java自学网VIP

Java自学网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

查看: 2207|回复: 7

深入浅出密码学——常用加密技术原理与应用

[复制链接]

该用户从未签到

3

主题

155

帖子

313

积分

普通会员

Rank: 2

积分
313
发表于 昨天 18:17 | 显示全部楼层 |阅读模式
第1章密码学和数据安全导论·············1* @1 s  U( h0 F/ g6 [- @
1.1密码学及本书内容概述···············1
$ x$ S$ \1 n! U/ o1.2对称密码学··································3
0 j- U+ Y) C1 s$ l1 g9 A8 K, v1.2.1基础知识······························4: t5 R/ `5 o/ Z7 C4 Z) j8 v3 J& W
1.2.2简单对称加密:替换密码······5
3 z# r3 v2 S3 s1.3密码分析······································8
' N% T  H* F9 r7 \1.3.1破译密码体制的一般思路·······8# g/ J3 z3 P- F9 D+ e
1.3.2合适的密钥长度····················106 E8 Q& o" J7 I0 i8 J
1.4模运算与多种古典密码·············113 }$ f' [3 g4 u! a. P
1.4.1模运算···································12( h! `7 @, e2 ?8 X, l
1.4.2整数环···································150 S1 i& O3 F# }
1.4.3移位密码(凯撒密码)·············166 ?2 @0 t; ~  X0 ?5 O; u* A. ]# T
1.4.4仿射密码·······························18* {3 h) ^! u- Y+ L9 m$ k
1.5讨论及扩展阅读························19
( A5 B* B( P- D% l* v& X1.6要点回顾····································21  _2 N$ v/ y" D1 V
1.7习题············································21
& E. K7 m7 {' l; Z2 F. ^6 Z第2章序列密码·································27+ s% }6 R- O; k; W/ c
2.1引言············································27! E/ E: e6 Z1 I% O0 O; G! N: ?
2.1.1序列密码与分组密码·············27' @. _( n$ b& q0 w5 r5 l. g' f8 k+ d
2.1.2序列密码的加密与解密·········29$ r" ?! Q: ]# @# A/ E( K
2.2随机数与牢不可破的分组密码····32- Y8 `7 r6 u' Y; W+ e6 J1 E4 O' d
2.2.1随机数生成器························326 p; o5 `; X: {8 R7 O
2.2.2一次一密································34. n. E% A/ S5 B/ \; o
2.2.3关于实际序列密码················35$ w5 G  P5 }/ n
2.3基于移位寄存器的序列密码·····38
- C& ?2 y" N$ l7 U! s! p$ F4 {2.3.1线性反馈移位寄存器(LFSR)···39( W4 J0 ~, E) @, L( A* m
2.3.2针对单个LFSR的已知明文
. h6 \' |* Z  G攻击······································43& C& b8 F+ b; o  ]+ h
2.3.3Trivium··································44: I* t3 w$ x; O) o! d
2.4讨论及扩展阅读···························46
8 F" ~/ ]; D' {+ s, \) u* F2.5要点回顾····································47& _, d3 Y& e# T. O1 ]: o# E4 t" |
2.6习题············································48, N  ^4 C8 \$ [/ T
第3章数据加密标准与替换算法·······51" z+ f* ]/ f! |. l. }2 M
3.1DES简介····································51. i" n' ?& C" p
3.2DES算法概述····························54
' r* P. ?: h, M6 _' y7 `5 ]' k( {  a3.3DES的内部结构························56# y& a2 p8 V  A4 v" i1 A" V
3.3.1初始置换与逆初始置换·········56
" }4 }8 [0 H5 R  r5 @$ h. J3.3.2f函数······································584 r  k% ?5 y1 x# @
3.3.3密钥编排································63, n: J+ o2 \' {) \
3.4解密············································65! e0 ?: u4 L* J3 q+ b$ ]
3.5DES的安全性····························68* S. o' M* n  E. T& `* B' ~! c
3.5.1穷尽密钥搜索························68
7 V  Z$ g& c1 m$ Z2 T6 s; z9 ?6 Z6 i# N3.5.2分析攻击································70
. z/ K# J  n! k0 u# ?3.6软件实现与硬件实现·················71$ H' H8 X& @8 |
3.6.1软件········································71
9 ~) u& B6 \; O! {( B! H3.6.2硬件········································72- M0 g8 ]. A. g" N4 S' ?* }0 E
3.7DES替换算法····························72
0 T; ]) w9 N$ f2 N- x: s目录
5 g' ~$ v9 }5 E深入浅出密码学—常用加密技术原理与应用/ P4 W$ G' V) P( I1 J! S  c8 e" Q
VIII
1 W4 ^  z, }2 A3 i  O3.7.1AES和AES入围密码···········720 Y) @: s: W+ c1 U  a& r6 M
3.7.23DES与DESX·······················735 P+ G% M1 n3 G$ _( ]- @
3.7.3轻量级密码PRESENT···········730 y" T; p  k. j" Q: S8 B
3.8讨论及扩展阅读························76; B4 j- V. V6 S& s  X' [7 V; @
3.9要点回顾····································77
9 ]# Q4 P: d* e7 z* x3.10习题··········································789 e' i! }6 j. U! J
第4章高级加密标准·························833 _  I6 |0 y) w6 _+ ?, w! \6 p
