|
第1章密码学和数据安全导论·············1# {5 F6 o+ }# B
1.1密码学及本书内容概述···············1# W6 \( r4 H) C" G& h$ B) `9 s6 S
1.2对称密码学··································35 n+ l, v# ^. m5 {* p4 u
1.2.1基础知识······························4: M8 u S9 r$ n4 L! C
1.2.2简单对称加密:替换密码······5
% k. r4 b5 x4 D( V) C+ Q1.3密码分析······································8. S- q n( }, p2 f9 |" u+ A
1.3.1破译密码体制的一般思路·······87 \# P: J' w) ^7 F
1.3.2合适的密钥长度····················109 X/ d. J [! `8 a, a9 R( u
1.4模运算与多种古典密码·············114 d+ n% g( X) l+ |
1.4.1模运算···································12" o9 o: {- s1 x( ?5 `
1.4.2整数环···································15
" {" H' ^2 T8 r" x1.4.3移位密码(凯撒密码)·············16 n8 y6 C: n" T+ s
1.4.4仿射密码·······························18
8 v, x$ [/ v6 L1 t4 V; |1.5讨论及扩展阅读························19" Q* u* s0 m; x# ^1 V
1.6要点回顾····································215 o" r+ X) p- \# A) o5 s& R, o
1.7习题············································21
, b5 e/ Z( t8 k y第2章序列密码·································27
, y+ e; o! g7 @9 T, Y# A& J2.1引言············································27# ~+ P. |4 E/ C$ ?, ?9 A5 ]$ G
2.1.1序列密码与分组密码·············27
+ Z; h+ T" y! c f1 @2.1.2序列密码的加密与解密·········29# X g0 y; @& G4 q# n
2.2随机数与牢不可破的分组密码····32
5 Q! I! `% |2 ~: E2 c2 c$ L2.2.1随机数生成器························32 ^( s% h. l6 ^- N$ z$ O" \
2.2.2一次一密································34
9 O& m. D9 y2 t4 v2 d2 A2.2.3关于实际序列密码················35
+ P1 P { V9 _0 z9 j2.3基于移位寄存器的序列密码·····386 ~5 G3 O j( d- S( }% d" x" @$ v
2.3.1线性反馈移位寄存器(LFSR)···39
* O! x q+ C! e8 ]0 x4 B; G" E) V, T2.3.2针对单个LFSR的已知明文% ]& V' R2 e5 ]$ Z
攻击······································437 F2 R/ }7 k2 c' {9 L5 t
2.3.3Trivium··································44
+ |: O; t/ U7 c, m5 Z; W, t2.4讨论及扩展阅读···························46
; R' y* u. a0 C3 T2.5要点回顾····································478 S, r8 t& r. H7 h' P5 o! e# @
2.6习题············································48
# l7 `* o- ^' m: [第3章数据加密标准与替换算法·······51$ u( b( j, b1 Z% E5 Z
3.1DES简介····································51$ B* A# g! v/ @
3.2DES算法概述····························54
& m6 U* z. y, B+ X7 c3.3DES的内部结构························56( [ w0 ~9 E/ {$ Y% e6 d+ \
3.3.1初始置换与逆初始置换·········561 D, x4 V9 F V( v( ?
