|
第1章密码学和数据安全导论·············16 V. W0 S' E, d! T: H' ?
1.1密码学及本书内容概述···············1% k! S! ]% L2 A7 [3 |% \* `7 Q3 b
1.2对称密码学··································3
1 x5 z. _ a% j1.2.1基础知识······························4
0 V1 Q/ s, O8 U0 _( p, X# T1.2.2简单对称加密:替换密码······5
1 C" w0 L7 ~* b4 J: o1.3密码分析······································8% N- H3 i$ T, A* \8 j" J5 \
1.3.1破译密码体制的一般思路·······8; ^. ^/ t3 ?8 X
1.3.2合适的密钥长度····················10- w6 ?, b S0 Q( A
1.4模运算与多种古典密码·············11! z7 Q, I2 j" P. R: O
1.4.1模运算···································12
3 o! z- k: O1 l; Q" d. L4 W1.4.2整数环···································153 g! R# j$ q0 d8 F' v6 M
1.4.3移位密码(凯撒密码)·············16& g" ^6 Z' l9 w- X8 ?1 u! S
1.4.4仿射密码·······························18: e- Z; u( G! a0 H
1.5讨论及扩展阅读························191 M& [/ m, t! t# P1 z$ ^7 g% q i
1.6要点回顾····································21
5 i4 O6 v- D8 y: s( _& A" l1.7习题············································210 T, w. S# Q+ O' _1 o9 {
第2章序列密码·································27
& G5 X8 w8 B8 M9 p2.1引言············································27
4 A, F# }& W8 j% z }) v7 |! |2.1.1序列密码与分组密码·············27
3 _( ^; `& Q4 B! R# O9 W0 K: d* V2.1.2序列密码的加密与解密·········29: e! g; k: B4 k( ^& r1 @5 K+ Q
2.2随机数与牢不可破的分组密码····32
2 S4 r% A. b3 ~+ y8 F" |3 [2.2.1随机数生成器························32
: T. n2 J9 l% F( A# T2.2.2一次一密································34( b3 M) ?) ^2 Y
2.2.3关于实际序列密码················35
' E. ^6 S1 K9 n7 j- e0 G2.3基于移位寄存器的序列密码·····38
8 ]' r2 r, c' L' U% K2.3.1线性反馈移位寄存器(LFSR)···39$ l% P1 A( ]6 v. U. b
2.3.2针对单个LFSR的已知明文
' @" Q/ p# }5 ^# N攻击······································43$ U* B6 w7 r% ?& K$ i
2.3.3Trivium··································44
b/ r% _9 m' D# T2.4讨论及扩展阅读···························46
. w' p7 B3 p0 p- H: K2.5要点回顾····································47
/ e) S) y8 @* j8 A2.6习题············································483 u" J" B3 P( a6 I8 C
第3章数据加密标准与替换算法·······51
( x: Q+ Y4 O( P. M8 `% m3.1DES简介····································519 y* @* n$ q0 E. c" s. \
3.2DES算法概述····························54
) W: ^. S# g7 ]& h! ~3.3DES的内部结构························56* h. b* ?& b, n/ }# a% f
3.3.1初始置换与逆初始置换·········56" X* i7 V% c5 n
3.3.2f函数······································585 R7 l: Z. G- v8 X+ o
3.3.3密钥编排································632 o, P ~: q5 O/ z0 X. E- n$ y
3.4解密············································65
# s* g/ Q W! B: q' H. D1 M! t3.5DES的安全性····························68+ i& N) P0 N7 y2 O
3.5.1穷尽密钥搜索························689 Q: }/ M$ ^- a$ W
3.5.2分析攻击································70
! f& H, a2 N8 |3 G3.6软件实现与硬件实现·················71* K: Q) ]4 [( I& ?* ^) {2 q$ ~
3.6.1软件········································71; L s t9 Q( h( g b
3.6.2硬件········································72
. X2 M. @' O2 A5 x" R3.7DES替换算法····························72) y6 D- o6 D% ^2 r0 w2 A( ~
目录, E0 X% }9 o! Y5 Q; Y" ^# E& u8 H0 f- N
深入浅出密码学—常用加密技术原理与应用
3 j% g; u5 x" }" l. S! [/ X# C( c: H& f) WVIII
$ z+ c$ i: G3 \! w, d+ r Y3.7.1AES和AES入围密码···········72
4 E$ g! @! j, I3.7.23DES与DESX·······················73
8 ]8 z. K( e) E3.7.3轻量级密码PRESENT···········73/ p. a6 _. q" ]5 e4 U
