java自学网VIP

Java自学网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

查看: 2475|回复: 17

深入浅出密码学——常用加密技术原理与应用

[复制链接]

该用户从未签到

5

主题

161

帖子

323

积分

普通会员

Rank: 2

积分
323
发表于 2024-11-20 18:17:52 | 显示全部楼层 |阅读模式
第1章密码学和数据安全导论·············17 ~! m! ?9 T9 X6 C
1.1密码学及本书内容概述···············1/ R# j. n$ k# R4 Q' b* d3 ^
1.2对称密码学··································3. k7 G8 b5 j" e
1.2.1基础知识······························43 ?2 u& t: {: V8 n: Q/ j9 Z# t
1.2.2简单对称加密:替换密码······5
6 c% q$ e* v2 [) P7 D& k1.3密码分析······································8
& [, O* w, W4 |9 J0 [' j1.3.1破译密码体制的一般思路·······8( |5 }6 b+ F' ^" v& k. i3 K6 `. }
1.3.2合适的密钥长度····················10
$ |# J# h! a1 w1.4模运算与多种古典密码·············11
8 o$ }2 R$ |, ]2 u1.4.1模运算···································12. ?4 i/ `# m4 D+ v
1.4.2整数环···································15/ k0 @/ @& z/ W8 ~- k; d9 H
1.4.3移位密码(凯撒密码)·············16; g: ^& D0 p  X% j
1.4.4仿射密码·······························18, w6 D6 V+ C- L
1.5讨论及扩展阅读························19' A  d" V' E! m9 L' n
1.6要点回顾····································21( l0 A# w# H) m; _, ^( u
1.7习题············································21
5 z" j+ v6 x$ O4 \. A+ {第2章序列密码·································27
5 c: w. V3 N4 B2.1引言············································27
8 k4 [& {; A/ ?- {6 N4 b2.1.1序列密码与分组密码·············27
3 R: I2 u3 t  c% U4 d2.1.2序列密码的加密与解密·········29  w; k5 p! V4 d4 g2 [
2.2随机数与牢不可破的分组密码····32/ k9 }* q  ?4 Y% v
2.2.1随机数生成器························32
5 f6 ]& ?7 i/ @: X! u4 B2.2.2一次一密································34
% {4 Y: R# {7 ]+ v5 f2.2.3关于实际序列密码················353 O) s" T' Z: ^& V* G
2.3基于移位寄存器的序列密码·····38( K3 |3 K% x( @2 y# E* B) n. f
2.3.1线性反馈移位寄存器(LFSR)···39; x4 j  C8 _6 F
2.3.2针对单个LFSR的已知明文
) F, Y# I5 j. ^4 C攻击······································43# i+ Z( M7 U& B+ y8 ]. C1 `
2.3.3Trivium··································44
3 y+ q; {+ h% o2.4讨论及扩展阅读···························46' X. S* X* \% |7 p* A
2.5要点回顾····································47
$ H7 C* \4 {" Q. A+ ?" Y: l2.6习题············································486 ]" o! n" n# ^) Y1 X6 T- M6 e
第3章数据加密标准与替换算法·······51
" k9 ]7 g# r  e0 J3.1DES简介····································51* z5 \4 f5 w  O8 c. \& `8 ?
3.2DES算法概述····························54
0 S; @2 Y0 x, }4 T+ r. O8 T3.3DES的内部结构························562 i1 Z% U9 ~1 ~6 f3 V0 d* Q  S- H
3.3.1初始置换与逆初始置换·········561 h5 h: b; s  L* @' E. h- N% D
3.3.2f函数······································589 A/ ^2 |* d/ Q) F) H0 [5 [; t. {
3.3.3密钥编排································63
5 ^% X: ]! T& k3 I- n3.4解密············································65; D: F6 {0 M, ]" c
3.5DES的安全性····························68
* ^" H4 @7 \$ r, v! u* L: k. \' X3.5.1穷尽密钥搜索························68
9 t9 P8 F. l* T: k4 W3.5.2分析攻击································70
9 x7 {$ X$ D6 D# i3.6软件实现与硬件实现·················713 v; q/ m: r4 d5 N
3.6.1软件········································71