3.3.2f函数······································58
+ S5 h9 F$ K3 Z t2 l3.3.3密钥编排································63& O( X1 a& @' q8 d9 F# p! k/ E
3.4解密············································65! Y) T& M; M9 T* E# e s8 K
3.5DES的安全性····························684 y6 x8 U: k8 d. e6 _3 F
3.5.1穷尽密钥搜索························688 u& K( o; S# D7 a Z! ]; M6 I1 a
3.5.2分析攻击································70% x2 t E# m% w/ O, s
3.6软件实现与硬件实现·················71& A. G$ m+ I! C/ t' D
3.6.1软件········································71
% Q: \) y, g' U" E. w3.6.2硬件········································72
3 g6 I s- @# _3.7DES替换算法····························72, |0 P z6 m) `$ d0 r/ @
目录$ j v: K- _+ I" r: f; g4 E9 h
深入浅出密码学—常用加密技术原理与应用
. Q8 t& I# A3 p* @- j4 kVIII
" W: ], K8 B3 f5 R% P4 S: W6 D. y3.7.1AES和AES入围密码···········72
3 \" u8 b' k3 T2 }2 `3.7.23DES与DESX·······················73
& a7 s: t& z- g, ]5 R6 ^# {& X0 i3.7.3轻量级密码PRESENT···········73+ } @; c* W. G9 Z& M2 R
3.8讨论及扩展阅读························76
+ j6 ]. N, [1 l- {9 [' ?3.9要点回顾····································77
# S' T' r9 ?. y8 c% s" t3.10习题··········································78
- Z2 w) e! H' ^$ s' ?) X第4章高级加密标准·························83# o3 r5 w4 N# X f$ t6 N4 B# T% x
4.1引言············································83
; c4 `% h6 y$ h6 R4.2AES算法概述····························85) s& |! E" ]2 y% T; ~' b
4.3一些数学知识:伽罗瓦域简介···87
6 k7 u/ M/ L0 ]7 [1 B4.3.1有限域的存在性·····················87
; R) u) [7 u, ~, A4.3.2素域········································898 P" X; }' d, W! w$ K$ K( |0 c
4.3.3扩展域GF(2m)························90' a3 @( A4 x2 P: p
4.3.4GF(2m)内的加法与减法··········915 H p* \8 W- T" y
4.3.5GF(2m)内的乘法·····················91
" q1 ]! w% V& B/ }, ]) |4.3.6GF(2m)内的逆操作·················93
8 N( }( W5 m: e/ s1 w: q4.4AES的内部结构························95
' K6 S6 ^# T( N* |8 l8 F3 ] o4.4.1字节代换层·····························96
, h) v/ F% D5 @: x. W2 _! L4.4.2扩散层····································99
9 d9 w4 u+ i. V1 V0 J) X" ~) n2 M" y4.4.3密钥加法层···························101+ I/ S" n+ \+ r# {& h- \; P; N
4.4.4密钥编排·······························101
& H: m8 D' V4 q8 T6 D& ?4.5解密··········································106
: _: ^* c4 l1 l4.6软件实现与硬件实现···············110% k" X! b; } t0 p, }
4.6.1软件······································110
8 o0 X! l5 D' E. @9 ~9 s7 ^4.6.2硬件······································111 P3 Z7 a+ c8 Z0 t. r
4.7讨论及扩展阅读······················111
% T+ B1 I* k! O* j/ y/ l" J9 B4.8要点回顾··································112
b9 y% F: w1 d3 A; \" m! o$ T# }4.9习题··········································1123 ?. A8 ?# W! W. Y; X& u
第5章分组密码的更多内容·············117
* s U1 g* v% g) b; E! m- i5.1分组密码加密:操作模式·······117
+ `/ v- A4 I6 @% Z8 T5 x5.1.1电子密码本模式(ECB)·······118
/ [+ M9 q! B' O$ Y0 w+ x( N7 j5.1.2密码分组链接模式(CBC)·····122
* p6 Q6 [9 l/ G4 C- u6 u( A* X! }5.1.3输出反馈模式(OFB)············123
4 @! f, H3 m# z6 {# ^( W* x% c5.1.4密码反馈模式(CFB)············125* r- U" {5 A# L+ j& Q5 Y; F1 \1 w
5.1.5计数器模式(CTR)················126* g- c' O* y) A+ M! O# t& U- _# y
5.1.6伽罗瓦计数器模式(GCM)···127! g- j2 G. L8 L% ~. Y* W
5.2回顾穷尽密钥搜索··················1299 ^1 P% S+ N8 N4 K+ ?- Y
5.3增强分组密码的安全性···········130; S$ [# q# O F; }+ i" I, t
