|
第1章密码学和数据安全导论·············1; T1 z9 Z, v: C; P" l' m
1.1密码学及本书内容概述···············18 u P, a# R$ w+ W) ]: \
1.2对称密码学··································34 _: i, U- |6 N1 U" A1 s
1.2.1基础知识······························4
+ G( d8 a9 Z0 Y0 K* m# W' \8 l/ o1.2.2简单对称加密:替换密码······5
, F. @; d5 V: c. A1.3密码分析······································8% |4 _! G S: |" j3 C% _
1.3.1破译密码体制的一般思路·······8
* |9 |% J; g8 c0 G% O1.3.2合适的密钥长度····················108 E9 G( g, R/ ~- {, x% T& q' v: ~
1.4模运算与多种古典密码·············11
% _2 Y2 q4 {& J* C* o: z- C+ ?- K4 e1.4.1模运算···································12
. j. v+ U9 @) I U: R7 z1.4.2整数环···································15
' x; R. ]; y* x7 ^/ U& ^1.4.3移位密码(凯撒密码)·············16
, ]) e3 V( Q' {& \3 W7 n1.4.4仿射密码·······························18. F9 Y. ^3 I- x
1.5讨论及扩展阅读························19
: s7 w- _0 o" \$ L1 o1.6要点回顾····································21+ O) |0 W+ N, g( o+ ~- F
1.7习题············································21
5 _8 P6 p2 m6 J# O( e/ l: ~第2章序列密码·································27" i' F* Z- \; Y
2.1引言············································27- A V3 E8 ~+ G2 J9 M4 ^
2.1.1序列密码与分组密码·············273 ^3 j2 c) D) d2 ^0 h1 V
2.1.2序列密码的加密与解密·········29
. u1 `% `8 g4 S) T0 }$ h8 `- _2.2随机数与牢不可破的分组密码····32
( M4 K0 M" |$ J4 J, N2.2.1随机数生成器························323 |4 ?0 O6 v4 |: i5 R
2.2.2一次一密································34
% R' \4 N5 O8 z3 o, @2.2.3关于实际序列密码················35
& @1 ]; s. i. H! V# \2.3基于移位寄存器的序列密码·····38# B* Y0 t" V b, ]' p
2.3.1线性反馈移位寄存器(LFSR)···39. I) o8 Y3 q0 A4 P% R: V5 {
2.3.2针对单个LFSR的已知明文
! t* h0 ? G6 x- ^攻击······································43/ N- Z V0 U2 k5 l* g) x9 K
2.3.3Trivium··································44
; o, v8 l( a6 d1 d2.4讨论及扩展阅读···························46
' c o3 T9 q( o) ?, T7 e2.5要点回顾····································477 y/ V+ I/ L5 W8 k; _( h- G' F! b
2.6习题············································48- ~* p% Z5 [6 G& V
第3章数据加密标准与替换算法·······51
/ Q3 U2 k9 R. q7 H6 G+ g, G6 I3.1DES简介····································51
A1 S+ C: J* v+ I$ \6 g" |3.2DES算法概述····························54
. S. R0 d% B0 r, |1 |" C3.3DES的内部结构························56
9 F: [3 c5 n, }/ `3.3.1初始置换与逆初始置换·········56
) L, X; d3 ^1 [1 k8 Q; M3.3.2f函数······································58
, D% @0 ^8 m8 @3.3.3密钥编排································63
9 ]& Q3 O! l1 K: _1 o2 x- ^ c6 S3.4解密············································650 U' Q1 j! y2 |/ r1 n
3.5DES的安全性····························68
1 I" N1 j( V- K3.5.1穷尽密钥搜索························68
. J7 d Z/ r3 v5 \3.5.2分析攻击································70
" \; r7 u0 ?& B% M- ~ ^6 z% j3.6软件实现与硬件实现·················71
/ r. G! w8 F- u$ C3.6.1软件········································71
+ r! P2 G. U( n3.6.2硬件········································72. c* X1 D' A. F4 j0 S
3.7DES替换算法····························72' Q, s0 ~' v/ c1 {' m& ?