/ }, U% E, a/ j3 z3 Z9 W9 F8 F0 c0 a. ~3.6.2硬件········································72
7 |7 R, k& F+ c3.7DES替换算法····························72
- q/ y; n. b. }1 l5 k目录; s, l, ?6 n' M; O! [
深入浅出密码学—常用加密技术原理与应用
2 m" \" |. I, q; LVIII
2 I. r: C1 o. l# w% M; J6 X3 U3.7.1AES和AES入围密码···········720 u7 I' B1 H& i4 C6 g, f* k, y. ~  d
3.7.23DES与DESX·······················73
/ k8 T6 ~( ]; d7 C3.7.3轻量级密码PRESENT···········73
: R3 K2 n' x& R/ z4 _' g3.8讨论及扩展阅读························76" f& G4 J7 S4 A  T; r9 x4 [) Y
3.9要点回顾····································77
" C6 U! B' u/ w, ]3.10习题··········································78
& C/ m2 e/ n4 f第4章高级加密标准·························834 s6 L& f% _8 O6 G4 b
4.1引言············································83* B5 y* l9 x' x$ }
4.2AES算法概述····························85
# b( b/ w2 @; i! m4 A7 c* }  }4.3一些数学知识:伽罗瓦域简介···87: @* X( ^4 \8 Y+ f4 b5 e8 }
4.3.1有限域的存在性·····················87- M6 Y) V2 C# c; h: S; W
4.3.2素域········································89- `  c3 D$ s& ]# z( R" s9 C
4.3.3扩展域GF(2m)························90
4 L/ T+ H2 v) R0 E% y) @4.3.4GF(2m)内的加法与减法··········919 I) q2 P* U+ V1 k
4.3.5GF(2m)内的乘法·····················91
2 U  R' O  I, j: T- K- ~4.3.6GF(2m)内的逆操作·················93% q" G* f$ c- w4 a' ?
4.4AES的内部结构························95
: C1 f% S" W& F. D$ J4.4.1字节代换层·····························967 B+ a- l" h1 J; @" W2 j6 J
4.4.2扩散层····································99; V5 f9 b6 i6 L- r! w9 P2 g
4.4.3密钥加法层···························1010 X3 D5 c% G# V; w8 e; R: G
4.4.4密钥编排·······························101
# a* m+ k( u) n# l5 e) M4.5解密··········································106* ~7 ^# \( A# T# f( v" S% s. h; V
4.6软件实现与硬件实现···············110
" X6 K; M5 _# o; s& S, G4.6.1软件······································110; v. O2 u# L. r
4.6.2硬件······································111
, s+ N8 Y; k4 V# A0 K& }7 j$ m# A4.7讨论及扩展阅读······················1114 a1 w1 a- \7 ^3 D0 a) h
4.8要点回顾··································112
" v4 b2 F0 p- S; }& \- h4.9习题··········································112
# |/ M5 r# t- ?1 A$ R8 f第5章分组密码的更多内容·············117
5 x9 H. j1 s; T4 u1 J- x5.1分组密码加密:操作模式·······117
7 ?' {( f* I* R8 z7 Z2 Z5.1.1电子密码本模式(ECB)·······118
. N- [9 f3 c8 s/ U$ a1 n5.1.2密码分组链接模式(CBC)·····122
  y. m  F6 M& v5 m' g6 W5.1.3输出反馈模式(OFB)············123
3 O; V* Q3 _5 W5.1.4密码反馈模式(CFB)············1256 l; G' ?) z8 q2 P
5.1.5计数器模式(CTR)················1261 j1 ~0 e% e7 s' J/ ?
5.1.6伽罗瓦计数器模式(GCM)···1274 D  i, Y! e9 Y: \
5.2回顾穷尽密钥搜索··················129
2 D' @! \! H- M! S% ^' G' `5.3增强分组密码的安全性···········130& L2 S; j7 J0 }/ h* X% m$ B! I
5.3.1双重加密与中间人攻击······131
3 p) }7 c; E$ ~6 l5.3.2三重加密······························133, ^1 S! z' g3 b
5.3.3密钥漂白······························1349 D# {" c: X' t+ S' q* H
5.4讨论及扩展阅读······················136
5 n1 k" Z# g" T* j  j# a1 l: H( @5.5要点回顾··································1374 V  c. ^, s; r: x$ H
5.6习题··········································137
