java自学网VIP

Java自学网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

查看: 3050|回复: 28

深入浅出密码学——常用加密技术原理与应用

[复制链接]

该用户从未签到

8

主题

169

帖子

336

积分

普通会员

Rank: 2

积分
336
发表于 2024-11-20 18:17:52 | 显示全部楼层 |阅读模式
第1章密码学和数据安全导论·············10 f. P) X/ G1 K9 |
1.1密码学及本书内容概述···············13 k: L7 m: G: F. q
1.2对称密码学··································3
) h% e' r3 E$ I/ c1.2.1基础知识······························4
( S8 X3 \& V! O1.2.2简单对称加密:替换密码······5( x4 T- J+ x4 k1 k* p2 ^0 m
1.3密码分析······································8
3 p' m2 Z" O7 z) X; s2 F1.3.1破译密码体制的一般思路·······8
( C: f' v# J" r  j/ P1.3.2合适的密钥长度····················10
' }. M* j6 [! _' J1.4模运算与多种古典密码·············11. ^& I% T3 P% l- b/ Q
1.4.1模运算···································12- \$ y2 l) i- ~5 `; h5 J
1.4.2整数环···································15: d- j+ O) p$ z) U% @, y+ k' B
1.4.3移位密码(凯撒密码)·············16
0 Y. ?9 ^/ n9 j, z; R0 N, e1.4.4仿射密码·······························187 d5 x, R% }( e( p* b9 [1 \, X3 ~$ {
1.5讨论及扩展阅读························19
, L6 \3 W3 g* q# G; k' `) {7 u1.6要点回顾····································210 \9 I  R; ?/ o. A
1.7习题············································21
7 U$ E$ a5 h; d8 M* \0 \第2章序列密码·································272 T1 j( T# J& ?( }" S' W$ l9 `
2.1引言············································27
  d3 w) j4 O9 B; \9 P2 f2.1.1序列密码与分组密码·············270 X! T/ S8 t' `/ h9 S$ Q/ b- n/ c
2.1.2序列密码的加密与解密·········29. g3 {3 V, n  \9 {6 N8 `- ?- J
2.2随机数与牢不可破的分组密码····32
& [  A- C/ n- J! @2.2.1随机数生成器························32
3 R( Z; _: v1 E  m/ {2.2.2一次一密································34  }* L3 K" i- L& K
2.2.3关于实际序列密码················35
' L% [' `( e3 R7 Q7 x( N2.3基于移位寄存器的序列密码·····38
( B) H7 m2 f0 s) c& D* E9 X6 y- r1 G2.3.1线性反馈移位寄存器(LFSR)···393 `; f- }4 _+ c" F7 e
2.3.2针对单个LFSR的已知明文
) J, i+ w" X: p: x' C攻击······································43
' h8 @3 u: `. W! L  `0 r6 G2.3.3Trivium··································447 @& C2 \* Z% E, ^
2.4讨论及扩展阅读···························46. k* h8 q  F' r' O6 Q% O0 X( a6 W
2.5要点回顾····································47- p' A  S" G& a. |7 q5 s5 `
2.6习题············································48
% h5 h3 E2 r. D第3章数据加密标准与替换算法·······51" u4 O! t. i, J$ J: V% b
3.1DES简介····································51
6 Z. F' Y- p! z4 F, C0 Q, }3.2DES算法概述····························54
& n. d+ k1 ~1 X# v1 l: n3.3DES的内部结构························56  U4 h# P: i. L  p
3.3.1初始置换与逆初始置换·········56% m- }1 ^; z3 I% B5 m
3.3.2f函数······································58
- p6 x! b7 v. @' ]0 b3.3.3密钥编排································63
" B' `+ {" j9 A( h3.4解密············································65' o# `8 y5 o( R1 w$ J1 ^! ~8 `
3.5DES的安全性····························68# h4 k: \$ d4 Q+ B* \2 p# I- C
3.5.1穷尽密钥搜索························68
# I0 W9 Q& \% r- b: X3.5.2分析攻击································70
; u, c, K% i/ X5 [3.6软件实现与硬件实现·················71
* H  i' q# M$ |3 k3.6.1软件········································71* i) C/ _! a) |2 W0 |  |( m
3.6.2硬件········································72
/ `8 z2 }! J: C1 @# C% i9 O# ~3.7DES替换算法····························72
* e( d" K  `' f, T2 k5 l目录
1 _9 U  v1 I3 W& O/ X+ v1 K深入浅出密码学—常用加密技术原理与应用' x7 H/ _& U: m" _. r$ x0 E
VIII" c2 n5 B5 `( K7 q  T' I7 [1 Y
3.7.1AES和AES入围密码···········72
8 i9 R! @; v3 a# ^3.7.23DES与DESX·······················73
, E7 S1 R7 y; p% O3.7.3轻量级密码PRESENT···········730 H' Y8 E6 ~7 R0 x+ h" z
3.8讨论及扩展阅读························76  @; k6 ]* @) M5 p5 `
3.9要点回顾····································77
& T* M' R& [) J# z  h0 v! ]3.10习题··········································78
" t: z" o- M( _5 L7 z& g第4章高级加密标准·························837 A7 j3 d8 u6 Z9 a! E: A" n7 R