目录
& A8 f* [3 k& ~7 ]8 F深入浅出密码学—常用加密技术原理与应用
. N9 e# S# ^ D; E7 N& f# ]VIII+ O4 E) g9 H' J
3.7.1AES和AES入围密码···········728 y' a. Y( b$ ^' k8 P1 P
3.7.23DES与DESX·······················73
+ W: N3 a' U' ?( |+ D6 i3.7.3轻量级密码PRESENT···········734 H7 q- P; W2 v& l
3.8讨论及扩展阅读························766 [9 x/ j/ @9 B- }# U
3.9要点回顾····································77# ?8 Z; J0 g9 K0 N0 k/ t$ m
3.10习题··········································78+ p) L/ l# t0 i, X0 A
第4章高级加密标准·························83
+ o& |8 ^3 t# w4.1引言············································83
7 ~( Q! f/ p* H7 v3 o) L) V4.2AES算法概述····························85
) q8 T6 H- @& ]7 Q% u3 S m0 `+ O4.3一些数学知识:伽罗瓦域简介···87" c: b3 E- H) w. C- o8 t
4.3.1有限域的存在性·····················87
5 a# A* Y6 d4 w7 ]' i+ A- C4.3.2素域········································894 f# n- d i; P
4.3.3扩展域GF(2m)························90
9 `3 j# r8 l$ C- ]3 W7 \4.3.4GF(2m)内的加法与减法··········91' k5 b. g4 L+ C6 | g4 l
4.3.5GF(2m)内的乘法·····················919 ]' X G: m/ k4 G0 _% Y
4.3.6GF(2m)内的逆操作·················93
! w& _) l0 H) a2 y4.4AES的内部结构························95
# d& i; O: M* R( |4.4.1字节代换层·····························96, i: s" m9 R o) \ o( P8 K. g) Q
4.4.2扩散层····································99
8 H( ?! @: K. G. |6 @/ n% _4.4.3密钥加法层···························101
- a0 E# i9 O2 z8 x4.4.4密钥编排·······························101& G1 L4 r! ^) K( E: d# y+ \ L4 [
4.5解密··········································106
5 @) x) \3 m7 B1 ^8 [5 @; p% E4 J4.6软件实现与硬件实现···············110
3 p8 ?" p' r! D# K' J- p4.6.1软件······································1102 C4 d. ]% d: ^8 P) P" O& t7 K
4.6.2硬件······································111
- D& x q8 J3 v1 k4.7讨论及扩展阅读······················111
* B9 h* V* v$ V9 H9 [/ B. z- c4.8要点回顾··································1124 C( u% q" I. m% N
4.9习题··········································1127 x8 o: }2 N* u8 E! W4 \
第5章分组密码的更多内容·············1175 ?( S; Q1 M1 h) P0 u0 ^1 H
5.1分组密码加密:操作模式·······117' F% W2 R" Z1 s/ H% r1 [& @
5.1.1电子密码本模式(ECB)·······118
+ M: w( ~+ ?6 G8 s H5.1.2密码分组链接模式(CBC)·····122
0 N$ K) i6 M |2 U) ]7 M2 h, K6 x- i5.1.3输出反馈模式(OFB)············1235 N. ] F/ u/ Z( r$ X( ]9 d
5.1.4密码反馈模式(CFB)············125; z1 ^3 Y4 G" `
5.1.5计数器模式(CTR)················126
- ]4 }, C {3 Q3 Q7 L5.1.6伽罗瓦计数器模式(GCM)···127. Z6 c) z- e: |$ E2 g* R
5.2回顾穷尽密钥搜索··················129
4 z5 Z+ j: ]5 \! F& M+ A& u" i5.3增强分组密码的安全性···········130( ]' V9 z. \/ ]9 B2 y5 y
5.3.1双重加密与中间人攻击······131
* d7 N) v3 p4 S. N4 {5 h5.3.2三重加密······························133/ y* d* t6 @+ J8 a" l7 j
5.3.3密钥漂白······························134" U* g/ F3 h% @3 q" W" D$ T, B. x
5.4讨论及扩展阅读······················136! Q4 H: L4 _% c
