- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Chapter 4 Key Management Key Management Manage all stages of keys in the whole lifecycle, including the generation, storage, distribution, organization, employment, suspension, update destruction(产生、存储、分配、组织、使用、停用、更换、销毁) Overview 1 Principle All-around Security 全程安全 Minimal Right 最小权利 Responsibility Separation 责任分离 Key Classification 密钥分级 Key Replacement 密钥更换 Enough Length 足够长度 Different cryptosystem, different management policy 针对不同密码体制采取不同管理策略 2 Key Management for Symmetric Cipher Centralization, KDC distributes session key for every session and tends to be the bottleneck and the attacking aim Key Organization Classification – Elementary Key初级密钥: used for encrypting decrypting data Kc (for communication), Ks (for session), Kf (for file) – Secondary Key二级密钥: used for protecting EK KNC, KNS, KNF (N----node) – Master Key主密钥: the topmost level KM Elementary Key Key for encryption decryption, Kc for communication, Ks for session, Kf for file storage Generated by hardware or software of the system, can also be specified by user Kc Ks is one-time pad, while the lifecycle of Kf is as long as the file K is protected by KN during its lifecycle Secondary Key Key to protect elementary key, KNC for Kc, KNS for Ks, KNF for Kf Generated by hardware or software Lifecycle is long KN is protected by KM during its lifecycle Master Key The maximal key in key management system Generated by hardware and installed/distributed by security experts Have the longest lifecycle Key Generation Different strategies for different level keys Randomicity: long-period, non-linear, equal-probability, uncertain High-level key: real-randomicity Low-level key: pseudo-randomicity Generation of Master Key Real-randomicity sequences with high quality Means: transform the random simulation signals from the nature into digitals, based on the mechanics noise source or the electronics noise source Generation of Secondary Key Encrypt the random numbers KN=E(E(E(E(i,RN1),RN2),RN1),RN3), i is a ordi
您可能关注的文档
最近下载
- 企业拓展训练培训服务方案.docx VIP
- 抗风湿药的分类与临床应用.pptx VIP
- 四上企业统计培训课件.pptx VIP
- 四上企业入库培训课件.pptx VIP
- 7郭永康+光在晶体和液晶中传播-4.ppt VIP
- 7郭永康光在晶体和液晶中传播2.ppt VIP
- 西门子SINUMERIK 802S base line SINUMERIK 802C base line简明操作与编程(中文).pdf
- 2024-2025统编版六年级上册道德与法治期末试题汇编:连线题(含答案).pdf VIP
- 李镇西《做最好的家长》读书交流.pptx VIP
- (最新)江苏省七年级下学期第一次月考英语试卷.pdf VIP
文档评论(0)