|
第1章密码学和数据安全导论·············14 ^( r/ J/ y3 J0 M9 M6 ?! G
1.1密码学及本书内容概述···············1* l! z0 i/ V3 h1 \% p/ B. D! w
1.2对称密码学··································3
7 V: ?- m3 C+ S1.2.1基础知识······························4
, L. R- \- {2 R7 j# S; d1.2.2简单对称加密:替换密码······5
! ?+ G# k/ C& I, i1.3密码分析······································8) `: P) ]- K2 P) t+ M) L3 {5 x, Y
1.3.1破译密码体制的一般思路·······8
7 ]3 P e2 A- K9 k3 R2 e/ l V' j2 K; S1.3.2合适的密钥长度····················10: H5 r. L3 ^5 C6 }/ v8 [, \) v
1.4模运算与多种古典密码·············11
6 q9 q, U; ~- Z$ S& b5 g# i1.4.1模运算···································12/ B$ d- e0 B& S- \3 [2 W$ e+ F
1.4.2整数环···································15
( g6 s" Q9 E3 ?; s3 L4 v2 _1.4.3移位密码(凯撒密码)·············16
$ L# D0 E/ }; f1.4.4仿射密码·······························18
7 o1 o r! [* h+ X1 t8 i3 L, M' P& |' q1.5讨论及扩展阅读························196 q& {* U3 b3 L$ m
1.6要点回顾····································21
2 ?; `7 {# x: U1 B1.7习题············································21' i ^2 M( n6 @" N% J
第2章序列密码·································278 {) `& e y. N3 G) ]
2.1引言············································27' H' f$ K' I O& G' z
2.1.1序列密码与分组密码·············27
) X6 y: K, v8 [* h, g2.1.2序列密码的加密与解密·········29
, C1 q* ]6 t3 l' [. z6 S7 d2.2随机数与牢不可破的分组密码····32! P9 i% w# W+ [$ Y. }
2.2.1随机数生成器························325 c: r7 d3 [; L+ O8 |' Y
2.2.2一次一密································341 `# Z) B( V X e* p
2.2.3关于实际序列密码················35+ M0 a) E* H1 C1 [8 G8 h
2.3基于移位寄存器的序列密码·····38! o. H y5 j( E+ u
2.3.1线性反馈移位寄存器(LFSR)···39
) v" M; Y' p0 _7 q0 Q2.3.2针对单个LFSR的已知明文$ G+ W* K7 w2 e: A, |5 U0 s
攻击······································437 b$ l9 ~) P$ _; t7 ?' m8 A, L
2.3.3Trivium··································44
- X# r" C4 I, L" k9 V; S$ n- J2.4讨论及扩展阅读···························460 k5 g2 ]1 m- n/ ] ?
2.5要点回顾····································47
$ o. l% f5 C7 A. U4 Y2.6习题············································48
6 f1 o9 V! [ j; N+ J第3章数据加密标准与替换算法·······51
: l. w6 _2 a) @( ~0 U3.1DES简介····································51
: W8 A7 U) @2 E; A& U, M3.2DES算法概述····························54
' q/ e+ W4 l1 C# P1 o- ?3.3DES的内部结构························56; b E4 W' I* g; s0 a
3.3.1初始置换与逆初始置换·········562 a+ K, o) P5 g3 i$ N/ V. ^* z
3.3.2f函数······································586 J7 ?" O# R S9 A2 S ^1 m% _
3.3.3密钥编排································63
' D- y8 g4 J9 B2 X3.4解密············································658 j; O% d0 u: g: ^. j, S
3.5DES的安全性····························68
5 G/ k3 U" I3 G/ h: v3.5.1穷尽密钥搜索························68/ b$ Q0 N6 ~3 @
3.5.2分析攻击································70
, R; `& h/ ?8 l! u0 o3.6软件实现与硬件实现·················713 T! m* t3 k8 h
3.6.1软件········································71
8 u4 N( a: U. U) h3.6.2硬件········································72
+ a0 |5 h3 Q& s) ?& f1 e) }$ F# E3.7DES替换算法····························72
( U! f: l3 Y* n3 d5 n目录
4 V3 Z/ S' z1 j, E/ z5 ^深入浅出密码学—常用加密技术原理与应用# ?) R3 r% `' K. w" U/ E I4 j/ F
