Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976. W Diffie, M E Hellman, \New directions in Cryptography\, IEEE Trans. Information
文件格式: PPT大小: 727.5KB页数: 54
Public-Key Applications can classify uses into 3 categories: – encryption/decryption (provide secrecy) – digital signatures (provide authentication) – key exchange (of session keys)
文件格式: PPT大小: 1.92MB页数: 68
A. J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied Cryptography, CRC Press, 1997. Bruce Schneier. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) John Wiley & Sons, Inc.) 1996 Douglas R. Stinson, Cryptography (Theory and Practice), CRC Press 1995 Resources
文件格式: PPT大小: 918.5KB页数: 87
Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms
文件格式: PPT大小: 278KB页数: 56
Definition: Group A set G of elements and operator @ form a group if: for all x,y in G, x @ y is also in G (inclusion) there is an identity element e such that for all x in G, e@x = x for all x in G, there is an inverse element x
文件格式: PPT大小: 67.5KB页数: 31
Numbers Integers Real Arithmetic Operations Addition and subtraction Multiplication and division Exponentiation and logarithm
文件格式: PPT大小: 51KB页数: 22
Digital Signatures and Message Authentication Code (MAC) overview Suppose Alice and Bob share a secret key k which determines hash function hk Alice sends (x, y) to Bob where y = hk
文件格式: PPT大小: 389.5KB页数: 78
Definitions – Digital Signature - a data string which associates a message with some originating entity – Digital Signature Generation Algorithm – a method for producing a digital signature – Digital signature verification algorithm - a method for verifying that a digital signature is authentic (i.e., was indeed created by the specified entity)
文件格式: PPT大小: 159.5KB页数: 56
Modular arithmetic – Used to define a finite field – a = b mod n means that if a and b are divided by n they produce the same remainder – a*b mod n can result in 0 even if a and b are not 0
文件格式: PPT大小: 79.5KB页数: 20
Iterating Block ciphers Definition A product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual components. Definition An iterated block cipher is a block cipher involving the sequential repetition of an internal function called a round function. Parameters include the number of rounds Nr, the block bitsize n, and the bitsize k of the input key K from which Nr subkeys Ki (round keys) are derived. For invertibility (allowing unique decryption), for each value Ki the round function is a bijection on the round input
文件格式: PPT大小: 405KB页数: 63