5.5要点回顾··································137% g( J; H( ^! V9 j+ F
5.6习题··········································137
1 H9 y: f4 l4 ]% o第6章公钥密码学简介···················141: ~- \. j: ]# M# s
6.1对称密码学与非对称密码学···141
! n1 |+ p0 V3 a6 \0 [6.2公钥密码学的实用性···············1455 T6 o b5 m- ?6 v) a) v
6.2.1安全机制·····························1450 d" O% a$ c* O5 @1 m+ ?% Q+ [2 e; Q
6.2.2遗留问题:公钥的可靠性···146
) q2 a3 x( ~& p# f6.2.3重要的公钥算法·················146
8 O6 h% u' B% E" b. y3 }; g6.2.4密钥长度与安全等级··········1475 n9 q+ y3 M& i) d8 A% A6 S
6.3公钥算法的基本数论知识·······148
1 g( S: @5 ^* |: m3 W8 D6.3.1欧几里得算法·····················148
! l2 L/ A2 c. n0 B/ O& K* D6.3.2扩展的欧几里得算法··········151
) `" i9 g2 A' U- T- w& S" O6.3.3欧拉函数·····························1555 ~: Q5 F. S, p" \( m/ b
6.3.4费马小定理与欧拉定理······157
6 I4 j8 n8 E/ D: m! _ \6.4讨论及扩展阅读······················159
7 ]4 L' q0 |+ [6 d/ ^% q; \6 W6.5要点回顾··································160; o' d3 W9 L' ], [0 V# l. W
6.6习题··········································160
' F/ v2 Q9 c+ J4 j第7章RSA密码体制······················163* c: Y; ]0 ^7 |, ~# p. g1 w
7.1引言··········································164
+ w+ i* ~! _$ J! w$ u1 ]7.2加密与解密······························164
: y4 ?9 f' `9 y* Z7.3密钥生成与正确性验证···········165
% f0 H) M9 E0 N4 o$ |8 t( b7.4加密与解密:快速指数运算···169
0 a% Q- y( q" i目录
1 u: V$ ^ N6 }8 e# A+ P2 d5 ^IX' X$ |- r! k4 ]# d. ^
7.5RSA的加速技术······················173
0 y9 J! G- z- z% e" Z4 t7 F7.5.1使用短公开指数的快速加密···173
3 `* C; W: o/ X3 Z9 D% k8 ?' K7 _7.5.2使用中国余数定理的快速
+ x4 ?9 l! \7 T% V3 f4 k# Y加密······································174& h+ X, @' u, Z3 d+ N
7.6寻找大素数······························177$ b9 E7 b$ j! K. l* A% o3 U
7.6.1素数的普遍性······················177
( F3 |2 `( }: k$ z7.6.2素性测试·····························178
5 H% v+ {7 f1 A0 R) Z( ?/ T7.7实际中的RSA:填充··············182; x$ a* z" O! K- D$ [ n
7.8攻击··········································183
- ?2 M0 q) i# r; N! g: S7.9软件实现与硬件实现···············186, J- [0 [7 |# P
7.10讨论及扩展阅读······················187
1 T* H7 D- Q9 i# o3 c& \7.11要点回顾··································188; K7 ~( S" D* u u8 Y
7.12习题··········································189' \! _& r* d2 k3 r2 N
第8章基于离散对数问题的公钥$ I+ M" k% Q* M* X/ f: q
密码体制·······························193* ?5 H+ F) D3 @+ o# k
8.1Diffie-Hellman密钥交换·········194
2 X. V c0 N& \ T2 `, Y8.2一些代数知识··························196
: W6 h) T/ w- x8 F8.2.1群·········································196 J5 L* S/ ]+ E
8.2.2循环群·································198, Q; E- i7 C5 G; C( a- T9 P
8.2.3子群·····································202
8 Q& [* y5 c# s! J8.3离散对数问题··························2045 \6 p) s2 z; M+ l
8.3.1素数域内的离散对数问题····204
, b4 B/ L: I/ j! Q8.3.2推广的离散对数问题············205
