|
第1章密码学和数据安全导论·············1
6 v) \1 X: K( q/ t8 n1 M# ?) s1.1密码学及本书内容概述···············1
2 G& G9 Z S# ? V# b1.2对称密码学··································3
+ i* O, W, T) z$ _1.2.1基础知识······························4/ x/ @$ _( b: y, `- E) _, ?
1.2.2简单对称加密:替换密码······5' Y0 {9 d& H, G" o1 r
1.3密码分析······································8
* {" u+ L2 |& H3 I7 R) \1.3.1破译密码体制的一般思路·······8
% ?. f z" ?: ?( Y1.3.2合适的密钥长度····················10) q7 k- b( C" @: M. E2 D2 z' ?
1.4模运算与多种古典密码·············112 i F3 q) f, H+ h( Q
1.4.1模运算···································12
' A6 T; k' P, S1 }: t* W0 i1.4.2整数环···································15
- i3 L( \" f3 W& a8 p8 |+ H1.4.3移位密码(凯撒密码)·············16
4 p" j( N1 ]. F3 O# v8 c! o+ P1.4.4仿射密码·······························18' o: l) t/ ?" q0 P/ W& h2 J1 E
1.5讨论及扩展阅读························19
. Y5 v' D" h& X1 \9 ^1.6要点回顾····································21
1 i9 W- K, A2 ~* L1.7习题············································21& z/ K. Q, X! {$ I
第2章序列密码·································27
$ o! s) R, f& ]' i2.1引言············································27
; ^0 D( G5 G8 x$ d( s2.1.1序列密码与分组密码·············27
/ i9 t7 a' Z" W4 K+ h2.1.2序列密码的加密与解密·········29
8 m& v* ^8 k1 W7 N e2.2随机数与牢不可破的分组密码····32" t E0 ?/ d2 ?+ P' U
2.2.1随机数生成器························323 V+ y2 B8 A1 |, I$ `& A1 U& o4 s
2.2.2一次一密································34
* ~- V/ o; L# Q: q1 l' H2.2.3关于实际序列密码················35, A" p1 m9 s3 W, e7 C
2.3基于移位寄存器的序列密码·····386 T9 S; i8 V% b& H f
2.3.1线性反馈移位寄存器(LFSR)···39
! t$ e/ G9 y% G9 R7 H8 n* `2.3.2针对单个LFSR的已知明文
3 p, J2 {0 u6 H Q t9 l/ V: [4 I攻击······································43
6 ?5 |+ h0 s7 c/ ^# N+ w4 Y2.3.3Trivium··································44 N. i7 _0 p+ f2 M d. b# o* c; q4 p
2.4讨论及扩展阅读···························46
1 X& x7 ]8 C& y! l" [5 n2.5要点回顾····································47( [( Z! I8 F, c# z* |9 l
2.6习题············································484 L% G' G5 N9 r* e) g
第3章数据加密标准与替换算法·······51
" s9 `3 U1 D6 I2 R/ s# q3.1DES简介····································51
2 w! q d+ c9 F3 `# I3.2DES算法概述····························54
4 J. m5 m- v# U$ \3.3DES的内部结构························56( M8 _) h' H1 V; v( H- d
3.3.1初始置换与逆初始置换·········56: k* ~# X* C! @# m" w
3.3.2f函数······································58, R$ j- V G/ q2 p* D
3.3.3密钥编排································63: R1 G% Q5 D( y
3.4解密············································65
# x6 r* A6 D$ C7 y9 G t3 F3.5DES的安全性····························68
L( `; r6 h2 k' B% ~3.5.1穷尽密钥搜索························68
% U, H1 P( ^; M3.5.2分析攻击································70
. x3 }% ~" C; H3.6软件实现与硬件实现·················719 ^0 \) {8 Q& Z7 N
3.6.1软件········································71# q# N, s# m5 p5 q
3.6.2硬件········································729 A) c* H* V! u' R- S$ |9 @4 F9 ?9 N
3.7DES替换算法····························726 X0 t( N* c2 B1 |! ]" N
目录3 e y& q! z* {
深入浅出密码学—常用加密技术原理与应用
8 n7 B! A6 n6 f* M- yVIII
