CIT 380 Securing Computer Systems.ppt

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
CIT 380 Securing Computer Systems.ppt

CIT 380: Securing Computer Systems CIT 380: Securing Computer Systems Slide #* CIT 380: Securing Computer Systems Modern Cryptography CIT 380: Securing Computer Systems Slide #* Overview Cryptographic Checksums Hash Functions HMAC Number Theory Review Public Key Cryptography One-Way Trapdoor Functions Diffie-Helman RSA Modern Steganography CIT 380: Securing Computer Systems Slide #* Hash Functions Checksum to verify data integrity. Hash Function h: A?B Input A: variable length Output B: fixed length “fingerprint” of input Many inputs produce same output. Example Hash Function Sum 32-bit words of message mod 232. CIT 380: Securing Computer Systems Slide #* Hash Function: ASCII Parity ASCII parity bit ASCII has 7 bits; 8th bit is for “parity” Even parity: even number of 1 bits Odd parity: odd number of 1 bits Bob receives as bits. Sender is using even parity; 6 1 bits, so character was received correctly Note: could be garbled, but 2 bits would need to have been changed to preserve parity Sender is using odd parity; even number of 1 bits, so character was not received correctly CIT 380: Securing Computer Systems Slide #* Cryptographic Checksums Hash with authentication/integrity protection Cannot obtain original message from hash. Cannot find another message with same hash. Additional Names Message Authentication Code Message Digest CIT 380: Securing Computer Systems Slide #* One-Way Function Function f easy to compute, hard to reverse Given x, easy to calculate f(x). Given f(x), hard to compute x. What’s easy and what’s hard? easy: polynomial time hard: exponential time Are there any one-way functions? CIT 380: Securing Computer Systems Slide #* Cryptographic Checksum Definition A function h: A?B such that: For any x IN A, h(x) is easy to compute. For any y IN B, it is computationally infeasible to find x IN A such that h(x) = y. It is computationally infeasible to find x, x′ IN A such that x ≠ x′ and h(x) = h(x′). CIT 380: Securing Computer Systems Sli

文档评论(0)

shengyp + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档