4.1引言············································83
1 E/ N9 z9 J4 B" [+ A1 Y! i4.2AES算法概述····························85& {: j. J) t' v/ v9 x; s
4.3一些数学知识:伽罗瓦域简介···87# U" g' |: t6 T1 ?% \9 m) a
4.3.1有限域的存在性·····················87
1 h: m1 C$ u$ U- w; L* Y4 m8 q. B4.3.2素域········································89
5 d; P, c- A% @5 u, H4.3.3扩展域GF(2m)························90
. P3 }8 p! f! e( A' ?4.3.4GF(2m)内的加法与减法··········91# i: _3 T5 u5 o# g$ ]* {+ M* Y
4.3.5GF(2m)内的乘法·····················91
1 P/ V& ]0 d/ O0 l8 }4.3.6GF(2m)内的逆操作·················93
* I1 O, J! \8 g  |0 O+ N4.4AES的内部结构························95
! M; ^- F4 O' G5 O, l4.4.1字节代换层·····························96- K0 W) \8 w, {5 M
4.4.2扩散层····································99
# o! H" o1 M0 m' D& ]4.4.3密钥加法层···························101
$ F1 M7 P8 Q# |# ~( f/ ?4.4.4密钥编排·······························101
  }3 ~, a+ f0 l) G3 q6 k, O( t% _4.5解密··········································106
1 R3 ?& T' z& `( n' u* g: q; _% @- C4.6软件实现与硬件实现···············110
! b7 {8 x* H, d5 j# h4.6.1软件······································110
1 n3 l0 Y7 r* e, t; n4.6.2硬件······································111% z% C* D1 w1 F2 h
4.7讨论及扩展阅读······················111
6 ?1 F/ o8 l. @/ n; H6 k# X4.8要点回顾··································112
0 ~+ G) |  S0 o9 ~* s3 |' U7 ]4.9习题··········································112
3 o2 M& }8 j+ ]! @3 x% u+ b; j, D第5章分组密码的更多内容·············117
& u# B* x5 T( `6 M  H; ^' S& m9 Q5.1分组密码加密:操作模式·······117
, f. F0 ^$ S* E0 \4 o5.1.1电子密码本模式(ECB)·······118
( N% b9 R, e6 W( [$ R  g2 ^9 u, @5.1.2密码分组链接模式(CBC)·····1223 K) {$ v" _* [" D' a- C3 O; b
5.1.3输出反馈模式(OFB)············123
9 f$ `# V3 j6 A/ j5.1.4密码反馈模式(CFB)············125# E1 \+ s4 [3 ~. \5 S3 ~2 t0 u
5.1.5计数器模式(CTR)················126
2 j/ V6 T  l) ~" M4 P1 v5.1.6伽罗瓦计数器模式(GCM)···1274 g! I0 Q; f  ~& m
5.2回顾穷尽密钥搜索··················129  R# P. Y0 @( p- O
5.3增强分组密码的安全性···········130! h3 L/ d* G5 X
5.3.1双重加密与中间人攻击······131
4 s% O* C$ ?  u! Q+ P5.3.2三重加密······························133
( L  h  ?/ D( \7 b4 j9 K2 L1 m7 v5.3.3密钥漂白······························134
  _" X- u0 F1 i5.4讨论及扩展阅读······················136
- `6 O0 A, z; D% I4 g/ X5.5要点回顾··································1372 e2 _5 _" v. F7 O
5.6习题··········································137. @( h/ V* t6 W6 R
第6章公钥密码学简介···················1418 ]+ D& N% E' P# O" C- ], q
6.1对称密码学与非对称密码学···141- [/ b) x$ u' ]
6.2公钥密码学的实用性···············145( ~0 y, @& {+ J: l
6.2.1安全机制·····························145% E8 |2 i7 x, @' p! z7 ~
6.2.2遗留问题:公钥的可靠性···146
) o) B) d* ^5 k& z6.2.3重要的公钥算法·················146
# X$ p- n8 s& z. l* Y( v) a& v6.2.4密钥长度与安全等级··········147
9 `$ a3 p2 U1 I( L/ l: u- L6.3公钥算法的基本数论知识·······148: D0 i8 C  l" o- y" s$ ]
6.3.1欧几里得算法·····················148
! p( Z3 p. X# O! \* S6 S6.3.2扩展的欧几里得算法··········151
$ n: g" s4 P# w1 F( _3 H" r8 K6.3.3欧拉函数·····························155
- m7 ?! C  g" e6.3.4费马小定理与欧拉定理······157
, M6 x" t1 `/ ?& u  ^/ C6.4讨论及扩展阅读······················159
% l8 c8 d) _$ ^8 k7 O6 r0 \6.5要点回顾··································1604 w% x' g: B* @  T& U
6.6习题··········································160
1 f$ _. n8 U5 H- k第7章RSA密码体制······················163
9 S1 j8 Q1 I% C( I- |; `7.1引言··········································164
1 q+ Y, u$ Y; D7.2加密与解密······························164
4 `  [" q( E3 Y' s! d; V( m7.3密钥生成与正确性验证···········165
+ y1 w7 O1 n0 R5 {  ^% N; u7 Z! w7.4加密与解密:快速指数运算···169, W+ K2 e6 u8 [( s0 \
目录# Q7 a5 ~$ ~, Z9 d. p
IX5 o9 ]4 ^4 E/ l  D+ J% X$ V
7.5RSA的加速技术······················173
1 J# t$ [9 Q  a! v7.5.1使用短公开指数的快速加密···1735 n2 a7 h* h. P) C1 c
7.5.2使用中国余数定理的快速