3.8讨论及扩展阅读························76
/ K- s- l! H: u- `4 R% G; r3.9要点回顾····································775 {& X) Y' f2 Q7 z( K
3.10习题··········································78; h/ C1 S$ e# S
第4章高级加密标准·························83
+ l. k$ d: h/ E2 Q' [- v4.1引言············································83! O! v# C) [$ |# J
4.2AES算法概述····························85" r; [, _- A G- e; M
4.3一些数学知识:伽罗瓦域简介···87
& {9 w( y$ B7 A; T9 F4.3.1有限域的存在性·····················87. K. B: O% Z! R! r
4.3.2素域········································89+ i- b; [, c) s, ?- h1 q
4.3.3扩展域GF(2m)························90
6 T1 e/ J% L7 Z# Y# r2 `4.3.4GF(2m)内的加法与减法··········91
/ ~ b% e( D5 V& |8 y- {7 r4.3.5GF(2m)内的乘法·····················91
7 K: ^8 J' J; g+ M8 G4.3.6GF(2m)内的逆操作·················93/ q0 [. {6 @( g6 _7 }" L
4.4AES的内部结构························95
& P0 K& i' c V/ |4.4.1字节代换层·····························96
: k9 _, X* z0 L- @+ N- W3 `4.4.2扩散层····································99
& o/ M6 v- N4 v3 v, u& R4.4.3密钥加法层···························101
8 Y4 v$ b" v" j6 i$ {1 H4.4.4密钥编排·······························101$ f1 q$ G v1 D- @6 ~0 ]
4.5解密··········································106, d, p5 ~% t1 k7 Z L
4.6软件实现与硬件实现···············110
3 R( M; o9 N: F; X4.6.1软件······································110" `& {+ i5 K& J3 ^1 r
4.6.2硬件······································1114 ]2 X" ~, W3 y. z& M. i9 z
4.7讨论及扩展阅读······················111% r# V% P2 j6 }' v) ~4 Y+ o) {9 G
4.8要点回顾··································112
9 b* h Z) s9 ^5 c+ p4.9习题··········································112
+ a: ~( i+ I& T' i/ p+ F第5章分组密码的更多内容·············117
0 h. g4 ^4 @1 C5.1分组密码加密:操作模式·······1173 K1 B2 f6 z4 Q; ?
5.1.1电子密码本模式(ECB)·······118
" L8 p) n* \0 E- i0 |. t* B5.1.2密码分组链接模式(CBC)·····122
6 S5 s6 S( _& E# N2 V0 R5 N/ K5.1.3输出反馈模式(OFB)············123
$ x( d+ s4 \4 k- Q* `5.1.4密码反馈模式(CFB)············125
% s( l% | } M; j5.1.5计数器模式(CTR)················126) i+ O/ W+ c% p8 S8 V% g
5.1.6伽罗瓦计数器模式(GCM)···127
/ O: h' K. E( k3 _0 _1 j0 r5.2回顾穷尽密钥搜索··················129; L/ l( _1 w3 u$ d) ~8 o
5.3增强分组密码的安全性···········130
. I5 _+ y! H, m2 Q6 k- @5.3.1双重加密与中间人攻击······131
0 {% D+ w' G& {; o7 M7 c5.3.2三重加密······························133, C J$ [; c4 Z( _
5.3.3密钥漂白······························134
# q& ^& G2 ?4 p0 J9 {+ E# n& O+ c7 r5.4讨论及扩展阅读······················136
; k5 y/ F8 ]0 y5 `. W# v5.5要点回顾··································137
$ d5 h( I& y s T9 {5.6习题··········································137
4 Y+ \2 t" ? f( H1 h0 U1 b; J% y$ ]3 }第6章公钥密码学简介···················141
5 x( `( U9 V+ m6.1对称密码学与非对称密码学···141, p) ~, N) E$ t; S+ N+ A) y
6.2公钥密码学的实用性···············1452 X* V3 s4 s# }1 K7 D+ o$ v
6.2.1安全机制·····························1450 V8 H* k' R% P' c
6.2.2遗留问题:公钥的可靠性···146
7 E9 Z& a9 D- q( O" y+ k: V6.2.3重要的公钥算法·················146
& d, \, a8 }0 h6 u' Y3 ?: R a6.2.4密钥长度与安全等级··········147' r# w" w9 w$ R$ w7 C7 _) G5 `
6.3公钥算法的基本数论知识·······148
% P+ J w/ [& L6.3.1欧几里得算法·····················148
, z1 X3 c3 D/ g5 Z) J; ~/ M6.3.2扩展的欧几里得算法··········151' r$ N" I9 a3 Y" S$ x
6.3.3欧拉函数·····························155
3 o) w2 p( V o8 L# _6.3.4费马小定理与欧拉定理······157
0 N) z8 Z: |* q4 e6.4讨论及扩展阅读······················159
