当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

复旦大学:《密码学基础》课程教学资源(课件讲稿)05 Message authentication and Hash function

资源类别:文库,文档格式:PDF,文档页数:55,文件大小:981.2KB,团购合买
点击下载完整版文档(PDF)

密码学基础(05) Message authentication and Hash function 復大辱软件学院

1 密码学基础(05) Message authentication and Hash function

Review Symmetric Cryptography Asymmetric Cryptography 復大辱软件学院

2 Review • Symmetric Cryptography • Asymmetric Cryptography

o Review: Symmetric Model Secret key shared by Secret key shared by sender and recipient sender and recipient Transmitted ciphertext Plaintext Plaintext Input Encryption algorithm Decryption algorithm output (e.g, DES) (reverse of encryption algorithm) Bob Alice 3 復大辱软件学院 LiST

LiJT 3 Review: Symmetric Model Bob Alice

Asymmetric Model B oDS S public key ring Ted Mike Alice Alice's public Alices private k key 圄「 Transmitted cipherte Plaintext Plaintext Input Encryption algorithm Decryption algorithm output (e. g, RSA) (reverse of encryption algorithm) Bob Alice 復大辱软件学院 LiJT

LiJT 4 Asymmetric Model Bob Alice

Review Confidentiality 復大辱软件学院

5 Review • Confidentiality

Review Confidentiality enough 復大辱软件学院

6 Review • Confidentiality • enough?

o Security Requirements disclosure traffic analysis masquerade content modification sequence modification timing modification source repudiation destination repudiation 復大辱软件学院

7 Security Requirements • disclosure • traffic analysis • masquerade • content modification • sequence modification • timing modification • source repudiation • destination repudiation

ef, Message Authentication message authentication is concerned with protecting the integrity of a message validating identity of originator non-repudiation of origin(dispute resolution) will consider the security requirements then three alternative functions used message encryption message authentication code( MAC) hash function 復大辱软件学院

8 Message Authentication • message authentication is concerned with: – protecting the integrity of a message – validating identity of originator – non-repudiation of origin (dispute resolution) • will consider the security requirements • then three alternative functions used: – message encryption – message authentication code (MAC) – hash function

Note ! Message vs Plaintext We will not consider Confidentiality sometimes Authentication 復大辱软件学院

9 Note !! • Message vs. Plaintext • We will not consider Confidentiality sometimes. • Authentication ?

oe Message Encryption message encryption by itself also provides a measure of authentication if symmetric encryption is used then receiver know sender must have created it since only sender and receiver now key used know content cannot of been altered if message has suitable structure, redundancy or a checksum to detect any changes 復大辱软件学院

10 Message Encryption • message encryption by itself also provides a measure of authentication • if symmetric encryption is used then: – receiver know sender must have created it – since only sender and receiver now key used – know content cannot of been altered – if message has suitable structure, redundancy or a checksum to detect any changes

点击下载完整版文档(PDF)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
共55页,可试读19页,点击继续阅读 ↓↓
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有