3 N. W. \& }6 J第6章公钥密码学简介···················141$ t" I8 N4 [" f( r+ e* z( S0 b
6.1对称密码学与非对称密码学···141
7 o+ H  Z7 v# c# T5 U, S( y- ?6.2公钥密码学的实用性···············1458 y5 v1 T& X5 J/ p7 [' y
6.2.1安全机制·····························145
; Q+ `/ u& A+ T$ \6.2.2遗留问题:公钥的可靠性···146+ E! D* u$ l0 e. t3 o/ e  X
6.2.3重要的公钥算法·················146+ m  l8 h+ {: g+ H& {
6.2.4密钥长度与安全等级··········147: b' X9 K; z: L3 Q1 @
6.3公钥算法的基本数论知识·······148
8 s% T' s$ ]  ^- A( n' D+ K# O6.3.1欧几里得算法·····················148
' V9 I) w: M: @- d$ ~1 ^6.3.2扩展的欧几里得算法··········151
2 Z5 [1 q/ H4 W5 C3 b6.3.3欧拉函数·····························155" e, U5 P: N0 z: _4 v: L) m
6.3.4费马小定理与欧拉定理······1570 L$ q" Z; w* L$ T. j
6.4讨论及扩展阅读······················159
% W- g$ _$ O8 s- d9 _. u% Y6.5要点回顾··································160' }9 C  v( e# A* ^2 P! ^5 Y
6.6习题··········································160
; @3 u  g6 _) W( v' G5 ?! A2 u  j* s第7章RSA密码体制······················163
6 J, F! L4 H& I0 u, C* n7.1引言··········································1646 a  M8 ^7 c0 w0 M
7.2加密与解密······························164
# m* M  }% _/ N- d4 v* d) ]7.3密钥生成与正确性验证···········165
  c& g+ H- S! q/ j7.4加密与解密:快速指数运算···169
% y5 e' o& V' |& [! T& @, T目录
5 g" L; G9 j1 P; t; xIX
9 J8 z9 L1 M; h& ~$ T6 t7.5RSA的加速技术······················173
' \+ Z6 ~5 O' b( j7.5.1使用短公开指数的快速加密···173
8 o2 O3 l: Z4 k: ^2 M7.5.2使用中国余数定理的快速4 j! J4 j6 `2 B/ K& l7 C) l
加密······································1742 g* V: Y  A8 g& b+ H
7.6寻找大素数······························177
$ t+ Q7 C$ u1 H9 Z+ G  H7.6.1素数的普遍性······················177: h8 M1 ?1 ^1 h* Z
7.6.2素性测试·····························178
1 l0 V/ F' c6 x' C( m' t7.7实际中的RSA:填充··············182
- a* l. E' v, H9 ~- g( q7.8攻击··········································1836 t6 F/ E: M1 n) C* R% g
7.9软件实现与硬件实现···············186' `* h6 _7 q% _' Y8 m. F. v
7.10讨论及扩展阅读······················187
7 u& {5 |/ Z' r7 [, t5 {1 j* Y2 n7.11要点回顾··································188( [) c/ u2 ?8 Y4 p- C: a$ m$ I
7.12习题··········································189
  X/ m; ?/ w. }/ N' @第8章基于离散对数问题的公钥
7 T; H3 s% b! M0 @8 h$ {, ?' S! E密码体制·······························193
3 ?8 Q1 G' g7 D0 w7 Q; ^8.1Diffie-Hellman密钥交换·········1947 _, J% n; p) h6 |5 S7 p6 ^. s
8.2一些代数知识··························196& E* I, h; b7 c) O# I  l! }
8.2.1群·········································196) {: e2 h: G) P/ k' {& j/ J$ U
8.2.2循环群·································198
. p6 Q4 }  O& B1 h5 N3 b, Q! a. S8.2.3子群·····································202
( [6 S% ~- d, d  ?9 M# k/ @# I* n4 m/ o8.3离散对数问题··························204  r) t' C4 X" {& D9 o4 Y, @/ k
8.3.1素数域内的离散对数问题····2042 |2 U1 C% x4 E! Y( X
8.3.2推广的离散对数问题············205# O) J9 d7 T' L; Y8 `
8.3.3针对离散对数问题的攻击····207 [2]
+ B4 Y# M9 [3 @, x  v: }. B, J" l8.4Diffie-Hellman密钥交换的安
8 G! \! L, _! N, r全性···············································2115 j. n+ W% Z9 Z  j, m5 x+ c
8.5Elgamal加密方案····················212& W( h. u2 E6 G" s8 {
8.5.1从Diffie-Hellman密钥交换. |4 k0 v3 u' ^2 Z4 T; B