+ I' F) g5 c! |: T M6.5要点回顾··································160! d) Z4 O$ h: p
6.6习题··········································1602 `/ X0 H* d5 a, c% ^# J3 U: j/ ~
第7章RSA密码体制······················163
% J% B2 C) |! S1 Z1 \8 L% R7 R7.1引言··········································164
. ]) ^$ Z) q9 g! A7.2加密与解密······························1646 d' f; \$ O3 R% G7 ]' |$ f) k8 @
7.3密钥生成与正确性验证···········165
* A6 v5 P9 N+ L6 ]# K- F/ {. h( s0 h7.4加密与解密:快速指数运算···169
# e6 ]3 @4 _0 O8 ?目录
: Q7 D6 `7 J3 S, ?* C1 L2 eIX- M$ T# R$ a; e( y3 g1 p
7.5RSA的加速技术······················173, g4 y. B6 f. ~4 y0 ~. Y
7.5.1使用短公开指数的快速加密···173& B+ s4 R2 ^; h5 |
7.5.2使用中国余数定理的快速
- i' q1 `( i+ V加密······································174
o; p8 ^& Z3 g8 J) q( V7.6寻找大素数······························177; T# m/ \8 m: ]: e, c2 b& i, S- l: [
7.6.1素数的普遍性······················177% q* w e, u! L
7.6.2素性测试·····························178 v' S2 X5 J, K: |& [1 H
7.7实际中的RSA:填充··············182
2 M' }2 y M+ A- F; C7.8攻击··········································183, r8 H9 @+ m0 @5 W' Q, v# o" B
7.9软件实现与硬件实现···············1868 Z! q: ~0 V5 H
7.10讨论及扩展阅读······················1875 e/ m3 i0 J, m
7.11要点回顾··································188
) h' P `) q" ?; y, Y! Z! A1 X7.12习题··········································189
; w3 x& V. T( U第8章基于离散对数问题的公钥
0 p, V4 J1 K' m% z! K密码体制·······························193 O/ f5 o, W! l9 M% {% m
8.1Diffie-Hellman密钥交换·········194
9 B# Q: m' S: t* q8.2一些代数知识··························196
! r# u" O$ e$ T8.2.1群·········································196
9 h6 O3 k8 B; u/ C8.2.2循环群·································198
% S1 s1 `& ?$ \4 w+ j8.2.3子群·····································202
/ } x# L b) n8.3离散对数问题··························2049 \; F' D+ o1 G! _7 t) j
8.3.1素数域内的离散对数问题····204
. m; t& d+ A' V5 `+ M/ |, T8.3.2推广的离散对数问题············205
8 C, ~7 ^% u; z# v# q/ z8.3.3针对离散对数问题的攻击····207 [2] , g2 d! F9 C7 B9 |
8.4Diffie-Hellman密钥交换的安- h, i8 G1 w) z+ _# N9 D; D
全性···············································211
7 A5 t5 _/ s) i: `& t8.5Elgamal加密方案····················212$ O! `4 |, b0 x8 y
8.5.1从Diffie-Hellman密钥交换
$ y; ~ y: U7 o$ h0 N. j5 p9 c到Elgamal加密··················212$ \1 B$ Y2 @8 \: U: \! _
8.5.2Elgamal协议·······················213
8 T8 b: S. p! B5 G% J- f% t8.5.3计算方面·····························215* _) s; l1 b7 [+ T" u
8.5.4安全性·································2163 G- V2 l. m- @! S$ A
8.6讨论及扩展阅读······················2188 _% `% B5 T8 H1 c$ K: d9 _
8.7要点回顾··································219
4 g% R7 {; e/ O6 {9 F( ^( Y8.8习题··········································219
+ @0 H0 y5 X7 S$ M& b5 M, _( s2 n第9章椭圆曲线密码体制················225$ a' R% Y: N6 k2 m7 F# J+ I
9.1椭圆曲线的计算方式···············226! x6 t# Z0 K- y1 o3 \) a2 W4 V
9.1.1椭圆曲线的定义··················227( n6 q3 W& q4 E! r/ u( |
9.1.2椭圆曲线上的群操作···········2286 J" B, l: Y5 a1 E: x: a( P
9.2使用椭圆曲线构建离散对数7 P |% c! ~ p7 G, c- O3 P
问题················································232
3 J5 ]5 v& H0 ?3 r; }# z9.3基于椭圆曲线的Diffie-Hellman$ v$ a: }8 i& G; Y A1 a; A
密钥交换··································236
, c' t6 y: t: E( N% ^9.4安全性······································2382 k5 G4 F1 S) v0 V- ?: ?