5.3.1双重加密与中间人攻击······131
. H h1 N* J. U( K) {5.3.2三重加密······························133- H1 ~! b$ Z0 \& P- k
5.3.3密钥漂白······························134$ F/ N/ l6 R- o u+ @( c* D
5.4讨论及扩展阅读······················136
/ A5 S$ q' j# l6 k( R4 v' O }5.5要点回顾··································1373 |4 |9 ~: }; U! W; ~1 v
5.6习题··········································1376 X; U' B" t8 V2 y* h& H0 H
第6章公钥密码学简介···················141
0 [2 k5 ? Q: t+ ]4 Q0 Q! Q6.1对称密码学与非对称密码学···141; s) ~' N9 M; \0 w! f0 x: @
6.2公钥密码学的实用性···············145
$ r, z; a7 o8 I, r" @4 A/ [! J* E6.2.1安全机制·····························145
4 A1 Y8 J+ T3 Q4 X6 r a6.2.2遗留问题:公钥的可靠性···146
3 x* r0 o6 t- _* O& g6.2.3重要的公钥算法·················1464 g# Z: c' k; q/ O# Q# V5 U% G
6.2.4密钥长度与安全等级··········147$ _% D, c7 Q! O2 K6 b- m- _
6.3公钥算法的基本数论知识·······148
. B( M2 w4 _, E0 n6.3.1欧几里得算法·····················148
! t* a7 L' `5 T. G6 A! Q6 w: M6.3.2扩展的欧几里得算法··········151 u3 \0 F: z( A5 \. X+ \4 I. d
6.3.3欧拉函数·····························155# Z9 j2 H, T) K1 e! K
6.3.4费马小定理与欧拉定理······157
* V4 d8 `& U) z8 k: A9 |* t6.4讨论及扩展阅读······················159
# @: |, A U+ @4 f2 u6.5要点回顾··································1606 O) p9 V! u; p" h% N
6.6习题··········································1604 X1 a- s# b0 U# i
第7章RSA密码体制······················163; M3 L, A0 _. L& z
7.1引言··········································1643 ]3 h+ Y9 A2 i7 D0 b7 U$ j2 w& p
7.2加密与解密······························164- |" z# }/ o0 m' i c
7.3密钥生成与正确性验证···········165
% j' A9 n6 o3 k/ H, V! z2 T7.4加密与解密:快速指数运算···169
. D9 {" A$ s; `) j) f* P# z目录
$ F; V; d3 A0 |* zIX7 A' R7 w+ S: P
7.5RSA的加速技术······················173
4 E; g! o* Q& z7.5.1使用短公开指数的快速加密···173
8 C, {: m: J, \7.5.2使用中国余数定理的快速
2 ?% C7 J1 l4 K/ z加密······································174
# f a+ k! G6 J8 {7.6寻找大素数······························177
" @2 W0 a" V. F; ~+ J7.6.1素数的普遍性······················1772 A e/ F8 ?3 g$ o) @
7.6.2素性测试·····························1788 \4 J' s- _8 @; m6 ~+ z# t; k1 D
7.7实际中的RSA:填充··············182/ d% L% q, H0 a
7.8攻击··········································1838 H/ M/ L& }7 K2 V( ~
7.9软件实现与硬件实现···············186
' d, k' R6 P! t# z1 c, I7.10讨论及扩展阅读······················187' ^6 ^- Q- t# ~# h m
7.11要点回顾··································188
F/ K( e2 Y# J8 h6 @) [9 y7.12习题··········································189$ j4 a. s U/ I# s( [6 S$ _ B
第8章基于离散对数问题的公钥
( s) `5 O- K; r0 n密码体制·······························193
) `+ x4 J) q" i' ^8.1Diffie-Hellman密钥交换·········194" U9 b) C4 v: {& a& z
8.2一些代数知识··························196
' |& p. g1 ^/ Z8.2.1群·········································196( t6 S+ w# J" }2 W% f1 J" t6 ~
8.2.2循环群·································198$ \+ s7 B9 |/ a& h, P
8.2.3子群·····································202
( E" V$ o3 I( m8.3离散对数问题··························204
; W( ]' M; v2 ~1 ~! F- C8.3.1素数域内的离散对数问题····204( U% t( t. U# W6 @
8.3.2推广的离散对数问题············205- L4 B1 G4 k6 L# ~9 w* ?/ e0 ^8 G
8.3.3针对离散对数问题的攻击····207 [2] ( U0 ]7 t8 Z; u& I# R
8.4Diffie-Hellman密钥交换的安( P$ G( C/ _* Z1 k
全性···············································211
8 f8 i$ p( T/ I. O8.5Elgamal加密方案····················212
