bits is exchanged for another • Transposition • Rearranging the order of the ciphertext to break any repeating patterns in the underlying plaintext • Confusion • An algorithm providing good confusion has a complex functional relationship between the plaintext/key pair and the ciphertext, so that changing one character in the plaintext causes unpredictable changes to the resulting ciphertext • Diffusion • Distributes the information from single plaintext characters over the entire ciphertext output, so that even small changes to the plaintext result in broad changes to the ciphertext 5 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

6 One-Time Pads nonrepeating series of numbers Exclusive Exclusive oR or other Plaintext bining Ciphertext oR or other O riginal g combining Plaintext function function From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
One-Time Pads 6 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

7 Shannon's Characteristics of good Ciphers The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption 2. The set of keys and the enciphering algorithm should be free from complexity 3. The implementation of the process should be as simple as possible 4. Errors in ciphering should not propagate and cause corruption of further information in the message 5. The size of the enciphered text should be no larger than the text of the original message From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Shannon’s Characteristics of Good Ciphers 1. The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption 2. The set of keys and the enciphering algorithm should be free from complexity 3. The implementation of the process should be as simple as possible 4. Errors in ciphering should not propagate and cause corruption of further information in the message 5. The size of the enciphered text should be no larger than the text of the original message 7 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

8 Properties of a Trustworthy Cryptosystem It is based on sound mathematics It has been analyzed by competent experts and found to be sound It has stood the test of time From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Properties of a Trustworthy Cryptosystem • It is based on sound mathematics • It has been analyzed by competent experts and found to be sound • It has stood the test of time 8 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

9 DES Algorithm Left Data [ lalf Right Data Half 56 bits Expansion Substitution Permutation New Left Data Ilalf New Right Data Halr From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
DES Algorithm 9 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

DES Algorithm(cont) Cyl: 2 inha Prrmdhn From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
DES Algorithm (cont.) 10 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第07章 安全管理与事件 Management and Incidents.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第06章 网络 Networks.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第03章 程序与编程 Programs and Programming.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第05章 数据库 Databases.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第04章 操作系统 Operating Systems.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第02章 工具箱:鉴别、访问控制与加密 Toolbox:Authentication, Access Control, and Cryptography.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第01章 概论 Introduction.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——端口扫描与嗅探实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——网络监视实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——数据包捕获实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第八讲 主机探测及端口扫描实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第七讲 WEB漏洞渗透实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第六讲 入侵检测实验——基于虚拟蜜网的网络攻防实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第六讲 入侵检测实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第五讲 防火墙实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第四讲 协议与内容安全实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第十一章 网络服务扫描实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第十章 邮件钓鱼社会工程学实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第九章 口令破解及安全加密电邮实验.pptx
- 复旦大学:《计算机网络与网页制作》课程PPT教学课件(讲稿)19 管理你的站点.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第09章 隐私 Privacy.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第10章 浏览器 The Web—User Side.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第12章 新兴问题 Emerging Topics.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第11章 云计算 Cloud Computing.pdf
- 河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(实验课程教学大纲).pdf
- 河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(理论课程教学大纲).pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:The Complete VMware vSphere Guide:Design a Virtualized Data Center with VMware vSphere 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:4 Reasons to Embrace Multi-Cloud with Network Virtualization.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:IDC:The Business Value of VMware NSX Advanced Load Balancer.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Mastering VMware vSphere 6.7, 2nd Edition.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Mastering VMware vSphere 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》教学资源(参考资料)Mastering VMware vSphere 6.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Network Virtualization for Dummies.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Optimizing Remote Worker Connectivity to Cloud Applications Using SD-WAN Gateways.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware NSX Data Center.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vSphere 功能特性比较.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:WHAT'S NEW IN VMWARE vSPHERE 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Worldwide Cloud System and Service Management Software Market Shares, 2019:SaaS and ITOM Drive Growth.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 1.入门-vRealize-Log-Insight-4.7-getting-started-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 2.管理 vRealize Log Insight-vRealize-Log-Insight-4.7-administration-guide.pdf