- 1、本文档共59页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
计算机安全PPT2
1
Chapter 2
Conventional Encryption
2
Outline
Conventional Encryption Principles
Conventional Encryption Algorithms
Cipher Block Modes of Operation
Location of Encryption Devices
Key Distribution
3
Symmetric Encryption
A.k.a. conventional / secret-key / single-key
Sender and recipient share a common key
All classical encryption algorithms are secret-key-based
Was the only type prior to the invention of public-key in 1970’s
By far most widely used
4
Conventional Encryption Principles
An encryption scheme has five ingredients:
Plaintext
Encryption algorithm
Secret key
Ciphertext
Decryption algorithm
Security depends on the secrecy of the key, not the secrecy of the algorithm
Why?
5
Some Basic Terminology
Cipher
Algorithm for transforming plaintext to ciphertext
Encipher (encrypt)
Converting plaintext to ciphertext
Decipher (decrypt)
Recovering ciphertext from plaintext
Cryptography
Study of encryption principles/methods
Cryptanalysis (codebreaking)
Study of principles/ methods of deciphering ciphertext without knowing key
Cryptology
Field of both cryptography and cryptanalysis
6
Conventional Encryption Principles
7
Requirements
Two requirements for secure use of symmetric encryption:
A strong encryption algorithm
A secret key known only to sender and receiver
Mathematically we have:
Y = EK(X)
X = DK(Y)
Assume encryption algorithm is known
Implies a secure channel to distribute key
8
Cryptography
Characterize cryptographic systems by:
Type of encryption operations used
Substitution / transposition / product
Some examples will be discussed later
Number of keys used
Single-key or secret / two-key or public
Way in which plaintext is processed
Block / stream
9
Cryptanalysis
Objective
Recover key not just message
General approaches:
Cryptanalytic attack
Brute-force attack
10
Cryptanalytic Attacks
Ciphertext only
Only know algorithm ciphertext, is statistical, know or can identify plaintext
Known plaintext
Know/suspect plaintext ciphertext
Chosen plaintext
Sele
您可能关注的文档
- 四川省资阳市2013届高三第二次高考模拟考试数学(文)试题 (2013资阳二模).doc
- 语文中考试题训练(标点题) (共79张).ppt
- 江西省南昌市10所省重点中学命制2013届高三第二次模拟突破冲刺数学(文)试题(七).doc
- 防治水培训.ppt
- Coolite Cool Study 1 在Grid中用ComboBox 来编辑数据.doc
- 2014年辽宁省信息技术学业水平考试(模拟卷●3).doc
- 第3章 多核嵌入式系统硬件结构.ppt
- 2017年公需科目《职业幸福感的提升》题库(最新最全).doc
- 江西万载2016届高三新课标人教版地理必修二第四章工业地域的形成与发展单元检测训练试卷.doc
- 1.教学设计:食物中的营养.doc
- 2024高考物理一轮复习规范演练7共点力的平衡含解析新人教版.doc
- 高中语文第5课苏轼词两首学案3新人教版必修4.doc
- 2024_2025学年高中英语课时分层作业9Unit3LifeinthefutureSectionⅢⅣ含解析新人教版必修5.doc
- 2024_2025学年新教材高中英语模块素养检测含解析译林版必修第一册.doc
- 2024_2025学年新教材高中英语单元综合检测5含解析外研版选择性必修第一册.doc
- 2024高考政治一轮复习第1单元生活与消费第三课多彩的消费练习含解析新人教版必修1.doc
- 2024_2025学年新教材高中英语WELCOMEUNITSectionⅡReadingandThi.doc
- 2024_2025学年高中历史专题九当今世界政治格局的多极化趋势测评含解析人民版必修1.docx
- 2024高考生物一轮复习第9单元生物与环境第29讲生态系统的结构和功能教案.docx
- 2024_2025学年新教材高中英语UNIT5LANGUAGESAROUNDTHEWORLDSect.doc
文档评论(0)