# T& X8 u: M5 t1 A0 x加密······································174
- F' p3 v7 `1 S$ o; Q) W. a7.6寻找大素数······························177% R# t% O4 N: l* ~* h: q
7.6.1素数的普遍性······················177- ]7 Y6 }% l+ U
7.6.2素性测试·····························178
$ a2 J* E% U# ]0 {- I5 v7.7实际中的RSA:填充··············1824 F; c& z+ u. R6 s  S
7.8攻击··········································1831 p1 e" C$ W+ w0 t' ^
7.9软件实现与硬件实现···············186" ]- ?' e3 I0 O' e' W( j% h
7.10讨论及扩展阅读······················187
2 W9 N0 S" y. Y7 x/ z7.11要点回顾··································188: P1 X/ }+ w6 u2 i
7.12习题··········································189
2 P  X& j$ I, V' j& ], m3 G第8章基于离散对数问题的公钥) h) k  W4 |2 y$ b+ D
密码体制·······························1938 N, H1 q8 y% h& R( K! C
8.1Diffie-Hellman密钥交换·········194  d5 p- s& R3 p& \! b
8.2一些代数知识··························196
& a  P6 ~6 F0 a: n% R9 m8.2.1群·········································196+ G7 w% w5 S9 [+ A5 k' U* n
8.2.2循环群·································198
1 j; _2 {+ K# |2 o8 T9 R% p4 U  K8.2.3子群·····································2027 B% O0 f, K) z+ i* X' g
8.3离散对数问题··························204
( g! Y" Z2 c$ E3 S8.3.1素数域内的离散对数问题····204" T; j$ W( y! j5 _, M+ x
8.3.2推广的离散对数问题············2053 y- l: I5 Y1 M4 T
8.3.3针对离散对数问题的攻击····207 [2]
" @# z) [' b% G7 x/ S: [1 p6 r8.4Diffie-Hellman密钥交换的安
; d# C8 y4 B3 n& w全性···············································211
! v+ P' Z2 |( `$ O$ j2 T+ \8 H8.5Elgamal加密方案····················212
( N, h+ |1 ^; y" h9 {8.5.1从Diffie-Hellman密钥交换
. C$ f& t# v6 L1 i5 q2 y到Elgamal加密··················212
# E! Q5 a( [& y2 `8.5.2Elgamal协议·······················213
4 q- A- ~' n8 u: k% h+ N2 h- M8.5.3计算方面·····························215" I& F- p, a, Z4 t. |$ m2 ~2 C1 k
8.5.4安全性·································2168 s# v+ c! O* H  n, x" A; v
8.6讨论及扩展阅读······················2185 R( ^/ a: O& S: F* a1 b, `: |* i+ w2 a
8.7要点回顾··································219
/ Y+ q; q9 W' Q* l* |" o0 W8.8习题··········································219
9 N9 Q6 u. O. V% P4 X第9章椭圆曲线密码体制················225
) D, y  P! y1 c: X. l( A9.1椭圆曲线的计算方式···············226
. u7 Q: n. i/ a( k* v/ J9.1.1椭圆曲线的定义··················2273 B2 U, G6 W# A
9.1.2椭圆曲线上的群操作···········228" e5 O5 p8 E9 m+ N  T, t9 Z  n
9.2使用椭圆曲线构建离散对数
7 Q; d" K# ^2 g5 C$ Q问题················································2321 Y! r9 @1 O# l+ B, k* i
9.3基于椭圆曲线的Diffie-Hellman5 q3 i$ Z$ Q7 I3 l, l
密钥交换··································236# r# H; k" h( N% \
9.4安全性······································238
- z" w! v* ^6 d" Z) S& U# \4 E9.5软件实现与硬件实现···············238
1 f, \0 F" x2 h$ J9.6讨论及扩展阅读······················239
$ ], q' r# m* |! k6 y9.7要点回顾··································241& L" n. W  n: [6 ]" Z: ^- y
9.8习题··········································241
5 Z4 R$ c+ @/ W/ i2 A! Q第10章数字签名····························2454 V6 U# o# Q: Z, W: i0 ~
10.1引言········································245
6 s8 J$ U' {1 H1 D( v2 \! T10.1.1对称密码学尚不能完全3 H7 Q- H8 N- A8 z& l
满足需要的原因··············246' g. B' M; w, [" [5 m+ W( r
10.1.2数字签名的基本原理······247( N- `4 g: \, H  ^1 F; j
10.1.3安全服务·························248
3 m$ @8 s  i; O& Z7 X10.2RSA签名方案························249
  A: A2 I* H7 o- N' A$ o9 C0 W10.2.1教科书的RSA数字签名···250
' a' S& r0 x- S8 `- T' H10.2.2计算方面··························251
' `' @+ B9 K4 X- T+ e10.2.3安全性······························252
) I! W! T: ?1 f- r10.3Elgamal数字签名方案··········255
! M; J! B  G% r4 E5 ]10.3.1教科书的Elgamal
* d/ Y8 E/ O- k; b6 G1 O$ v+ v1 p数字签名··························255
: K" g1 ~+ i5 E7 a! F10.3.2计算方面··························2572 M5 v/ q, e# V9 B% @/ Q0 s  N
10.3.3安全性······························258 [2] . T- _) B" `$ Q& w. y3 _; h% \
10.4数字签名算法························261  G8 s. K4 e, y2 T- E2 i% z% O8 s9 n