4.1引言············································83
% |1 \5 K- H3 H( N4.2AES算法概述····························852 @: w( u' {/ w
4.3一些数学知识:伽罗瓦域简介···87% W8 |# F+ m2 I5 N; W, I
4.3.1有限域的存在性·····················87' u3 I" G  {: u% H6 u
4.3.2素域········································89" b" ]0 W! G7 [/ `4 q1 B+ v
4.3.3扩展域GF(2m)························90
( [( E* T4 n8 p: ]8 Q, s1 C9 G4.3.4GF(2m)内的加法与减法··········91
. Y* @0 ~% K0 E6 n4 U4.3.5GF(2m)内的乘法·····················91
4 f( \9 I/ ]% V0 R, \% j( S4.3.6GF(2m)内的逆操作·················93
' G9 t7 b/ m; J( t4.4AES的内部结构························95
; O# y+ ]+ ^0 I: l$ w4.4.1字节代换层·····························96
7 `" g2 }5 |; v$ K& X2 {# z6 w" A* }4.4.2扩散层····································99* a$ u! e9 ~$ |% ?
4.4.3密钥加法层···························101
, c& K/ L4 |/ N$ Y8 A' \4.4.4密钥编排·······························101- L: |3 _, t# s$ O/ T1 h
4.5解密··········································106
& S; P$ w/ ?3 E: N9 `: ^4.6软件实现与硬件实现···············1108 m  K* x$ a2 C6 M4 L
4.6.1软件······································110
# |1 ~7 u' i, [5 ]' i9 w4.6.2硬件······································111
8 K9 j! I# m3 a& X" Z4.7讨论及扩展阅读······················111% d9 ^. _% S! n2 \9 c! V
4.8要点回顾··································112
- ~* Y8 |* m9 r7 i% L8 V4.9习题··········································112: O) }* A3 E! b) Y- m
第5章分组密码的更多内容·············117. [2 I# w" @0 F$ Y- _4 Q! t9 r
5.1分组密码加密:操作模式·······117$ z# F' H( F$ J3 i3 D8 a$ l
5.1.1电子密码本模式(ECB)·······118
' D. e6 i1 P- Z# U5.1.2密码分组链接模式(CBC)·····122
# H) n: f( c! ~- e  Z3 {5.1.3输出反馈模式(OFB)············123
; {* _* d" T+ R5.1.4密码反馈模式(CFB)············125  A6 n4 _  q4 J* ~* \0 |- W0 ^
5.1.5计数器模式(CTR)················126
8 y5 \5 U% p3 V# v5.1.6伽罗瓦计数器模式(GCM)···127+ e5 l" I  ~1 e' D: ~9 J7 h7 w
5.2回顾穷尽密钥搜索··················129' u9 A0 z- N& i$ u4 O5 g( m
5.3增强分组密码的安全性···········130
; q, F" W+ z2 Q2 d' l5.3.1双重加密与中间人攻击······131
3 U: [& ?* v4 g  B* {7 x2 K  f5.3.2三重加密······························133# h  Z+ _( u- B8 A1 ]
5.3.3密钥漂白······························134
6 `- x9 F+ y/ o1 V( l5.4讨论及扩展阅读······················136. D+ R3 ?# S3 `' L- _
5.5要点回顾··································137# q) j- N9 ~. L1 e+ C2 O4 O3 G8 y+ p% l
5.6习题··········································137( \8 ~/ E; n% _$ [% _" b; O
第6章公钥密码学简介···················1411 g! N# B6 }! {
6.1对称密码学与非对称密码学···141- L% q9 G$ w6 u! W& M6 d0 A
6.2公钥密码学的实用性···············145
  w/ W' {+ \4 p8 C/ |) P6.2.1安全机制·····························145$ L; q5 n4 N* Y) A: T& L: ~
6.2.2遗留问题:公钥的可靠性···146
2 n2 {2 l( X2 m( [5 s6 T. U0 ?6.2.3重要的公钥算法·················146* w; p) ]" |1 a1 A! E2 L" r, {7 _+ l
6.2.4密钥长度与安全等级··········147+ M- P+ v' l$ k6 O
6.3公钥算法的基本数论知识·······148
/ A& y' N* n7 M0 d, W- i, w7 a6.3.1欧几里得算法·····················1488 a. D! a  J' L1 C3 _2 v2 h* _
6.3.2扩展的欧几里得算法··········151* s3 @! C' M% r% ^
6.3.3欧拉函数·····························155* i) H4 E9 {5 u( j
6.3.4费马小定理与欧拉定理······157/ W  N7 ?/ ?% Z/ ?
6.4讨论及扩展阅读······················159% t0 I% p% |& Z
6.5要点回顾··································160
" R- k! i0 h) b. L2 M7 B6.6习题··········································1603 c& ]4 K4 v+ x) z) y
第7章RSA密码体制······················163. [- [) ?9 `; b
7.1引言··········································164  C: X( S  G, c8 ^, h$ d- a" k
7.2加密与解密······························164* w( }9 }1 B  X' k  f7 i
7.3密钥生成与正确性验证···········165
* x7 E3 O) K- C4 H$ H9 C7.4加密与解密:快速指数运算···1695 C5 Z4 P* z8 l/ ?
目录
) i0 [1 m! q7 q2 m% G$ u$ Q  }' sIX
; M" p1 o$ W1 s- c7.5RSA的加速技术······················173
, @/ e9 d3 y8 K0 g: q7.5.1使用短公开指数的快速加密···1733 o/ a% A; I. H5 k8 G* B3 d; B
7.5.2使用中国余数定理的快速
; e2 @: d9 Y; f  ^9 ~. a) X% B加密······································174