9.5软件实现与硬件实现···············238) P7 V6 U2 a' Y) K# s
9.6讨论及扩展阅读······················239. j$ E. Z5 O" t! G' B
9.7要点回顾··································2417 ~* b& H% W9 G6 A+ L; k, P6 f
9.8习题··········································241
! k$ E# ^( [0 ~, M9 S# q# Q+ j第10章数字签名····························245% d! ^7 W: A7 i0 }/ O, S3 Y
10.1引言········································245& h' I+ [& M5 V# N/ C
10.1.1对称密码学尚不能完全
, C `' R% m; W7 Z2 Q& u) ]9 d1 B3 i满足需要的原因··············246
2 ~2 d+ m& B. H10.1.2数字签名的基本原理······2478 ~) Q1 |+ W* j, k9 V
10.1.3安全服务·························248
7 W; r/ R9 I2 i* X; }( q* }10.2RSA签名方案························249
5 c7 Q( I" j7 v% v10.2.1教科书的RSA数字签名···250
7 m* Z1 R4 O2 u* h5 G6 m10.2.2计算方面··························2511 I$ g7 a4 ~$ K; v
10.2.3安全性······························2524 X, X& c- D5 q4 d
10.3Elgamal数字签名方案··········255
9 v& S- s6 @9 M& }8 \( }4 w10.3.1教科书的Elgamal1 D# d4 |% {$ s7 A. f2 d {; m
数字签名··························255
. s" i5 w* s! ^) F, A1 s10.3.2计算方面··························257& ^) d5 L3 P) {( C. j- Z
10.3.3安全性······························258 [2] ! l' r2 g+ J: V
10.4数字签名算法························261! }; ~) S6 t/ t7 g& k' W; J2 n: k& k
10.4.1DSA算法·························261
1 Y. a( n$ k$ e深入浅出密码学—常用加密技术原理与应用
7 `% @4 I3 r5 }% ~X
% C, D, J# E, H; e$ \' W# B$ U1 [10.4.2计算方面··························264
1 i* \8 x, @# L6 }; ]10.4.3安全性······························265
7 O4 S% j6 {1 Q! ^9 M10.5椭圆曲线数字签名算法·········266
4 D; }( H$ E8 B9 C7 p9 n10.5.1ECDSA算法····················2679 R( s- E* U( p0 q4 H/ o# ?6 C7 q
10.5.2计算方面··························270
2 A% f, I/ H. ^10.5.3安全性······························270. g8 X3 R( m2 m; i% F/ h/ B6 e) L( F* M
10.6讨论及扩展阅读····················2715 E: O) J; c! M* ~' d$ k( e
10.7要点回顾································272
$ l0 D2 c3 l1 Z: R10.8习题········································272
$ u% e, Q6 Q" }2 {7 {; u9 |第11章哈希函数·····························277" c, K e% v- d9 i1 l" Y# U/ ^
11.1动机:对长消息签名·············277
8 H5 O: H/ j0 x11.2哈希函数的安全性要求·········280- ?2 Z4 a+ I4 Q' G
11.2.1抗第一原像性或单向性···280
8 v5 @+ g' u1 e: N6 J! L) h: k5 T11.2.2抗第二原像性或弱抗
! q" C) i) U; A9 Z8 ?4 f冲突性······························281$ \. {6 ~1 y- X" H, l4 P
11.2.3抗冲突性与生日攻击·······282
$ H% H! G3 h, I11.3哈希函数概述·························286" s/ A7 t1 F D2 h& r: S
11.3.1专用的哈希函数:MD43 F( p7 Z2 C' }, D2 L Q* _2 j! G+ ^3 A
家族··································287) H9 v1 W( ?: x& D) v* {
11.3.2从分组密码构建的哈希" U0 |+ y: Q d, A
函数··································2883 O3 O- D, \; M+ Y' j/ U8 o, K$ E
11.4安全哈希算法SHA-1·············290
" P6 V' x0 f! h6 t4 L' D11.4.1预处理······························291
