- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
CIT 380 Securing Computer Systems.ppt
CIT 380: Securing Computer Systems CIT 380: Securing Computer Systems Slide #* CIT 380: Securing Computer Systems Modern Cryptography CIT 380: Securing Computer Systems Slide #* Overview Cryptographic Checksums Hash Functions HMAC Number Theory Review Public Key Cryptography One-Way Trapdoor Functions Diffie-Helman RSA Modern Steganography CIT 380: Securing Computer Systems Slide #* Hash Functions Checksum to verify data integrity. Hash Function h: A?B Input A: variable length Output B: fixed length “fingerprint” of input Many inputs produce same output. Example Hash Function Sum 32-bit words of message mod 232. CIT 380: Securing Computer Systems Slide #* Hash Function: ASCII Parity ASCII parity bit ASCII has 7 bits; 8th bit is for “parity” Even parity: even number of 1 bits Odd parity: odd number of 1 bits Bob receives as bits. Sender is using even parity; 6 1 bits, so character was received correctly Note: could be garbled, but 2 bits would need to have been changed to preserve parity Sender is using odd parity; even number of 1 bits, so character was not received correctly CIT 380: Securing Computer Systems Slide #* Cryptographic Checksums Hash with authentication/integrity protection Cannot obtain original message from hash. Cannot find another message with same hash. Additional Names Message Authentication Code Message Digest CIT 380: Securing Computer Systems Slide #* One-Way Function Function f easy to compute, hard to reverse Given x, easy to calculate f(x). Given f(x), hard to compute x. What’s easy and what’s hard? easy: polynomial time hard: exponential time Are there any one-way functions? CIT 380: Securing Computer Systems Slide #* Cryptographic Checksum Definition A function h: A?B such that: For any x IN A, h(x) is easy to compute. For any y IN B, it is computationally infeasible to find x IN A such that h(x) = y. It is computationally infeasible to find x, x′ IN A such that x ≠ x′ and h(x) = h(x′). CIT 380: Securing Computer Systems Sli
您可能关注的文档
- B族维生素片.ppt
- C++ Program Structure (and tools).ppt
- C51 指令系统.ppt
- Calculating sample size for a case-control study.ppt
- California Department of Education, Reposted 5-17- 2011.ppt
- Campaigning and collaborating on REACH in Europe.ppt
- CAMPBELL SOUP CO. v. WENTZ172 F.2d 80 (3d Cir. 1948).ppt
- Can the world feed Itself.ppt
- Can you name some disasters Can you describe it.ppt
- Canadian Issues StudyTBWG MeetingMay 17, 2007.ppt
- Class 19 Undecidability in Theory and Practice.ppt
- Classroom Management First Week Activities.ppt
- Cleaning and Shaping of the Root Canal System. Part II.ppt
- Cleveland, OhioJune 17, 2008.ppt
- CMS User Group Meeting April 19, 2007.ppt
- CNOOC EDRC AUG. 09, 2005.ppt
- Cognitive Psychology, 2nd Ed..ppt
- COHABITATION.ppt
- Collaborative Data Management for Longitudinal Studies.ppt
- Collaborative EMS System.PPT
最近下载
- 吊篮日常检查记录.doc VIP
- 16S401 管道和设备保温、防结露及电伴热.docx VIP
- 2025年黑龙江、吉林、辽宁、内蒙古高考地理试题评价分析与教学反思理试题评价分析与教学反思.docx
- 2019人教版高中数学A版 必修第2册《第九章 统计》大单元整体教学设计[2020课标].pdf
- 人教版(2024)八年级上册英语Unit 1 Happy Holiday教案.docx
- 建筑装饰设计基础第1章电子课件 .pptx VIP
- 心理健康教学课件:七年级上第1课走进心理健康课.pptx
- 天然气调压器切断阀介绍.ppt VIP
- 对外汉语时间教学.ppt VIP
- 《人造板工艺学》课件 第十三单元 生产工艺设计.ppt VIP
文档评论(0)