5 S. H# ^" e: E7.6寻找大素数······························177
7 D' a3 m( Z0 A( y3 Y7.6.1素数的普遍性······················177! h1 J3 }) p8 A# x
7.6.2素性测试·····························178% I% x- C. _6 U) F9 L- F9 f" ^
7.7实际中的RSA:填充··············182$ g% o9 K( u3 b4 W" q# D
7.8攻击··········································1839 c6 T9 Z" M# E0 W2 s( n, R% H
7.9软件实现与硬件实现···············186+ O& b7 N, v: V
7.10讨论及扩展阅读······················187
( A5 D" a5 Z5 _7 x6 H" R2 s4 G7.11要点回顾··································188
8 z/ J/ ?0 E3 [+ I0 G( A7.12习题··········································189
1 Q& p6 A' v& Q) x+ z) k9 Y' i/ K* h第8章基于离散对数问题的公钥
% Y8 H& J: \" C密码体制·······························193
  O0 w5 t' E- ^  R% W9 P/ b# `, i8 N* m8.1Diffie-Hellman密钥交换·········194
$ u- ]& r' A$ b4 M8.2一些代数知识··························196
$ c9 b3 V0 K6 d* j( j, U8.2.1群·········································196
" \. K+ \% z1 N( X& z8.2.2循环群·································198
) n3 d5 y7 N# y- m" F% [' g8 a8.2.3子群·····································202; [2 B* B& A6 Z
8.3离散对数问题··························204
( ]+ }/ o6 ^; i6 `8.3.1素数域内的离散对数问题····204" G  C* N8 m0 M' D
8.3.2推广的离散对数问题············205+ C& s8 k8 o4 B, ^4 O
8.3.3针对离散对数问题的攻击····207 [2] & m% k9 ?* @  U" o2 K5 \- h
8.4Diffie-Hellman密钥交换的安0 y) n- a; R: @: E+ G9 R
全性···············································211
. |# g! C# f1 j0 @8.5Elgamal加密方案····················212
( I  |' P" @. |3 R: ]8.5.1从Diffie-Hellman密钥交换; c# y: c. d4 e- W% x- z* e
到Elgamal加密··················2124 p$ Z% J" D, D8 z( v: J1 j
8.5.2Elgamal协议·······················213* Y8 e1 W8 ?8 t( x
8.5.3计算方面·····························215" s; E. ]7 P4 |
8.5.4安全性·································216# l+ Z9 ^- S. \, h5 l3 E$ G! u; K
8.6讨论及扩展阅读······················218+ ]7 H- ^; {. ~7 i
8.7要点回顾··································219) o1 e3 ?; P" T
8.8习题··········································2194 C+ M, G& Q. q" i( e. C/ M
第9章椭圆曲线密码体制················225
' X' h* N  i0 s' B+ K! I9.1椭圆曲线的计算方式···············226! g0 ?! x6 S: C' [: f
9.1.1椭圆曲线的定义··················227
4 J9 B  |  K4 \, k- m9.1.2椭圆曲线上的群操作···········228
$ p* R$ ?; Y* ?9.2使用椭圆曲线构建离散对数
6 f6 r1 L4 {; H7 y! n2 o! k问题················································232
: _& k" s3 F0 g9.3基于椭圆曲线的Diffie-Hellman
' }; q( N0 i, i* Q密钥交换··································236& t* u' D% M0 I( D% Z; z
9.4安全性······································238
" ]) v! k, n6 ?9.5软件实现与硬件实现···············2382 B7 F. u. P) ^1 o$ S- [: Z( c3 t0 X
9.6讨论及扩展阅读······················239
% h4 l* B" t: }' k, [  u1 i+ h9.7要点回顾··································2417 I9 t, {/ K7 w4 p; ?
9.8习题··········································241
% W# g. x4 ^. Y8 ]第10章数字签名····························245
  T; c$ ~! \* e* T  f  ?10.1引言········································245
' `8 l: k, W5 M* x8 u10.1.1对称密码学尚不能完全
9 ~1 i  W' g! `, m/ e, L0 U满足需要的原因··············2461 s- y3 m: r! w
10.1.2数字签名的基本原理······247
/ z/ Z& a5 y) r1 Z- }10.1.3安全服务·························248$ C0 ?2 ?* j% B# M
10.2RSA签名方案························2496 ]) {+ |1 ?5 n: Z- L7 ~
10.2.1教科书的RSA数字签名···250
6 F: j% _1 t1 `: n10.2.2计算方面··························251
/ z# O1 E- e! ~$ s& K' x  f* u10.2.3安全性······························252: a  }; |$ {0 Z# u
10.3Elgamal数字签名方案··········255
( U3 G' j- _) j4 {9 Z7 K10.3.1教科书的Elgamal( {3 S# D0 r) R& ~# H# j+ f) J; {
数字签名··························255
" \. E' U1 J- M% q9 ^: }4 n4 N10.3.2计算方面··························2572 t+ T# P+ P  A5 t6 S' K: h
10.3.3安全性······························258 [2]
* s" U; p. b* j' T1 f8 ~: j4 x2 }10.4数字签名算法························261
. i1 z! {) c3 N8 u( E10.4.1DSA算法·························261