. s! t7 T; ~3 e3.7.1AES和AES入围密码···········72
7 @! s# g! s4 A2 J2 ?3.7.23DES与DESX·······················73# F. `" M2 O$ z
3.7.3轻量级密码PRESENT···········73
# c* `# j0 q4 b s. n, ?5 D3.8讨论及扩展阅读························76
2 w {' Z/ Q* c4 {4 u7 f3.9要点回顾····································77
# ]# ], {# O$ X) J5 T$ I: K7 J3.10习题··········································78
^0 l' W- P ~1 G" s第4章高级加密标准·························83
0 s! P$ E: \- V4.1引言············································83
, t( }( V1 |/ J8 B4.2AES算法概述····························85
8 ]' @% i$ q' r& |$ g. T. h% g% K4.3一些数学知识:伽罗瓦域简介···87
. N2 Q* K) |# ^9 S4.3.1有限域的存在性·····················87( L: V" P" O% H8 G( Q
4.3.2素域········································89
7 n/ Z2 u3 R9 y& B4.3.3扩展域GF(2m)························90
9 m9 w5 R! b( a* m( q& j4.3.4GF(2m)内的加法与减法··········91
9 W% e' X4 Q1 c) q4.3.5GF(2m)内的乘法·····················91 c0 L! @9 t2 z1 u* T8 T. }$ ]4 }& t
4.3.6GF(2m)内的逆操作·················93
4 m9 f3 ]6 z) L F- |% Q4.4AES的内部结构························95
, E& y2 ^. I0 E# q4.4.1字节代换层·····························96
- Z) o0 i( u5 e4.4.2扩散层····································99 B$ N$ R* L% S
4.4.3密钥加法层···························101
. w2 H7 B% b6 e) i# ]4.4.4密钥编排·······························101
- Z" U; Y* a2 q9 k4 H% H- {' _" f2 }4.5解密··········································106
5 Z6 j6 {' s; ^: o4.6软件实现与硬件实现···············110
8 W7 T' V" s+ f% ?3 f1 n/ O5 K. }4.6.1软件······································110
! w& \* V0 K/ B2 A+ L4.6.2硬件······································111
" _, l. E# ~ u, e4 D4.7讨论及扩展阅读······················111
0 J! j# ] ~8 g" R% X& _; f4.8要点回顾··································112$ |- J) |* {# `" a- T
4.9习题··········································1124 \9 R! P$ y3 c' }/ x
第5章分组密码的更多内容·············117
8 J; |: V6 L- q- K6 d! R5.1分组密码加密:操作模式·······117
6 _* b a' C5 E& k, \0 x5.1.1电子密码本模式(ECB)·······118
1 ~% f5 X9 W2 _7 L5.1.2密码分组链接模式(CBC)·····122! y% r0 H. K4 O1 [4 {# f5 K! p# y
5.1.3输出反馈模式(OFB)············1233 h3 x% I4 H3 M0 W; u7 Y8 w
5.1.4密码反馈模式(CFB)············125
4 Z6 y# u; g4 @5.1.5计数器模式(CTR)················126, U& h$ m. a" p
5.1.6伽罗瓦计数器模式(GCM)···127& ^' D5 i7 j+ C
5.2回顾穷尽密钥搜索··················1294 E( w2 S' y7 f2 m7 X4 h" A+ `
5.3增强分组密码的安全性···········1308 v" `$ C7 x$ L! c: C
5.3.1双重加密与中间人攻击······1314 b, q6 A- f+ g; f
5.3.2三重加密······························133+ u6 F% u3 L7 Z6 [ H
5.3.3密钥漂白······························134
5 v+ O$ j6 _6 z) u% A- v5.4讨论及扩展阅读······················136
; b8 h2 J; s1 H7 S+ t/ Q) {5.5要点回顾··································1378 I1 `% m- J5 a% q: K' |& L' f
5.6习题··········································137
9 a: D% z+ h7 i; M- y. b第6章公钥密码学简介···················1410 q5 b3 h3 G1 k7 T& V& u( B" A
6.1对称密码学与非对称密码学···1413 s% T5 u1 h5 V5 ` l
6.2公钥密码学的实用性···············1453 p4 W) \& G2 ^' U3 @7 O2 v+ A0 n
6.2.1安全机制·····························1452 ^2 D0 O* {( i5 {" f6 {: ~
6.2.2遗留问题:公钥的可靠性···146