到Elgamal加密··················212
: k; F; b; Y5 H4 q( O9 H8.5.2Elgamal协议·······················213+ a- r- v5 a0 n. n3 e8 j4 D# T% G
8.5.3计算方面·····························215& _. z! S, D- t  A! M; E  e
8.5.4安全性·································2163 h) {# E1 M* b- s$ M
8.6讨论及扩展阅读······················218
. ]$ Y9 _* I1 j$ g# C, O2 [+ G2 A# K8.7要点回顾··································219$ K/ t2 T7 i6 K' ?' y- a. V" W0 X
8.8习题··········································219+ E$ {$ H7 m# D. Q, e" G: N
第9章椭圆曲线密码体制················2258 S) p& o! m; C" u; _2 U
9.1椭圆曲线的计算方式···············226
/ ~0 y$ m# `% W) D5 M' A9.1.1椭圆曲线的定义··················227
6 P7 M* L7 D& b/ p5 C& n! _9.1.2椭圆曲线上的群操作···········228
6 ^( l- w9 p* x. e4 [9.2使用椭圆曲线构建离散对数9 C) d0 a8 U: `" r0 a0 q- Q3 l
问题················································232* A6 I. u; C0 ^4 ?' R* Q
9.3基于椭圆曲线的Diffie-Hellman, Q0 }3 P5 @# a8 w. X
密钥交换··································236" }" n: n0 x. z* w( Z8 t
9.4安全性······································238
# A" b8 e6 M. ^, Y; l8 p- s9.5软件实现与硬件实现···············238
+ L5 u; z# u2 @* M9.6讨论及扩展阅读······················2391 d" T3 d2 L* j3 ^' F  P
9.7要点回顾··································241' j4 ~+ U: A! {4 q9 G
9.8习题··········································241
5 j7 F; @# I" Q! I8 H/ _' `7 j第10章数字签名····························2459 }1 `+ f7 ~. @7 r7 [1 t2 _- S
10.1引言········································2451 V2 }' t7 ]# }+ a
10.1.1对称密码学尚不能完全
. O7 u2 I! L) k4 Q9 Y" z满足需要的原因··············246
8 B7 ~. q6 m* ?, d. ^' t( B' d10.1.2数字签名的基本原理······247* |: o7 a( O: t6 {* t
10.1.3安全服务·························248
/ r" T* Y$ G  j10.2RSA签名方案························249
2 S8 v( h' o$ ]4 k/ e( C2 K* P10.2.1教科书的RSA数字签名···2501 I7 A, m9 R5 o+ r. k: I
10.2.2计算方面··························251  K# a+ I$ {- H2 c: R1 Q0 t
10.2.3安全性······························2525 C: Y4 b+ y* l. }
10.3Elgamal数字签名方案··········2557 |& p6 f& @* t3 O2 p
10.3.1教科书的Elgamal
$ X$ D1 _! V0 ^" `1 _$ V4 W数字签名··························255
$ b7 ~7 r/ [7 N10.3.2计算方面··························257* ?! N3 F. i% B. c( E3 A
10.3.3安全性······························258 [2]
- m; L; w' H( L9 u10.4数字签名算法························261
, t% p/ @; w/ j' q* ?6 B8 Q. ^10.4.1DSA算法·························2618 h! z  t2 v7 o, o8 }
深入浅出密码学—常用加密技术原理与应用0 o( s2 q% w% ?9 `$ K( h, W
X
$ p& n0 J* b2 Y. y7 v- \10.4.2计算方面··························264
% L; {; S; B  a/ C8 T/ |( W10.4.3安全性······························265
. I: Z* c! |# V" l) |* z9 o10.5椭圆曲线数字签名算法·········2668 @+ L% l0 M0 f( F. x3 r
10.5.1ECDSA算法····················2677 u5 l. n" P) f
10.5.2计算方面··························270
: a  ~: `  a/ d$ q0 D10.5.3安全性······························2705 I! u. B4 B$ d" d& x3 W
10.6讨论及扩展阅读····················271
' J9 O0 V$ J9 R, \' Q2 a5 L10.7要点回顾································272/ Q' ?+ k, ~. c! o" O# o# n: u/ `
10.8习题········································272
- U6 A' c' \0 t# f6 Q$ c8 ^& X4 |1 Z$ J第11章哈希函数·····························277