. m6 |0 f6 a' W* T# Q6 X) x/ C深入浅出密码学—常用加密技术原理与应用' v0 b, s1 b8 M8 W5 S. x; _! |$ U. k
X
! H1 E, \6 A, t$ E10.4.2计算方面··························264
- V& G( Z. u, t2 O0 }2 B8 y. ?10.4.3安全性······························265$ K$ b; C- q$ @, i5 f6 b5 K
10.5椭圆曲线数字签名算法·········266
9 A& P8 h' R" q/ x+ `0 `8 p2 o10.5.1ECDSA算法····················267# p- H+ q5 i( x" H. s1 P2 A
10.5.2计算方面··························270
( }6 V4 {7 b2 T2 N1 N10.5.3安全性······························270
  D$ v, ]2 k: d10.6讨论及扩展阅读····················271, s3 h; p) Z6 z; q. k: r; |) L  |
10.7要点回顾································272
1 G+ J+ H, b. d5 f+ T+ u) v& o# l10.8习题········································272
3 n: G  g% |9 Y0 N( f: ?第11章哈希函数·····························277
0 u  I) f9 _! l" w% `. q11.1动机:对长消息签名·············277: m3 {! z/ i/ _; V( W4 n8 O
11.2哈希函数的安全性要求·········280. [, s$ x; L. o5 V' T$ Z
11.2.1抗第一原像性或单向性···280
! W6 g- U6 [6 Q1 H3 h( ]11.2.2抗第二原像性或弱抗# c6 u1 i7 g, n0 `0 u
冲突性······························281  Y  [) G1 e5 F, r/ z
11.2.3抗冲突性与生日攻击·······282
4 C$ J8 _! M  v) n+ R11.3哈希函数概述·························286
+ A& B  e* `; _1 i# y11.3.1专用的哈希函数:MD4
7 o" Z+ v* N7 d6 l/ a" }" C家族··································287! V1 I/ l% ~* F* q5 d3 M1 ^
11.3.2从分组密码构建的哈希: K5 k! F1 @2 q+ ^" X8 o% e' I
函数··································288
! K6 K% V: M; n  H4 N11.4安全哈希算法SHA-1·············290
1 i% G6 w/ A: f- M/ ]4 R3 H$ @11.4.1预处理······························291
4 q6 |, V8 T) b" l6 Q/ J11.4.2哈希计算··························292+ L# G0 t; }1 D
11.4.3实现··································294
& Z$ \+ n9 a% z8 Y5 n11.5讨论及扩展阅读·····················2955 `4 O- W; X/ c/ `8 v6 a' {% ~
11.6要点回顾································296* B- R  j/ K7 E' C2 S, G' x5 Q5 N
11.7习题········································297
0 U" Z; j% a/ r, o8 A4 w- q- O1 N+ y第12章消息验证码·························301
" P% s( L  K' Z! P% E12.1消息验证码的基本原理·········3011 M2 L0 l5 w+ @" I2 O+ H! i+ q
12.2来自哈希函数的MAC:
0 x( d7 s5 f2 w! c3 \0 `- X9 uHMAC····································3033 E2 y8 P! z- Z4 }
12.3来自分组密码的MAC:
% T4 O0 G3 u3 j$ Q& cCBC-MAC·····························307' k5 W5 z/ F- J2 C3 J' Y: ?
12.4伽罗瓦计数器消息验证码·····308
* S( C' [' M- w12.5讨论及扩展阅读····················309* [. R0 P* n- \  W9 ~8 j9 j% W: s
12.6要点回顾································309
6 J9 J7 p6 r+ a* q5 T12.7习题········································310
( X$ C* _. g0 x7 ^; u7 x第13章密钥建立····························313
9 w8 _' X- R0 g8 z- o; R6 b13.1引言········································314; D* N- Y6 H0 u) G; ~* A0 y
13.1.1一些术语··························314: x6 e4 \$ M# I" l1 W* W/ s# v
13.1.2密钥刷新和密钥衍生·······3140 f4 U6 ]4 r9 o5 T) p
13.1.3n2密钥分配问题··············316
1 ^7 @5 I  d1 p6 h, r4 i13.2使用对称密钥技术的密钥  W% K% R" [$ b) f& {" M
建立··············································317
  V8 I) ]4 i7 e' Y13.2.1使用密钥分配中心的密钥
2 }, Q4 _% H3 l建立··································318
1 B+ R* C: C+ t" c13.2.2Kerberos···························321
- g3 M% v, g. g1 k( L1 b13.2.3使用对称密钥分配的其他4 z6 ]4 F2 {/ |: `0 |+ n
问题·································323* O! Z: k+ W' u$ ]
13.3使用非对称密钥技术的密钥
! d" G& ^( q* C0 x% K! @建立·······································323! X% c  a1 B* |$ M4 c1 L1 ~  g5 v% _
13.3.1中间人攻击······················324
! T: a$ a/ q, f- \& E  `8 c13.3.2证书·································3269 ^9 X. [3 F# ?8 w' i% X
13.3.3PKI和CA························329' S/ d" e7 {2 H% q" t# ?
13.4讨论及扩展阅读····················332- A. A: M/ s% l# K( {
13.5要点回顾································333: J7 m+ l$ E  x% e: P  G7 y8 @5 E0 q  q
13.6习题········································333
8 O( Q# [0 G+ c参考文献·················································339$ ^6 l2 R0 ^# u' I$ J0 G# ^- F8 d
) V- r* n/ }8 T