VIII( D; j5 B9 D! b) h; n, Z P+ Z, W
3.7.1AES和AES入围密码···········72
8 t* U4 [% R8 u4 V" r4 q- x; _3.7.23DES与DESX·······················73
2 d. u9 J }/ y' C4 R4 t3.7.3轻量级密码PRESENT···········73
+ O* J2 F1 \ n3.8讨论及扩展阅读························76
5 R& @* l& w( u1 ^6 Z3.9要点回顾····································77+ Z/ M& I& S3 a% {3 e4 b7 `
3.10习题··········································78
* `6 D, f" o$ O* v* i E; Q5 z6 x第4章高级加密标准·························83 L$ d: U2 q- G9 Q5 ]0 l, Y
4.1引言············································83# I: Z# J* ^( \
4.2AES算法概述····························85* I4 ?; D2 ~( u- P+ c( l, T- K
4.3一些数学知识:伽罗瓦域简介···87$ ~' E2 E0 ~2 [# S8 b* r% j
4.3.1有限域的存在性·····················87
7 V i& `& m3 ]' e( _& X5 F4.3.2素域········································89
+ o. k% S) O2 u) ?7 |, O7 g- M6 [5 j4.3.3扩展域GF(2m)························90
- p c* |0 g) Z8 M+ n/ g7 |4.3.4GF(2m)内的加法与减法··········914 P0 U9 R6 Z- B' J
4.3.5GF(2m)内的乘法·····················91! A# u) x7 F8 R4 F4 c- x
4.3.6GF(2m)内的逆操作·················934 x \2 d, \) h6 f
4.4AES的内部结构························95
% ?* N1 F) L m. x8 Y4 x: Y$ c% |4.4.1字节代换层·····························96
6 A) L* e0 Z: z4.4.2扩散层····································99& k0 G4 N, u8 x5 k8 y& ^7 X% l
4.4.3密钥加法层···························101
+ ~# f! [; q1 i9 E' e6 P1 b6 u8 m4.4.4密钥编排·······························1015 j& I) e l5 i# A
4.5解密··········································106
8 u& [, Z% U# J4.6软件实现与硬件实现···············1104 N! }6 N6 m8 w: v n
4.6.1软件······································110
5 i4 s: l0 v* o5 v, I4.6.2硬件······································111
1 m h6 k, e. @/ J( s' @8 i4.7讨论及扩展阅读······················111- d- R+ C3 m/ p! K
4.8要点回顾··································112! C7 t+ o; a( n% @7 k2 u
4.9习题··········································112
. U8 ~* ~' p( S( ^0 D第5章分组密码的更多内容·············1175 k0 S/ R2 v" B
5.1分组密码加密:操作模式·······117* ^, ]' M. d8 _. O. c3 M
5.1.1电子密码本模式(ECB)·······118
- p/ j+ h6 I) q9 b; r& [, l" x+ W5.1.2密码分组链接模式(CBC)·····122
0 p/ ?+ J- ~2 U6 f! c! X5 S& f5.1.3输出反馈模式(OFB)············123
) ~+ {& o) ]1 L. W! l2 D6 q5.1.4密码反馈模式(CFB)············125
! B; O: Q( e9 X* D3 f1 ]% j5.1.5计数器模式(CTR)················126 Z: r6 L1 B) }+ |7 P1 ~% P5 G
5.1.6伽罗瓦计数器模式(GCM)···127
( J6 g; r' p. \. A7 q9 Z x5.2回顾穷尽密钥搜索··················129
% L# R) j7 f* b- H; `. }0 m7 e8 f5.3增强分组密码的安全性···········130
' K5 F" `* ]6 p* O$ t9 l5.3.1双重加密与中间人攻击······1314 r3 ?6 [1 ^5 z) |; I1 N( x! p' M
5.3.2三重加密······························1330 l* q! k9 m1 q
5.3.3密钥漂白······························134
. @( H! i* j4 `# s3 l0 ?& \5.4讨论及扩展阅读······················136: E; P6 e8 Y8 Z0 O4 D4 x t! r
5.5要点回顾··································137( O* Z# A6 y" `: j I5 ~ H
5.6习题··········································137
! l* G: O9 P9 s- R o2 _; I第6章公钥密码学简介···················141* F9 S# g( |, J) ^7 t' l/ Z
6.1对称密码学与非对称密码学···1413 j, w' U! ^9 d
6.2公钥密码学的实用性···············145
$ p5 b6 H* ^. v( T! U8 N6.2.1安全机制·····························1452 w6 {4 X0 t. ]9 E W
