- 1、本文档共35页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
cnspp-ch09-Public Key Cryptography and RSA_图文.ppt
RSA Security three approaches to attacking RSA: brute force key search (infeasible given size of numbers) mathematical attacks (based on difficulty of computing ?(N), by factoring modulus N) timing attacks (on running of decryption) Factoring Problem mathematical approach takes 3 forms: factor N=p.q, hence find ?(N) and then d determine ?(N) directly and find d find d directly currently believe all equivalent to factoring have seen slow improvements over the years as of Aug-99 best is 130 decimal digits (512) bit with GNFS biggest improvement comes from improved algorithm cf “Quadratic Sieve” to “Generalized Number Field Sieve” barring dramatic breakthrough 1024+ bit RSA secure ensure p, q of similar size and matching other constraints Timing Attacks developed in mid-1990’s exploit timing variations in operations eg. multiplying by small vs large number or IFs varying which instructions executed infer operand size based on time taken RSA exploits time taken in exponentiation countermeasures use constant exponentiation time add random delays blind values used in calculations Summary have considered: principles of public-key cryptography RSA algorithm, implementation, security * * So far all the cryptosystems discussed have been private/secret/single key (symmetric) systems. All classical, and modern block and stream ciphers are of this form. * Will now discuss the radically different public key systems, in which two keys are used. Anyone knowing the public key can encrypt messages or verify signatures, but cannot decrypt messages or create signatures, counter-intuitive though this may seem. It works by the clever use of number theory problems that are easy one way but hard the other. Note that public key schemes are neither more secure than private key (security depends on the key size for both), nor do they replace private key schemes (they are too slow to do so), rather they complement them. * The idea of public key schemes, and the first practical scheme,
您可能关注的文档
最近下载
- 药品管理法2019年版.ppt VIP
- 2025届高考语文复习:小说中人情美与人性美的体现+课件.pptx VIP
- 北京图书馆藏珍本年谱丛刊(全200册)目录.doc VIP
- 强度计算.结构分析:冲击分析:结构冲击分析的优化设计.pdf VIP
- [人教版]初中生物会考模拟考试题(答案)知识分享.pdf
- 七年级下册劳动技术四单元1课《塑料》教案(人民出版社).docx
- 中考语文二轮专题复习:散文阅读——情感主旨(共30张精品课件).pptx VIP
- 2025年一级建造师-备考思维导图-法规.pdf VIP
- 13.10意志力是成功的先导.pptx
- 初中科学课程标准(2011版,纯word文档).docx
文档评论(0)