$ x; w$ k3 ^$ \8 U4 Q/ M& q侵权联系与免责声明1、本站资源所有言论和图片纯属用户个人意见,与本论坛立场无关
1 U# B% p" S7 @2、本站所有资源收集于互联网,由用户分享,该帖子作者与瑞客论坛不享有任何版权,如有侵权请联系本站删除3 `, n+ t, Q3 _- e/ H- V) `
3、本站部分内容转载自其它网站,但并不代表本站赞同其观点和对其真实性负责
/ X# f( h/ I9 W( D$ d( g4、如本帖侵犯到任何版权问题,请立即告知本站,本站将及时予与删除并致以最深的歉意9 G$ Y* }% ~6 T8 w  H5 k
如有侵权联系邮箱:ruikelink@gmai.com深入浅出密码学——常用加密技术原理与应用.zip" \, F7 W3 {1 l7 c, g: |
资源下载地址和密码(百度云盘):
游客,如果您要查看本帖隐藏内容请回复
[/hide] 百度网盘信息回帖可见
8 [8 \7 i$ P- o' L2 W5 v
% i# s" m* v+ w8 }! e' v/ l
8 m1 Z- e+ U  D- i
, ^* [$ M* G' V! }' u, s5 L' e$ y本资源由Java自学网收集整理【www.javazx.com】
回复