' m4 c* T' C' v, u  s11.1动机:对长消息签名·············277
1 ?; P2 z1 d, _& R2 a11.2哈希函数的安全性要求·········2809 I) N# E8 K: g2 i2 F; E3 h( }
11.2.1抗第一原像性或单向性···280
* D( {+ E, C+ i2 \11.2.2抗第二原像性或弱抗! g6 X7 T  b7 d2 ~; {5 F' }
冲突性······························2815 t3 H# \1 a4 O6 j& {% \0 T& ~
11.2.3抗冲突性与生日攻击·······2821 p8 P% W1 O& P# [) ?
11.3哈希函数概述·························286
: {2 h2 {1 c6 J; h. S11.3.1专用的哈希函数:MD4
& G% H' F' ?2 R$ [家族··································287: }# l' h4 _  Y0 T' M2 N3 n: k% f
11.3.2从分组密码构建的哈希6 C, k* y7 D$ _4 ]; v" J- s
函数··································288
; ?1 D5 {6 I6 z" i  P11.4安全哈希算法SHA-1·············2906 W$ b) I7 |, j% U1 U
11.4.1预处理······························291+ _" q7 ^9 ]* A5 ^1 W, n
11.4.2哈希计算··························292: i' ?; c* v7 N+ s; V6 W  r5 E
11.4.3实现··································294% N. L9 j5 Y# ], a
11.5讨论及扩展阅读·····················295
* ?- n  J2 p4 Q11.6要点回顾································296
  F0 _/ @! o/ C  `- e$ {11.7习题········································297$ w! ^% k  d9 x  U  Y" d6 C
第12章消息验证码·························301
' Q6 y( s' T! A8 o! F12.1消息验证码的基本原理·········3019 k$ f& i* Z$ w) O1 `# L0 V
12.2来自哈希函数的MAC:( z7 g7 d' ]$ m5 d2 P& ~, |
HMAC····································303
5 C* N; |3 W: v( u% C2 [+ A12.3来自分组密码的MAC:' V! o  u( I: m$ X( H
CBC-MAC·····························307  V! X% x; a1 U
12.4伽罗瓦计数器消息验证码·····308
) A# W/ s% A6 W. k0 j+ X% {1 f/ A12.5讨论及扩展阅读····················309
6 d$ H: N4 \1 i' E3 C8 ~" J2 I12.6要点回顾································309
5 M0 M$ m5 g6 l) e' ]8 Y& W) a$ _12.7习题········································310
- M, ]4 e  Y0 B1 ?! ~, N: ^# E: Y第13章密钥建立····························313
) Q) q+ y: S" n- E13.1引言········································3141 d+ e& Q5 q2 h' ?6 E  z2 o8 v
13.1.1一些术语··························314' L) m' C; R; ]
13.1.2密钥刷新和密钥衍生·······314
8 n) T" i* e9 k4 ]# {2 @13.1.3n2密钥分配问题··············316& g+ o3 o+ i) ^( a3 A" K
13.2使用对称密钥技术的密钥7 Q2 R' J; |% \, M& U: s
建立··············································317  x; R; E! `2 Y$ G) R8 Q6 m
13.2.1使用密钥分配中心的密钥$ F1 b7 `: H4 f( v  r3 h
建立··································318
' `' ]7 i% V  Z/ S4 a4 h; X13.2.2Kerberos···························321  }, E3 U) C+ ], @$ _. d! C% T
13.2.3使用对称密钥分配的其他. t" |' {/ h" D( W; a( g
问题·································3232 d: v4 o' Y' q+ n
13.3使用非对称密钥技术的密钥
8 r. `/ G  }+ r2 H0 w& }建立·······································323, D! ~+ l/ b( d4 X
13.3.1中间人攻击······················324
# N0 d' n# G: U; g+ k  o7 ~13.3.2证书·································326
& J- L+ u: }3 f) {13.3.3PKI和CA························329
: U; `) m. b' X7 W3 ^+ M13.4讨论及扩展阅读····················332) i  T) E7 w- W0 K$ e
13.5要点回顾································3335 C& e# W- R- L/ v. Q1 e  L
13.6习题········································333+ C5 W+ N" e, [3 w+ E0 l. ?
参考文献·················································339
5 r  a8 T& p# I1 L8 G5 \3 ?  p9 [4 x7 O: o* r