K" J) F: ~" @; k( r Q11.4.2哈希计算··························292
% v; G0 J' O* i9 X) |11.4.3实现··································294
( l8 o+ s: Z$ L6 t$ T% |11.5讨论及扩展阅读·····················295* y( z2 P$ j2 l
11.6要点回顾································296; P3 f: v. I: O5 j/ q* ?( c5 K
11.7习题········································297
u, O2 M& ?; P7 a7 q第12章消息验证码·························301
& j( E0 Z% u' Z12.1消息验证码的基本原理·········301" M. G" y+ e y
12.2来自哈希函数的MAC:
% Q- A* z. x2 WHMAC····································303
, d4 L% ?+ Z* t6 ]7 q1 r12.3来自分组密码的MAC:3 j7 X0 i1 P" i( `# L: ^( |" B7 g- d
CBC-MAC·····························307+ e; x1 D4 b% O; |
12.4伽罗瓦计数器消息验证码·····308
& }& z3 l2 ~5 D3 ^12.5讨论及扩展阅读····················309* b5 v3 j) p9 H2 V+ j0 @. j
12.6要点回顾································309
/ W8 j+ f0 s6 n9 c# j12.7习题········································3102 o! l" v6 b" \- U6 E
第13章密钥建立····························3135 G+ G9 f, Z3 p3 A5 I+ q
13.1引言········································3144 Z2 g3 I9 \( e
13.1.1一些术语··························314
" ]- K+ I- s1 h0 W t5 ~13.1.2密钥刷新和密钥衍生·······314" g# d. t: Z0 L: h5 i& z. G! D
13.1.3n2密钥分配问题··············316
% f8 T+ y* S. z" l% y13.2使用对称密钥技术的密钥3 }7 i* T7 A$ J% i- |
建立··············································3173 C M+ _8 @2 w9 j+ j8 z) J3 Y
13.2.1使用密钥分配中心的密钥
, ]$ e7 P: _! v$ |' H3 A建立··································318 P p+ d6 I! g7 D8 I
13.2.2Kerberos···························321) u$ M- ]' _. k9 b
13.2.3使用对称密钥分配的其他% k) A; e3 b" k" d
问题·································323
8 s8 a$ H) X" Z4 L2 j. }- n5 W13.3使用非对称密钥技术的密钥
2 O+ Y0 u: b! v, a0 B9 d% q建立·······································323 B% k( u3 Q: h% r: f
13.3.1中间人攻击······················3241 c5 y! k, R6 L' T
13.3.2证书·································326; O4 g4 l0 L% ]1 I
13.3.3PKI和CA························329
* i$ _, z$ ~9 e4 H13.4讨论及扩展阅读····················332 G7 ~# {5 [ s4 z" M) w* n
13.5要点回顾································3333 f8 [7 z* G% ?: R$ ^. a+ M
13.6习题········································333
' w& Y" G1 q: z5 _参考文献·················································339, w8 R: `9 d' ]) n# |. N! S+ y
) H$ \. ?. i) |* @1 R
" v4 X2 p/ |0 I8 z1 P侵权联系与免责声明1、本站资源所有言论和图片纯属用户个人意见,与本论坛立场无关- z* W0 r. n- ~
2、本站所有资源收集于互联网,由用户分享,该帖子作者与瑞客论坛不享有任何版权,如有侵权请联系本站删除4 ^3 A7 a f7 x% c6 z
3、本站部分内容转载自其它网站,但并不代表本站赞同其观点和对其真实性负责0 e% y6 R, N4 D0 a! D4 z! C$ x
4、如本帖侵犯到任何版权问题,请立即告知本站,本站将及时予与删除并致以最深的歉意4 c6 X$ M0 F/ A! f
如有侵权联系邮箱:ruikelink@gmai.com深入浅出密码学——常用加密技术原理与应用.zip6 Y1 _8 d V7 }. A
资源下载地址和密码(百度云盘): [/hide] 百度网盘信息回帖可见6 J0 Q2 `& q% b
5 F o( _/ j, P: z/ x9 l; m. E& M" R8 g& m4 f- v, ?. k$ C
, S) ~% c9 t- p$ Z# k2 G) d" U! {本资源由Java自学网收集整理【www.javazx.com】 |
|