" {8 Q) [) }5 @4 j6.2.3重要的公钥算法·················146, Z9 G' e3 z W' f+ o. H9 ]
6.2.4密钥长度与安全等级··········147- L; X2 d+ ^/ r( \
6.3公钥算法的基本数论知识·······1481 d* q& k7 Z+ \" }
6.3.1欧几里得算法·····················148
% \, t, p3 a- Z7 K. W$ g+ w6.3.2扩展的欧几里得算法··········151
0 I3 o7 Q b9 I! H6.3.3欧拉函数·····························155
) U' ?. a# W4 g2 @3 @/ Q6.3.4费马小定理与欧拉定理······157
( x* W6 E7 g6 ^* X" T" G$ H6.4讨论及扩展阅读······················159
. o1 _! b ?; j/ @1 l/ @# I6 i; ]6.5要点回顾··································160
6 u# ^& R& X2 M6.6习题··········································1601 b6 _1 i8 O! D: Z7 |& }& p
第7章RSA密码体制······················1632 c3 N% T i" ~6 V+ F2 L
7.1引言··········································164& U8 \ Z! g5 n. Z
7.2加密与解密······························1648 J4 i2 u, M) M( f2 N# r
7.3密钥生成与正确性验证···········165) n5 h' W3 r: t
7.4加密与解密:快速指数运算···169& y; C6 M5 G$ k4 |8 D5 j" _& Q$ R3 G
目录# w$ K% L" u2 l" {# N6 F3 Z9 u
IX9 Y0 B. r2 h H
7.5RSA的加速技术······················173
& V; }) i5 ]) G B7.5.1使用短公开指数的快速加密···1735 D" E" [6 Y) v U7 D
7.5.2使用中国余数定理的快速1 D3 ?. @( }( Z) c
加密······································174
4 \6 m+ N; _( @' i7.6寻找大素数······························177
1 ~5 U5 p5 o+ l+ n5 c! ~7.6.1素数的普遍性······················177
% d* H6 w2 S/ G% S4 I& H9 P7.6.2素性测试·····························1782 \2 s2 p5 I Z% i* _1 w _ W: F
7.7实际中的RSA:填充··············182% q; Y; I- r$ l
7.8攻击··········································183- e T# O# Z" N: t0 n9 I7 `
7.9软件实现与硬件实现···············186
3 M5 Y1 y) A3 C G7.10讨论及扩展阅读······················1877 g# [8 W. }8 e2 f0 n
7.11要点回顾··································188
4 n; f n: _+ X5 e7.12习题··········································189
$ q! `4 U ?; |第8章基于离散对数问题的公钥
( h, c( r" i1 G' E& y密码体制·······························1937 v6 }$ g3 l# O5 {) J( }* ?1 U7 s4 i
8.1Diffie-Hellman密钥交换·········194' Z" p6 a6 K& P6 T: k" Q0 O
8.2一些代数知识··························196
& Z) ?% p5 S: n! O: i' W8.2.1群·········································196+ }- X" N2 g3 L; d
8.2.2循环群·································198
% u1 j: ]3 @3 x3 d0 F# S1 x; z a' x8.2.3子群·····································2024 G; N( T" J, S
8.3离散对数问题··························204# i- q a6 L9 ^3 Z# [- k- G
8.3.1素数域内的离散对数问题····204
4 c' I' @8 k" ]: S6 a* R! s( S8.3.2推广的离散对数问题············205
_/ e$ {) I# K2 l& Y8.3.3针对离散对数问题的攻击····207 [2] ! i8 N% ~+ p2 u- l" c7 W; h
8.4Diffie-Hellman密钥交换的安* w; h! {, B- A/ @3 G8 w" r
全性···············································211
- g6 ]; k0 X- P8 \8.5Elgamal加密方案····················212; ]$ k8 U/ J. n" S E/ e7 `# { u( a
8.5.1从Diffie-Hellman密钥交换
5 Z( H' O7 l' t* i# S到Elgamal加密··················212
! c" {% e3 p3 D6 X8 t8.5.2Elgamal协议·······················213' E- w- J( D3 y# t/ m) J
8.5.3计算方面·····························215$ ]0 w5 a' } \6 m. D
8.5.4安全性·································216
9 X- e7 O' q/ `& j* z8.6讨论及扩展阅读······················218" f# U+ ^- h( h" T
8.7要点回顾··································219