3 b1 ^8 X# a# U' X8 k侵权联系与免责声明1、本站资源所有言论和图片纯属用户个人意见,与本论坛立场无关1 N5 d  S& x6 z- j+ y% \) g0 r
2、本站所有资源收集于互联网,由用户分享,该帖子作者与瑞客论坛不享有任何版权,如有侵权请联系本站删除5 S% N! P9 O6 ^3 Y! y0 [5 V
3、本站部分内容转载自其它网站,但并不代表本站赞同其观点和对其真实性负责$ E% T( i* V, J, i+ y9 d' `
4、如本帖侵犯到任何版权问题,请立即告知本站,本站将及时予与删除并致以最深的歉意
$ K- J1 N, f" F( L如有侵权联系邮箱:ruikelink@gmai.com深入浅出密码学——常用加密技术原理与应用.zip! ~  [. m2 g; ^, _/ K% W: @- b
资源下载地址和密码(百度云盘):
游客,如果您要查看本帖隐藏内容请回复
[/hide] 百度网盘信息回帖可见* f9 w. G# E! S! ]/ z

' a5 M& g' i- @* `/ ^* Z2 J" \3 N

# Q0 t" S& t: W% g% y本资源由Java自学网收集整理【www.javazx.com】
回复

使用道具 举报

该用户从未签到

4

主题

165

帖子

326

积分

普通会员

Rank: 2

积分
326
发表于 2024-11-20 18:31:42 | 显示全部楼层
激动人心,无法言表!
回复 支持 反对

使用道具 举报

该用户从未签到

5

主题

163

帖子

329

积分

普通会员

Rank: 2

积分
329
发表于 2024-11-20 18:35:39 | 显示全部楼层
666
回复 支持 反对

使用道具 举报

该用户从未签到

10

主题

181

帖子

360

积分

普通会员

Rank: 2

积分
360
发表于 2024-11-20 18:46:10 | 显示全部楼层
多谢分享!
回复 支持 反对

使用道具 举报

该用户从未签到

4

主题

159

帖子

322

积分

普通会员

Rank: 2

积分
322
发表于 2024-11-20 18:58:24 | 显示全部楼层
111
回复 支持 反对

使用道具 举报

该用户从未签到

9

主题

161

帖子

327

积分

普通会员

Rank: 2

积分
327
发表于 2024-11-20 19:07:09 | 显示全部楼层
看到这帖子真是高兴!
回复 支持 反对

使用道具 举报

该用户从未签到

4

主题

155

帖子

304

积分

普通会员

Rank: 2

积分
304
发表于 2024-11-20 19:17:55 | 显示全部楼层
强烈支持楼主ing……
回复 支持 反对

使用道具 举报

该用户从未签到

13

主题

181

帖子

375

积分

普通会员

Rank: 2

积分
375
发表于 2024-11-20 19:22:31 | 显示全部楼层
强烈支持楼主ing……
回复 支持 反对

使用道具 举报

该用户从未签到

0

主题

4378

帖子

8758

积分

普通会员

Rank: 2

积分
8758
发表于 2024-12-6 12:50:38 | 显示全部楼层
看起来好像不错的样子
回复 支持 反对

使用道具 举报

该用户从未签到

0

主题

4409

帖子

8820

积分

普通会员

Rank: 2

积分
8820
发表于 2024-12-6 19:52:33 | 显示全部楼层
这么优秀的么
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|Archiver|手机版|小黑屋|Java自学网

GMT+8, 2025-1-22 18:05 , Processed in 0.929597 second(s), 32 queries .

Powered by Javazx

Copyright © 2012-2022, Javazx Cloud.

快速回复 返回顶部 返回列表