6.2.2遗留问题:公钥的可靠性···146
8 M3 g' `0 w7 F# c% z. _0 K6.2.3重要的公钥算法·················146
: X, v7 m5 J' u6.2.4密钥长度与安全等级··········147
0 t/ s0 c, \2 J2 y6.3公钥算法的基本数论知识·······148
6 z- D; X0 u6 a- h6.3.1欧几里得算法·····················148
8 V, o6 O( _$ t6.3.2扩展的欧几里得算法··········151
% d/ c: V3 s9 @6.3.3欧拉函数·····························155
$ [" E8 a ~1 X2 J0 A6.3.4费马小定理与欧拉定理······157$ n, w, s x9 R
6.4讨论及扩展阅读······················159
: c, }% I$ a$ A6.5要点回顾··································160
" c D4 ~; E- K6.6习题··········································160
, n) Y6 q8 V/ J7 t, f& A5 w7 d第7章RSA密码体制······················163 ^: n {$ X; u! |
7.1引言··········································1648 u" p( [0 _3 h" J/ C5 q% z' [+ f
7.2加密与解密······························164
, @: Q1 {5 A5 A! M9 z- ?( Q/ M7.3密钥生成与正确性验证···········165# e! |# i' C% K& b
7.4加密与解密:快速指数运算···169
) K3 n/ T( z: m3 I$ a/ g目录
; q7 W! T0 q9 [0 f+ lIX6 O; U+ Z5 ]7 t c: p0 |
7.5RSA的加速技术······················173
5 q+ y( o5 K% H. N5 u. g1 ]8 U7.5.1使用短公开指数的快速加密···173
# s! z5 V# t. Y5 |& |. k3 e& W7.5.2使用中国余数定理的快速
8 ]% u0 l1 N% t8 W加密······································174- u/ C3 _; v6 @4 N! e+ {
7.6寻找大素数······························1772 Q' M6 Q. Z* m2 k4 S+ Q, h8 s& R
7.6.1素数的普遍性······················177+ z, T& {7 @. X/ L- p' j. q
7.6.2素性测试·····························178
: p" P! ~6 p0 x5 \7.7实际中的RSA:填充··············182
, t- v; j- J# H0 H7.8攻击··········································183
8 ?% L& D6 `& u0 q+ |8 T" s' U7.9软件实现与硬件实现···············186
& K1 V: B/ p% Z7.10讨论及扩展阅读······················1876 J7 q( s# W+ j1 x* U8 v/ r* U
7.11要点回顾··································188
, O% f% s6 d7 a7.12习题··········································1895 D' j) x& U, G, r/ ~( r8 z3 F; A0 r$ c
第8章基于离散对数问题的公钥8 T2 h8 k B7 t8 G$ q( q
密码体制·······························193
. y/ ]& @* k6 |' U! d) m8 l9 u2 n1 H8.1Diffie-Hellman密钥交换·········194
( B" N- {6 j" f" w- K& p8.2一些代数知识··························196; j I( f' v& v4 w
8.2.1群·········································196" Q1 J% I$ h$ m& C# [. S2 {
8.2.2循环群·································198
, t# S8 h4 x4 P6 a8.2.3子群·····································202 Y' N5 o3 T |# I4 H; r
8.3离散对数问题··························204
- E7 n2 k- l" n0 z, s9 P8.3.1素数域内的离散对数问题····204
- `! M! ]% ^& p; n* J6 c1 \8.3.2推广的离散对数问题············205/ C3 W5 E4 j% `: j# G6 d. H
8.3.3针对离散对数问题的攻击····207 [2] 1 `; A& ? Q" U- ~8 u( L
8.4Diffie-Hellman密钥交换的安3 L" \/ v ~6 C# ^- S9 a8 s
全性···············································211. T3 x) a6 Y, d% l1 d
8.5Elgamal加密方案····················212
, I- K* }9 V' Q/ J7 R8.5.1从Diffie-Hellman密钥交换. r" m7 f) B5 Y, O. A( f
到Elgamal加密··················212
7 l; {* B$ X t' |! q' I1 s8.5.2Elgamal协议·······················213" V- M/ z: R* ~5 P4 u
8.5.3计算方面·····························215
& K3 K: q0 j& B* P; ~- I) S8 W8.5.4安全性·································216
+ Y, J0 ^9 F/ r! T, Z8 G# M% p8.6讨论及扩展阅读······················218
1 w# b5 `2 g/ o' F" L# @8.7要点回顾··································219