使用道具 举报

该用户从未签到

3

主题

159

帖子

315

积分

普通会员

Rank: 2

积分
315
发表于 昨天 18:31 | 显示全部楼层
激动人心,无法言表!
回复 支持 反对

使用道具 举报

该用户从未签到

3

主题

151

帖子

297

积分

普通会员

Rank: 2

积分
297
发表于 昨天 18:35 | 显示全部楼层
666
回复 支持 反对

使用道具 举报

该用户从未签到

5

主题

167

帖子

329

积分

普通会员

Rank: 2

积分
329
发表于 昨天 18:46 | 显示全部楼层
多谢分享!
回复 支持 反对

使用道具 举报

该用户从未签到

3

主题

156

帖子

283

积分

普通会员

Rank: 2

积分
283
发表于 昨天 18:58 | 显示全部楼层
111
回复 支持 反对

使用道具 举报

该用户从未签到

8

主题

156

帖子

320

积分

普通会员

Rank: 2

积分
320
发表于 昨天 19:07 | 显示全部楼层
看到这帖子真是高兴!
回复 支持 反对

使用道具 举报

该用户从未签到

3

主题

149

帖子

291

积分

普通会员

Rank: 2

积分
291
发表于 昨天 19:17 | 显示全部楼层
强烈支持楼主ing……
回复 支持 反对

使用道具 举报

该用户从未签到

9

主题

174

帖子

353

积分

普通会员

Rank: 2

积分
353
发表于 昨天 19:22 | 显示全部楼层
强烈支持楼主ing……
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|Archiver|手机版|小黑屋|Java自学网

GMT+8, 2024-11-21 20:33 , Processed in 0.111194 second(s), 30 queries .

Powered by Javazx

Copyright © 2012-2022, Javazx Cloud.

快速回复 返回顶部 返回列表