- 8
- 0
- 约1.78万字
- 约 40页
- 2018-12-03 发布于广西
- 举报
Subsequent developments August 2004: X. Wang et al.: actual random collisions in MD4 (‘no time’), MD5 in time ? 239, etc., for any IV A. Joux: cascading of iterated L-bit and perfect M-bit hash does not result in L+M-bit hash – as commonly believed A. Joux: actual random collision for SHA-0 in time ? 251 E. Biham: cryptanalysis of SHA-1 variants October 2004, Kelsey/Schneier (based on Joux): 2nd preimage weakness in any iterated hash (improving Dean) Feb 14, 2005, X. Wang et al. (based on Wang/Joux/Biham): actual random collision for SHA-0 in time ? 239 random collision possibility for SHA-1 in time ? 269 (or 266) (advantage: 269 280 ) 2 Hash Functions 3 Digital Signatures Public-key encryption Alice publishes encryption key Anyone can send encrypted message Only Alice can decrypt messages with this key Digital signature scheme Alice publishes key for verifying signatures Anyone can check a message signed by Alice Only Alice can send signed messages Properties of signatures Functions to sign and verify Sign(Key-1, message) Verify(Key, x, m) = Resists forgery(抗伪造) Cannot compute Sign(Key-1, m) from m and Key Resists existential forgery: given Key, cannot produce Sign(Key-1, m) for any random or otherwise arbitrary m true if x = Sign(Key-1, m) false otherwise 3 Digital Signatures Creating a Digital Signature 3kJfgf*£$ Py75c%bn This is the document created by Gianni Message or File Digital Signature Message Digest Calculate a short message digest from even a long input using a one-way message digest function (hash) Signatorys private key priv Generate Hash SHA, MD5 Asymmetric Encryption RSA This is the document created by Gianni 3kJfgf*£$ SignedDocument (Typically 128 bits) 3 Digital Signatures Verifying a Digital Signature RSA This is the document created by Gianni 3kJfgf*£$ SignedDocument Py75c%bn Message Digest Generate Hash Giannis public key(from certificate) Asymmetric Decryption pub DigitalSig
您可能关注的文档
- 《B2B机票分销管理系统》-公开·课件设计.ppt
- 《B2B和黄页的使用技巧》-公开·课件设计.ppt
- 《B2B会员网站日常维护方法》-公开·课件设计.ppt
- 《B2B交易电子订单》-公开·课件设计.ppt
- 《B2B讲义》-公开·课件设计.ppt
- 《B2B交易概述》-公开·课件设计.ppt
- 《B2B模式及营销产品》-公开·课件设计.ppt
- 《B2B课件1》-公开·课件设计.ppt
- 《B2B培训》-公开·课件设计.ppt
- 《B2B实验》-公开·课件设计.ppt
- 《Chapter 7 B2B》-公开·课件设计.ppt
- 《Chapter 05 投资管理 01现金流估计》-公开·课件设计.ppt
- 《chap1 电子商务概述3》-公开·课件设计.ppt
- 《chapter》-公开·课件设计.ppt
- 《Chapter%2006%20广告运作规律》-公开·课件设计.ppt
- 《chapter1-概述and调研步骤》-公开·课件设计.ppt
- 《chapter2 黑客常用的系统攻击方法1_扫描器》-公开·课件设计.ppt
- 《chapter2 黑客常用的系统攻击方法313521988》-公开·课件设计.ppt
- 《chapter2 黑客常用的系统攻击方法404321990》-公开·课件设计.ppt
- 《Chapter3(New)》-公开·课件设计.ppt
最近下载
- 《海上风电场工程风电机组基础设计规范》.pdf VIP
- 数学试卷答案【新高考I卷】【山东卷】【高考真题】山东省2025年山东省普通高等学校招生全国统一考试(新I卷)(6.7-6.9).docx VIP
- 桑黄编制说明.doc VIP
- 复变函数1省公开课金奖全国赛课一等奖微课获奖课件.pptx VIP
- 316L 不锈钢收缩率实验报告.docx VIP
- 中油《炼油化工企业污水回用管理导则》.doc VIP
- 《黄土高原》参考2省公开课金奖全国赛课一等奖微课获奖PPT课件.pptx VIP
- 黄土高原参考课件2.pptx VIP
- 人教版高中生物选择性必修二全册教学课件.pptx
- 上行社会比较量表.docx VIP
原创力文档

文档评论(0)