0 {0 T, T" W$ j& c' @8.8习题··········································2193 Z6 m( t8 {8 e8 P" z( W' V3 [% b8 X
第9章椭圆曲线密码体制················225* N6 D/ t, G7 G2 z" j1 g6 V
9.1椭圆曲线的计算方式···············226; |/ c4 b" n9 ~! w6 g
9.1.1椭圆曲线的定义··················2275 @6 B) m; U: [+ n! @
9.1.2椭圆曲线上的群操作···········228
! E- [1 B$ Y: I" }, o9 R9.2使用椭圆曲线构建离散对数- c5 \& s8 d- f
问题················································232
1 @3 @* c/ S1 [, a S \& \9.3基于椭圆曲线的Diffie-Hellman7 X/ r: [/ x7 p2 w* x
密钥交换··································2365 _ k L4 d3 }+ Q+ W; X
9.4安全性······································238
) _, p1 V5 D9 q' s% S: [$ b9.5软件实现与硬件实现···············2381 i6 y/ L; X a8 d
9.6讨论及扩展阅读······················2391 p4 F2 H, h0 U4 y7 ~0 A
9.7要点回顾··································241) X' i( ]9 j1 g. ^( n$ x m
9.8习题··········································241
8 F5 Q8 e5 b, r4 T第10章数字签名····························2455 f8 q% U" y: ?: F2 f) S$ \
10.1引言········································245
! a$ H6 p+ z4 ?( X( ^% G10.1.1对称密码学尚不能完全
! w* c" b* i6 F. l2 V7 C满足需要的原因··············2467 o' V: e7 F2 U1 C
10.1.2数字签名的基本原理······247
' b4 M+ [2 `/ ^+ X10.1.3安全服务·························248
- j, e$ K6 u7 r: e8 e- `4 s10.2RSA签名方案························249- p& w" ~' S& p" k- |9 g" @# W
10.2.1教科书的RSA数字签名···250
/ H s8 B" p- ~: p10.2.2计算方面··························251, Y. b" ^& {5 k- U0 ?$ b: G! P
10.2.3安全性······························2522 U1 X9 Z' C5 ^. c) S
10.3Elgamal数字签名方案··········255$ D; z. P/ i+ \/ c
10.3.1教科书的Elgamal
, C3 F( C7 X# g2 d! B, O# ?数字签名··························255/ h7 k; _9 _9 A* t% z9 }
10.3.2计算方面··························257# _) T6 q- W/ C8 m2 r' z; |% L
10.3.3安全性······························258 [2] 5 [8 ?) o4 F. P2 T- |* f3 _+ b1 }
10.4数字签名算法························261
3 _$ y8 Y' E. ^, F/ t0 U% v6 ~1 m10.4.1DSA算法·························2616 R) R& H4 D* d" s* a% |0 P: j
深入浅出密码学—常用加密技术原理与应用2 H+ L) g4 T/ u4 k; I: y
X# B* u0 g# B y6 G* z" V
10.4.2计算方面··························264
0 m* D1 v( @9 \/ c/ x9 M7 K; [10.4.3安全性······························265
+ D4 o! b/ }* v; w% A6 a10.5椭圆曲线数字签名算法·········2664 \5 q% a% ^8 C
10.5.1ECDSA算法····················267
' X7 j( i& U8 N) S5 d10.5.2计算方面··························270* g$ G" X3 r$ z8 d
10.5.3安全性······························270
0 R' [; I5 v, d7 |1 y4 O8 M" h10.6讨论及扩展阅读····················271
6 N( O& Q8 M7 J% b* ^, ~10.7要点回顾································2724 D9 f* ?0 q! c) b) T
10.8习题········································2720 c$ r+ q! n4 D, r+ h/ `
第11章哈希函数·····························277: R& s; Y: M1 f5 t8 g
11.1动机:对长消息签名·············277( E) u7 N4 g1 P$ e0 }* Z$ {
11.2哈希函数的安全性要求·········280
) t4 q+ A1 x4 |& l/ _7 H2 P11.2.1抗第一原像性或单向性···280
2 g3 k7 o" {8 j2 t11.2.2抗第二原像性或弱抗% M( j2 T& D2 i' j- _
冲突性······························281
2 a+ Q# k' D2 N/ a! u8 {, ?+ ]11.2.3抗冲突性与生日攻击·······282
1 C* g5 f) m' B8 y11.3哈希函数概述·························286
' E/ W8 @4 U% B% C+ d7 J11.3.1专用的哈希函数:MD4
* E( h. | Z; {9 a; O- t家族··································287