! `; a5 ~/ {% G" j8.8习题··········································2194 O, ?3 Q* k, l
第9章椭圆曲线密码体制················225
% \8 d5 c: R M$ c3 Q6 S6 J0 ?9.1椭圆曲线的计算方式···············226
4 J% ^: S5 _- D `1 i9 f4 q' w: a9.1.1椭圆曲线的定义··················227
; G+ W+ z6 V \9.1.2椭圆曲线上的群操作···········228
* c5 f: }/ I( P# |+ I9.2使用椭圆曲线构建离散对数: \8 r% A! V( c8 ^
问题················································232( e5 K" L9 [* {8 \
9.3基于椭圆曲线的Diffie-Hellman, t& ~* o* A* A
密钥交换··································236
# }7 z$ a! H6 v. C6 z8 Z* M9.4安全性······································2386 o) Z: N& n2 N
9.5软件实现与硬件实现···············238
& K& J+ u2 a7 w% s9.6讨论及扩展阅读······················239
/ _, w! |! X+ M8 c2 {- a! s9.7要点回顾··································241
& L+ _: g( W& A* Q. @8 m9.8习题··········································241
1 J' L$ I% \6 l第10章数字签名····························245* f$ \/ q1 P/ S6 |3 p
10.1引言········································2456 q2 Q( ~, h, D# K! Y
10.1.1对称密码学尚不能完全2 @6 t8 {/ v2 x5 {4 V" K4 q
满足需要的原因··············246/ Z5 o" b4 x. C
10.1.2数字签名的基本原理······247
]# C2 g0 T. b- e1 b10.1.3安全服务·························2481 ~0 ]6 d G) n) I9 W6 d
10.2RSA签名方案························2499 m, J1 Y4 G# P+ H
10.2.1教科书的RSA数字签名···250" p: i# M1 o$ g1 z! M) m8 v
10.2.2计算方面··························251
5 s8 @- }1 O, u `& E; r; C8 S10.2.3安全性······························252
; y3 S8 ~) v% ?# z3 R$ @8 d3 D9 c7 o10.3Elgamal数字签名方案··········255
: ]2 q$ V. F, |; ~' A10.3.1教科书的Elgamal3 k" {, P6 J5 i( g- _; u/ Y
数字签名··························255
1 i: w/ a, l% L4 ?2 r. I* q: L) _10.3.2计算方面··························257
; \/ [3 ^. M/ N6 `10.3.3安全性······························258 [2]
2 e1 V# ]3 z. U( K! _7 j, i10.4数字签名算法························261# X5 u4 y5 Z0 s! ]' _
10.4.1DSA算法·························261
, p. K$ ^& C, c深入浅出密码学—常用加密技术原理与应用
; C$ T$ S9 l6 a9 s/ {% ?2 G, {X
( O. H/ P6 {. k$ @6 u1 o10.4.2计算方面··························264& s5 T9 F( s5 M% A' @1 p
10.4.3安全性······························265
+ H* e: h1 D6 e) C10.5椭圆曲线数字签名算法·········266
' V4 m% m4 j/ B1 L10.5.1ECDSA算法····················267
0 u3 V f/ D0 }& j$ n10.5.2计算方面··························2708 R. J7 @8 p. N4 e( ]0 c) D5 ?
10.5.3安全性······························270' k# L _- M* n& h: V, q" U8 l
10.6讨论及扩展阅读····················271, [/ u8 g6 j H. I
10.7要点回顾································2727 q6 r% Q0 Z: e" O7 N4 m+ v
10.8习题········································272" \8 m5 Z0 |5 C7 W( H0 r, d
第11章哈希函数·····························2773 ^7 s/ l" s1 n5 N. S9 t' N
11.1动机:对长消息签名·············277
2 f- p7 o, ~& }( o$ t2 b2 `8 @11.2哈希函数的安全性要求·········280- |8 Q: J" z- [. ^+ p
11.2.1抗第一原像性或单向性···280' w- ]( x' z' Z! C6 z6 Y: A3 K8 l
11.2.2抗第二原像性或弱抗- A- I2 u/ `6 D2 ]$ {5 Z
冲突性······························281 s x" y! v) F
11.2.3抗冲突性与生日攻击·······282( J; Z$ Z, D, K1 ^0 `; h
11.3哈希函数概述·························286
7 A: k" m, K. y: o+ i! D' C11.3.1专用的哈希函数:MD4
% [6 s- m9 ?! }# ]3 ?家族··································287
D O$ C' R: I5 s4 d& l11.3.2从分组密码构建的哈希5 D. M" w5 C! k# ?% `1 s