10.4.1DSA算法·························261
) l2 A9 ^: w( R, s深入浅出密码学—常用加密技术原理与应用6 i. U# y# L: L$ J& d7 ^
X
& H. T- ?3 v) X- I  Y! Z6 A10.4.2计算方面··························264" t7 n* ]  j! q! Z8 i' z
10.4.3安全性······························265
7 R$ c2 o5 _4 y" K10.5椭圆曲线数字签名算法·········2668 _4 e& A. S3 k' S' i3 w
10.5.1ECDSA算法····················267
! s, K9 v# u8 W. B0 K1 E" w) Y9 Q10.5.2计算方面··························270
/ i4 L8 k/ t5 N& ~) Z2 ]5 P% o10.5.3安全性······························270' _* D3 S+ ^6 I1 z3 s; A, Z
10.6讨论及扩展阅读····················271
* d8 w# z* X! _. [8 {# C10.7要点回顾································272
: V& {# H6 i6 o3 s( H$ W" }10.8习题········································272
& e& I$ i9 a; Q. S第11章哈希函数·····························277) B" ?, T& @! E' n) i8 R* F& v
11.1动机:对长消息签名·············277
/ l' q3 A5 u9 e! r4 e11.2哈希函数的安全性要求·········2809 O2 e( [& H; p  T
11.2.1抗第一原像性或单向性···280- O5 D$ k( f  |$ L
11.2.2抗第二原像性或弱抗
6 i- x2 l& C1 p$ R冲突性······························281
3 s# q& M! s& Z! n11.2.3抗冲突性与生日攻击·······282' d  v! q/ V. W/ m6 }6 q
11.3哈希函数概述·························286; o. w" a: x4 [* T6 d! v. ^
11.3.1专用的哈希函数:MD4
/ Y9 l8 _: ]' r/ c, t3 F7 t家族··································287$ @# x7 |+ m$ a% C6 E, v
11.3.2从分组密码构建的哈希
0 Z7 u% B1 }/ h2 x2 W* j- X函数··································288
$ i1 O) h& B8 Z; d5 |' F11.4安全哈希算法SHA-1·············290
8 S! `+ E" P( G* o% H8 H11.4.1预处理······························2910 g1 Y  d% M/ \! r
11.4.2哈希计算··························2927 V0 g. h( I- |1 z! ]4 }
11.4.3实现··································294
% i( @5 r( ^. z7 \3 e7 w11.5讨论及扩展阅读·····················295
8 A; ^% b: z* h* }3 _: R% l8 x& m. n11.6要点回顾································296
( |2 f  U6 a( q: i# t+ T11.7习题········································297# x2 e' Q" }3 ]6 K+ E% A; r+ t/ d
第12章消息验证码·························301
, v( [* y) v8 ]( @, o3 B$ v12.1消息验证码的基本原理·········301
9 N; u. S2 o  E& j- B! c7 C& n4 d12.2来自哈希函数的MAC:
% a! s9 \# z0 JHMAC····································3036 [+ [' l7 d# }6 j4 S8 ?
12.3来自分组密码的MAC:) P8 ^3 V: T  s* N- P( Q
CBC-MAC·····························307
) |* Z' s2 J  D9 ?% I; N12.4伽罗瓦计数器消息验证码·····308
0 S6 {6 `: d$ }1 d/ H12.5讨论及扩展阅读····················309
& S( Y$ w  S. a% K. ]3 C  m12.6要点回顾································309
+ A  p8 r! o  s/ X12.7习题········································310
( r! ?7 Z- x+ o" P9 t3 z1 r第13章密钥建立····························3131 n# y& V/ `3 p9 G1 ]/ h/ P
13.1引言········································314- k0 ]& g# q( Y3 O+ r
13.1.1一些术语··························3144 ~! u4 L( G: F4 O- t8 A$ u: ?
13.1.2密钥刷新和密钥衍生·······314
) E- `' `4 W7 U" f13.1.3n2密钥分配问题··············316
. h6 U) t0 V  J$ @$ `3 X1 ]13.2使用对称密钥技术的密钥
' d; c/ ]2 ^# i9 r* a8 Y; f建立··············································317- U6 e1 |* \6 L% g+ p; J- o
13.2.1使用密钥分配中心的密钥
8 a6 j" v7 ]5 `4 e建立··································318. K6 J9 j& n0 j
13.2.2Kerberos···························321/ X* ~/ I# s; v' H8 t( X7 q' |6 M, K
13.2.3使用对称密钥分配的其他5 g; V: E3 V1 d- o- f+ Z
问题·································323
& C; d* h$ R6 R3 m3 |7 P13.3使用非对称密钥技术的密钥
' B1 \5 }3 Y1 N$ |0 s6 w+ k; ~建立·······································323
9 O3 Y' L" q! c6 C13.3.1中间人攻击······················324% X8 J: w( H- r; M/ p
13.3.2证书·································326
0 H: L( D& l7 M* m13.3.3PKI和CA························329- v% \, V' }7 g1 Z' D& c0 O, J
13.4讨论及扩展阅读····················3329 R; N0 i  N% r' L1 J5 U( b' f7 \
13.5要点回顾································333
* Z9 W* D# x# x0 E* Y3 R, j13.6习题········································333
1 ]2 R5 y3 K- y* U3 H9 V参考文献·················································339) X4 w- p( {, k. g( v* X, B