% T! x' k u9 e( ~" N0 @ z11.3.2从分组密码构建的哈希4 c- G- P+ p+ w1 q7 p0 u
函数··································2880 r& K. B% I! G. Y+ |8 \; g: P
11.4安全哈希算法SHA-1·············290
5 S/ R2 z% Z, P* U) [11.4.1预处理······························291
+ G1 K2 _- A! O- ~11.4.2哈希计算··························2920 `2 d4 Q E+ f7 k) K4 z+ s
11.4.3实现··································294 Y# v8 s: X) n% f+ U
11.5讨论及扩展阅读·····················295$ j: P* G8 l6 Q
11.6要点回顾································296
( ]1 c; v: X$ S' v& n* P& R, L! V11.7习题········································297
' [, c* Z: m" L# p/ C, Q$ d. H: F第12章消息验证码·························301; S. k2 W9 ?2 |0 U Y/ _
12.1消息验证码的基本原理·········301
6 A- |2 ~- y% J3 p, X12.2来自哈希函数的MAC:
" P3 o5 P% N' C9 A2 o& ~" sHMAC····································303$ O7 |; v5 \2 M! A0 Z) A( Z0 X2 O
12.3来自分组密码的MAC:
8 s+ x* f% l$ @; _CBC-MAC·····························307: I6 l* G* h x8 v+ U
12.4伽罗瓦计数器消息验证码·····308' ~7 `8 i$ S2 _
12.5讨论及扩展阅读····················309
! d8 h$ S9 z& c) g6 |- }' u K12.6要点回顾································309
. T$ M# n, N ?12.7习题········································310& |* {% V8 \3 P- {( n- D- p% s
第13章密钥建立····························313. r z1 H' S4 X! F0 Z% ~
13.1引言········································314
$ {& x3 p Q# J8 y13.1.1一些术语··························314
8 t% Q/ W# Z3 ]9 w& n13.1.2密钥刷新和密钥衍生·······314
6 u1 D8 A8 K# T* k13.1.3n2密钥分配问题··············316
) P N% L8 h9 d9 Y% g, C( K" N13.2使用对称密钥技术的密钥* [% R/ o1 g3 _. {3 P5 j4 U
建立··············································317& }7 c0 z( x) J
13.2.1使用密钥分配中心的密钥# r1 y* ]5 p) Q/ m0 E$ w
建立··································318
. H- ~ g- Z. W13.2.2Kerberos···························3214 R5 L( d) G- p) B3 B# r5 C
13.2.3使用对称密钥分配的其他
2 p" V: ^. F1 A2 U( g" i' S+ [问题·································323# Y7 d* N# u# O2 i0 x
13.3使用非对称密钥技术的密钥
8 z8 D* C8 t: w. y建立·······································3231 j. }+ W; R! F
13.3.1中间人攻击······················3242 O) R3 t( t% {
13.3.2证书·································326
. l& I; `4 O9 `+ L5 G13.3.3PKI和CA························329
% [* {0 [8 M3 N4 |13.4讨论及扩展阅读····················332 d" T0 o% V5 _# |% c, \
13.5要点回顾································3337 Y5 \- j* R8 o$ u, l) J
13.6习题········································333
1 b: r" w4 N: r6 k& o参考文献·················································339
0 Q% Q2 l+ O7 U# b4 L+ C2 b L K& h- F7 j! G+ G
8 n6 @4 B2 r2 `# ]4 `侵权联系与免责声明1、本站资源所有言论和图片纯属用户个人意见,与本论坛立场无关, Z" w) ~5 [/ C5 M3 [! g
2、本站所有资源收集于互联网,由用户分享,该帖子作者与瑞客论坛不享有任何版权,如有侵权请联系本站删除
7 q5 ~3 [" j" r, f( }0 N" F3、本站部分内容转载自其它网站,但并不代表本站赞同其观点和对其真实性负责5 X" J. k# S6 I# ~' i! z4 g$ e
4、如本帖侵犯到任何版权问题,请立即告知本站,本站将及时予与删除并致以最深的歉意# q1 D/ I2 D& W" a; g
如有侵权联系邮箱:ruikelink@gmai.com深入浅出密码学——常用加密技术原理与应用.zip% Y2 u( `/ }% z' N
资源下载地址和密码(百度云盘): [/hide] 百度网盘信息回帖可见
5 r4 e- g" c& ]9 H5 b" I# M5 Y: Y% f0 b2 w2 O7 M
: V i( y# B5 X" P: X
* `" Y$ B- j8 `5 C1 T
本资源由Java自学网收集整理【www.javazx.com】 |
|