- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Security Engineering Security Computer Science Tripos part 2 Ross Anderson Chosen protocol attack The Mafia demands you sign a random challenge to prove your age for porn sites! Building a Crypto Library is Hard! Sound defaults: AES GCM for encryption, SHA256 for hashing, PKC with long enough keys Defend against power analysis fault analysis, timing analysis (cache attacks on AES), and other side-channel attacks. This is nontrivial! Take great care with key management and interface design Don’t let keys be reused for more than one purpose (‘leverage’ considered harmful) My strong advice: do not build a crypto library! If you must, you need specialist (PhD-level) help But whose can you trust? How Certification Fails PEDs ‘evaluated under the Common Criteria’ were trivial to tap GCHQ wouldn’t defend the brand APACS said (Feb 08) it wasn’t a problem It sure is now… Cryptographic Engineering 19c Auguste Kerckhoffs’ six principles, 1883 The system should be hard to break in practice It should not be compromised when the opponent learns the method – security must reside in the choice of key The key should be easy to remember change Ciphertext should be transmissible by telegraph A single person should be able to operate it The system should not impose mental strain Many breaches since, such as Tannenberg (1914) What else goes wrong See ‘Why cryptosystems fail’, my website (1993): Random errors Shoulder surfing Insiders Protocol stuff, like encryption replacement Second big wave now (see current papers): ATM skimmers Tampered PIN entry devices Yes cards and other protocol stuff Watch this space! Security Engineering No different in essence from any other branch of system engineering Understand the problem (threat model) Choose/design a security policy Build, test and if need be iterate Failure modes: Solve wrong problem / adopt wrong policy Poor technical work Inability to deal with evolving systems Inability to deal with conflict over goals A Framework Economics
您可能关注的文档
最近下载
- 2025年教学查房——高血压.pptx VIP
- 山西省2026届高三第一次八省联考语文(T8联考)(含答案).pdf VIP
- 2026五个带头发言材料三.docx VIP
- 新能源汽车行业产业人才需求分析报告.docx
- 广西急难型、支出型临时救助审核认定表、申请社会救助家庭经济状况核对授权书、告知书、领取表.docx VIP
- 一年级上册语文期末复习-看拼音写词语4_苏教版.doc VIP
- 2026年成都农商银行软件开发岗(应用架构方向)社会招聘10人备考题库(含答案详解).docx VIP
- 培智生活数学五年级上册教案人民教育出版社.pdf VIP
- 2025北京海淀初一(上)期末生物(含答案).pdf VIP
- 天坛的介绍课件.pptx VIP
原创力文档


文档评论(0)