- w$ H h1 F/ N, o( m8.5.1从Diffie-Hellman密钥交换1 Y; |) {0 J5 v; U+ [3 k, m6 A: E& b& ]) x
到Elgamal加密··················212
& o& |2 Y$ [/ m8 H8.5.2Elgamal协议·······················213 h, u7 U( [& T, }
8.5.3计算方面·····························215, \5 a. G2 N, c6 @
8.5.4安全性·································216' m) F# r' ]" _7 e
8.6讨论及扩展阅读······················218 H- p' S3 S! n3 ?. }4 g+ o
8.7要点回顾··································219& O/ g7 s1 K* a: A. n/ {; w9 u
8.8习题··········································219
# {4 j& q3 k! ~ u6 g% ]( U第9章椭圆曲线密码体制················225
! [3 V+ T$ u1 A+ {$ }7 i9.1椭圆曲线的计算方式···············226# ?0 y$ L4 D# k2 x# x& ~
9.1.1椭圆曲线的定义··················227( T9 t/ [* w+ S4 E4 s) K$ U+ t5 J
9.1.2椭圆曲线上的群操作···········228# g2 y1 E2 j ]/ h+ b
9.2使用椭圆曲线构建离散对数
, G6 a2 k2 [# O k/ ~ {问题················································232/ W7 P- s* ~0 j+ }
9.3基于椭圆曲线的Diffie-Hellman' ? F6 F( E5 P% a
密钥交换··································236
2 p0 ?, B3 _' V; j, N- Y9.4安全性······································238- M9 X0 n0 O, O" v
9.5软件实现与硬件实现···············238
; W J$ w& I# p; X& V5 M' o1 J- u1 f9.6讨论及扩展阅读······················239 C' ?/ [3 c8 J% t
9.7要点回顾··································241
% d8 b$ D- a) j, w" Y% k- O9.8习题··········································241
) u2 N& z; c' M' C第10章数字签名····························2456 }: s! N! f& c' B
10.1引言········································245
3 Y/ j$ Z" ?: x1 s+ l10.1.1对称密码学尚不能完全
0 f' Y9 \1 D1 y满足需要的原因··············246' T3 ?1 ?% @! x6 p! j. j! {
10.1.2数字签名的基本原理······247- Z3 U& _: G# f5 m# q6 A: u
10.1.3安全服务·························2484 q5 ~$ q6 T: o4 U2 N
10.2RSA签名方案························2498 q7 `* t% p& y6 _
10.2.1教科书的RSA数字签名···250
& b( a0 Y& s/ Z0 L: L10.2.2计算方面··························251
. e- P* ~9 l4 Z6 ]" n, p/ @$ G10.2.3安全性······························252) F' k2 F+ B2 x% K2 }- x
10.3Elgamal数字签名方案··········255
X9 q. J' L; k+ [: t7 b10.3.1教科书的Elgamal
- L/ L( `; Z. n数字签名··························255
- _ d j! j( }( w1 k7 W2 h10.3.2计算方面··························257
6 h' S9 m! i2 `" B10.3.3安全性······························258 [2] 0 X7 O& n; |5 e9 W
10.4数字签名算法························261
% ^/ l6 D- P2 ~4 ?10.4.1DSA算法·························261
: g$ n, u& y3 }# {4 G: T4 e8 e# P3 E深入浅出密码学—常用加密技术原理与应用5 _3 l/ \9 H# [0 c. ?$ l
X
* T9 R! n. G* U/ h10.4.2计算方面··························264
- V3 J8 l3 V$ Q2 c" _10.4.3安全性······························265
6 F- ~) ]9 a+ d+ m0 f$ F10.5椭圆曲线数字签名算法·········266% {& S1 D* G! `& w5 n
10.5.1ECDSA算法····················267( |" H0 O8 K! h" U( T4 @
10.5.2计算方面··························270, {, I- u6 w& `3 k7 W; j( N
10.5.3安全性······························270) z4 \. y4 `1 [+ ^$ [* a
10.6讨论及扩展阅读····················271
2 P$ b; c4 ?; F3 L2 i10.7要点回顾································272# M5 n! ~9 Z+ a5 J" G
10.8习题········································272" {9 }4 G' _, ~/ O/ s
第11章哈希函数·····························277
! f3 M) t: K. Y: |$ {, W11.1动机:对长消息签名·············277- g) B" ]% O% h8 v9 d' h! u' z+ O V
11.2哈希函数的安全性要求·········280
$ c7 a/ c. b; m3 d, i11.2.1抗第一原像性或单向性···280
9 Z% b+ j( J. z; ?8 A! P11.2.2抗第二原像性或弱抗
1 Q7 t! Q) }% d冲突性······························281