函数··································288
6 k1 _# U) K/ N9 K9 O+ j# ]! _! V11.4安全哈希算法SHA-1·············290% I* ^, I! _2 e, y% U$ S- F& K7 D
11.4.1预处理······························291 k: l% s5 e" {/ h9 }6 N3 E
11.4.2哈希计算··························292* W& I& N8 D B; ^6 m+ r
11.4.3实现··································294
& c/ y4 {! W$ \11.5讨论及扩展阅读·····················295: [# @/ j- T8 R9 r
11.6要点回顾································2962 S% ?1 x( L& y, v$ l; E4 c1 H' c
11.7习题········································297& o, j3 G5 r. r/ {
第12章消息验证码·························301
: {3 ]! z* J4 P) f8 o9 S8 y% W$ [! _12.1消息验证码的基本原理·········301
+ H2 q+ t# l5 [. F4 ^ U) Q12.2来自哈希函数的MAC:) U6 K$ G5 x- B# x; E; v
HMAC····································303
/ V2 w( |. D0 r1 |2 g+ `8 E7 x12.3来自分组密码的MAC:
. s) U! L7 M' b, U& K$ U4 CCBC-MAC·····························3075 \2 U- `' V0 w0 e4 \4 A
12.4伽罗瓦计数器消息验证码·····308
9 t/ C0 X) R7 Y& y0 D- ^12.5讨论及扩展阅读····················309
5 r# ?& u. r! Q$ u: b12.6要点回顾································3097 ^7 Q# r$ {+ E% o/ C+ @
12.7习题········································3100 r y: ?9 o, U$ |3 }0 x* X
第13章密钥建立····························313
% j# `' \1 C2 U4 N* X X+ C13.1引言········································314
) s6 i- t, U# V ~13.1.1一些术语··························3142 @$ L- E4 I' H: G0 Y
13.1.2密钥刷新和密钥衍生·······3144 G. c: |) ~. E K
13.1.3n2密钥分配问题··············316' v6 E# K# d k) j
13.2使用对称密钥技术的密钥
g, ^2 U3 r% Q9 ~建立··············································317
! W; b8 J/ p" |( u13.2.1使用密钥分配中心的密钥
! Q' \5 f8 J& x+ y" g. h/ \( k建立··································318% b# d. N: m" w r
13.2.2Kerberos···························321; D E: `- s: a3 N' p# M
13.2.3使用对称密钥分配的其他! }/ Q) i/ `, V0 L6 x" a7 E
问题·································323) s' J5 X! {4 O
13.3使用非对称密钥技术的密钥
N/ l3 X) z Y7 y2 Z8 |1 C建立·······································323
9 }* N3 `; I9 M' E; M+ b13.3.1中间人攻击······················324
& E0 K' B# H5 U* s9 @/ p- O) Y3 y8 Z13.3.2证书·································326
1 R, T8 g' l/ E& l, y5 j! M13.3.3PKI和CA························329
" J2 r/ K; d7 W' y: s7 B1 `' ^9 K% t13.4讨论及扩展阅读····················3326 X$ A p3 W/ P2 C0 `. f" a) |* q
13.5要点回顾································333
( d( ^; A" J: h( h( v1 ^' j& R13.6习题········································333
( r9 F2 f; V/ Z& M- j1 G* i& o参考文献·················································339- o' |; j+ ^3 }2 U
3 M! C9 T3 x& h( w- ]( D+ Z: C1 n5 R+ [3 w* @$ w
侵权联系与免责声明1、本站资源所有言论和图片纯属用户个人意见,与本论坛立场无关- O9 R6 F* J4 S3 w' P- a0 j! K: b
2、本站所有资源收集于互联网,由用户分享,该帖子作者与瑞客论坛不享有任何版权,如有侵权请联系本站删除$ h( G) O; N6 ~9 @, W2 S
3、本站部分内容转载自其它网站,但并不代表本站赞同其观点和对其真实性负责. A5 i- ]9 `9 |6 `
4、如本帖侵犯到任何版权问题,请立即告知本站,本站将及时予与删除并致以最深的歉意8 y0 s$ w( |7 g7 Q/ R1 N
如有侵权联系邮箱:ruikelink@gmai.com深入浅出密码学——常用加密技术原理与应用.zip
2 \9 C4 N: ^ Y, m! N9 K+ i1 v资源下载地址和密码(百度云盘): [/hide] 百度网盘信息回帖可见
) Z" I3 U* u3 ^5 p5 x ^0 O8 A! K. o# t5 B0 R: `+ y' E) N
$ Q& }' n& u7 \0 w1 n7 v4 ]
. \+ X$ A8 v. O4 r6 Y本资源由Java自学网收集整理【www.javazx.com】 |
|