security-part2-12-安全工程解说.ppt

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Security Engineering Security Computer Science Tripos part 2 Ross Anderson Chosen protocol attack The Mafia demands you sign a random challenge to prove your age for porn sites! Building a Crypto Library is Hard! Sound defaults: AES GCM for encryption, SHA256 for hashing, PKC with long enough keys Defend against power analysis fault analysis, timing analysis (cache attacks on AES), and other side-channel attacks. This is nontrivial! Take great care with key management and interface design Don’t let keys be reused for more than one purpose (‘leverage’ considered harmful) My strong advice: do not build a crypto library! If you must, you need specialist (PhD-level) help But whose can you trust? How Certification Fails PEDs ‘evaluated under the Common Criteria’ were trivial to tap GCHQ wouldn’t defend the brand APACS said (Feb 08) it wasn’t a problem It sure is now… Cryptographic Engineering 19c Auguste Kerckhoffs’ six principles, 1883 The system should be hard to break in practice It should not be compromised when the opponent learns the method – security must reside in the choice of key The key should be easy to remember change Ciphertext should be transmissible by telegraph A single person should be able to operate it The system should not impose mental strain Many breaches since, such as Tannenberg (1914) What else goes wrong See ‘Why cryptosystems fail’, my website (1993): Random errors Shoulder surfing Insiders Protocol stuff, like encryption replacement Second big wave now (see current papers): ATM skimmers Tampered PIN entry devices Yes cards and other protocol stuff Watch this space! Security Engineering No different in essence from any other branch of system engineering Understand the problem (threat model) Choose/design a security policy Build, test and if need be iterate Failure modes: Solve wrong problem / adopt wrong policy Poor technical work Inability to deal with evolving systems Inability to deal with conflict over goals A Framework Economics

文档评论(0)

希望之星 + 关注
实名认证
内容提供者

我是一名原创力文库的爱好者!从事自由职业!

1亿VIP精品文档

相关文档