( J5 }* Q$ Y5 l5 G
3 U4 ?8 t6 e: Z" R侵权联系与免责声明1、本站资源所有言论和图片纯属用户个人意见,与本论坛立场无关
$ A7 K1 M% Y& i' H2、本站所有资源收集于互联网,由用户分享,该帖子作者与瑞客论坛不享有任何版权,如有侵权请联系本站删除
  ]2 i& g$ J: c4 b3、本站部分内容转载自其它网站,但并不代表本站赞同其观点和对其真实性负责
8 p  c: N: d5 _. [  N8 a+ V4、如本帖侵犯到任何版权问题,请立即告知本站,本站将及时予与删除并致以最深的歉意
) H" H# y0 g& t% G- T' U5 G6 O# }# {( _如有侵权联系邮箱:ruikelink@gmai.com深入浅出密码学——常用加密技术原理与应用.zip, b1 j5 u& n( m
资源下载地址和密码(百度云盘):
游客,如果您要查看本帖隐藏内容请回复
[/hide] 百度网盘信息回帖可见
$ C( L7 s' \: Q, e# K- h- b
# S1 r% j+ z5 e9 K
7 t  w2 `+ J6 a1 Z4 J
+ S8 g; w4 i- v& p9 k9 g- m本资源由Java自学网收集整理【www.javazx.com】
回复