0 i: N- y' ?# R; s4 g11.2.3抗冲突性与生日攻击·······282
' n) n0 m5 \" Y& g9 e8 V11.3哈希函数概述·························286% P6 s9 P/ n& c. w" U+ F# O! s
11.3.1专用的哈希函数:MD4- Q4 m; `4 l# e! q+ c- K) t
家族··································287* w+ N2 v# ?* k* }% g
11.3.2从分组密码构建的哈希7 e1 K/ a- N5 t" A+ z5 Q( o
函数··································288
6 {5 U' K& w2 ]: t' s4 Z11.4安全哈希算法SHA-1·············290 y, i) s6 M3 c! U! |
11.4.1预处理······························291
7 X8 P/ I$ E4 Z11.4.2哈希计算··························292
* N: \/ V. W/ E8 P4 S11.4.3实现··································294' A7 l% b' k" @& n z" `+ n# l
11.5讨论及扩展阅读·····················295( a% B5 Y' [/ I: Y- F
11.6要点回顾································296
) e4 v& ?2 _# z7 N" ~# S; M11.7习题········································297
: i: Z: O- y0 z& u: W. d/ _) \第12章消息验证码·························301
% ~, H0 ~% m9 M( j& R; o Y" [12.1消息验证码的基本原理·········301# h1 U, K ~0 j( i+ d) N3 K; _3 n Y/ f
12.2来自哈希函数的MAC:" I* w x% j, c! w! P1 V
HMAC····································303/ V: T- k6 B' g
12.3来自分组密码的MAC:5 A, U6 i7 t) ~* n. t- k
CBC-MAC·····························307# L$ [( U. H$ ]7 F- V9 C
12.4伽罗瓦计数器消息验证码·····308 t- U5 W- P& O+ a
12.5讨论及扩展阅读····················309
5 a" C. k5 N$ ?3 l12.6要点回顾································309$ n" q6 r7 o4 t& w5 F
12.7习题········································310
3 f5 v+ c! o; Z3 ~- K第13章密钥建立····························313
4 H! {" @4 [ y13.1引言········································314! D M1 A* s; ]% U
13.1.1一些术语··························314, Q* K* N2 R+ Z) h
13.1.2密钥刷新和密钥衍生·······3146 h# ^5 P# O/ ~. c9 U7 G$ R# p
13.1.3n2密钥分配问题··············316
. c/ [/ w( H% U. g- X13.2使用对称密钥技术的密钥
$ B2 N" t0 J% H" s! F7 h建立··············································3175 n& I& B# a6 d5 X% u7 ?
13.2.1使用密钥分配中心的密钥6 _( d7 A6 C9 d, l5 }
建立··································318
5 C+ \0 x ?6 {% I# s: E1 R7 `13.2.2Kerberos···························321
; u& r& P( A: W0 C13.2.3使用对称密钥分配的其他/ S, U( ~3 }5 v7 ^: z* e
问题·································323' Y) N I( t& j) Z) e
13.3使用非对称密钥技术的密钥
! h( r9 h1 g/ }+ }5 d* b+ A. h建立·······································3232 ]* e% I) \5 [3 m0 J" B& h- c4 j
13.3.1中间人攻击······················324 ]+ [* j2 Z% D$ i+ f0 Y
13.3.2证书·································326
9 ?1 [" c: Z! ?2 t8 \13.3.3PKI和CA························329
2 m. r8 H2 ?" ?2 Z13.4讨论及扩展阅读····················332. }5 y- m8 D" Z. z- [' Q+ w
13.5要点回顾································333
) Z% `* |; X' d ?- F: `1 O$ V13.6习题········································333' c/ O+ j) q& P8 R& j1 M* M
参考文献·················································339: v% O9 }* T( M
% A; J" V/ a. I2 A3 I
& S- t( G4 H% h0 O0 h侵权联系与免责声明1、本站资源所有言论和图片纯属用户个人意见,与本论坛立场无关
! L( \: Z- Y' F6 K: d2、本站所有资源收集于互联网,由用户分享,该帖子作者与瑞客论坛不享有任何版权,如有侵权请联系本站删除0 @ a8 L, I" G: R8 C* v. T
3、本站部分内容转载自其它网站,但并不代表本站赞同其观点和对其真实性负责
8 y4 x% A, P5 d: K4、如本帖侵犯到任何版权问题,请立即告知本站,本站将及时予与删除并致以最深的歉意
8 E" `* H9 ?2 X4 E! Z& w* P如有侵权联系邮箱:ruikelink@gmai.com深入浅出密码学——常用加密技术原理与应用.zip
) }* t: S) R2 s" \0 q% }资源下载地址和密码(百度云盘): [/hide] 百度网盘信息回帖可见3 u! ^. |6 j) }2 z; X
8 d1 e1 k/ S; k( P, x0 b
$ A, ^: @1 f, M' M
/ O. u% h9 w' e W9 J9 g! `. Y6 h本资源由Java自学网收集整理【www.javazx.com】 |
|