使用道具 举报

该用户从未签到

4

主题

169

帖子

326

积分

普通会员

Rank: 2

积分
326
发表于 2024-11-20 18:31:42 | 显示全部楼层
激动人心,无法言表!
回复 支持 反对

使用道具 举报

该用户从未签到

5

主题

168

帖子

329

积分

普通会员

Rank: 2

积分
329
发表于 2024-11-20 18:35:39 | 显示全部楼层
666
回复 支持 反对

使用道具 举报

该用户从未签到

11

主题

187

帖子

385

积分

普通会员

Rank: 2

积分
385
发表于 2024-11-20 18:46:10 | 显示全部楼层
多谢分享!
回复 支持 反对

使用道具 举报

该用户从未签到

8

主题

172

帖子

348

积分

普通会员

Rank: 2

积分
348
发表于 2024-11-20 18:58:24 | 显示全部楼层
111
回复 支持 反对

使用道具 举报

该用户从未签到

10

主题

164

帖子

336

积分

普通会员

Rank: 2

积分
336
发表于 2024-11-20 19:07:09 | 显示全部楼层
看到这帖子真是高兴!
回复 支持 反对

使用道具 举报

该用户从未签到

7

主题

163

帖子

331

积分

普通会员

Rank: 2

积分
331
发表于 2024-11-20 19:17:55 | 显示全部楼层
强烈支持楼主ing……
回复 支持 反对

使用道具 举报

该用户从未签到

19

主题

192

帖子

397

积分

普通会员

Rank: 2

积分
397
发表于 2024-11-20 19:22:31 | 显示全部楼层
强烈支持楼主ing……
回复 支持 反对

使用道具 举报

该用户从未签到

0

主题

4642

帖子

9286

积分

普通会员

Rank: 2

积分
9286
发表于 2024-12-6 12:50:38 | 显示全部楼层
看起来好像不错的样子
回复 支持 反对

使用道具 举报

该用户从未签到

0

主题

4680

帖子

9362

积分

普通会员

Rank: 2

积分
9362
发表于 2024-12-6 19:52:33 | 显示全部楼层
这么优秀的么
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|Archiver|手机版|小黑屋|Java自学网

GMT+8, 2025-3-30 00:29 , Processed in 0.087852 second(s), 28 queries .

Powered by Javazx

Copyright © 2012-2022, Javazx Cloud.

快速回复 返回顶部 返回列表