8 o1 \. Q9 S N% B! }2 }: b) G8.3.3针对离散对数问题的攻击····207 [2]
( T8 S" T+ W, J8 \* `8.4Diffie-Hellman密钥交换的安
! P$ p8 F6 [# M1 ^全性···············································211
0 y- [% L) W1 t/ ?8 c8.5Elgamal加密方案····················212- i, r r, U4 B- y5 D7 y
8.5.1从Diffie-Hellman密钥交换
1 u& P6 x$ i& O) B到Elgamal加密··················212) c4 h$ r: f! t- j: }' q
8.5.2Elgamal协议·······················213
S: A: @, E2 ?) T6 L$ Z8.5.3计算方面·····························215" v# c6 y; D/ {; U. g
8.5.4安全性·································216( B/ S" r6 C* m# G$ ~
8.6讨论及扩展阅读······················218
* V- u, _" [# Y6 M5 U5 }8.7要点回顾··································219
" F% _# u6 [5 H8.8习题··········································2195 U% {9 n7 @2 K( i& ?1 A% ?! C
第9章椭圆曲线密码体制················2250 X* j9 V" |) a7 G' |$ p
9.1椭圆曲线的计算方式···············2265 B! R: y, q' {
9.1.1椭圆曲线的定义··················2274 s* |2 t5 H5 Q6 _ U$ g: {
9.1.2椭圆曲线上的群操作···········228
$ \; `& B. o4 M1 q9 W9.2使用椭圆曲线构建离散对数2 b6 I% X; M; H5 z
问题················································232
- y3 M# F% Z+ Q6 Z9.3基于椭圆曲线的Diffie-Hellman
- E# ~( E7 q: h* a. T密钥交换··································2369 O! j W0 F8 U$ c! @ L4 G# ~: f/ k x
9.4安全性······································238
' S' E' f. d% y2 S7 b9.5软件实现与硬件实现···············238
5 f! B u; {2 ?' y! M# l9.6讨论及扩展阅读······················2391 p& K W2 i5 A, U" A, N
9.7要点回顾··································241
9 H6 g- X$ K. w0 V3 l2 r0 k8 U9.8习题··········································241) N8 S: Z. m$ A- ~) l
第10章数字签名····························245, ?7 Z2 c+ Z1 @, X- ~
10.1引言········································2458 e# {; c7 H5 z0 F4 L, J4 `; p
10.1.1对称密码学尚不能完全
/ a8 R+ r8 d0 z. d% A! I. v满足需要的原因··············246
9 ]& a, i$ Q3 d10.1.2数字签名的基本原理······247* U1 M2 }6 j2 \' O
10.1.3安全服务·························248
! U, H( x' q( g8 N6 `5 Q" f# F10.2RSA签名方案························249
/ y) b2 k+ u* ~6 J1 c+ x' U10.2.1教科书的RSA数字签名···250
1 g" e2 L8 z; Z! [+ Y10.2.2计算方面··························251
+ w' h; r6 x3 L1 k, [* m) B10.2.3安全性······························252- ?7 w* x0 j% [1 o: J3 |- c+ ~
10.3Elgamal数字签名方案··········255
( h Y/ N6 N4 e; ^6 [' p( k2 O! M( Z10.3.1教科书的Elgamal6 |7 F" A1 B5 k) V$ H
数字签名··························255. G" ] U* E. d/ R. Q6 l6 A3 P) n0 k# q
10.3.2计算方面··························257
" F& x2 }8 B9 _; c10.3.3安全性······························258 [2]
! n. I, h$ K" B10.4数字签名算法························261
7 |. u1 a# d! M10.4.1DSA算法·························261: Y9 A; K* t2 E& D$ u
深入浅出密码学—常用加密技术原理与应用
+ z& x, e4 h- ZX; ?3 z2 r0 F+ I' b# X/ |% S
10.4.2计算方面··························264
3 I1 n7 a! V: G0 h: D# a6 C3 T10.4.3安全性······························265* j' r. R) f, \
10.5椭圆曲线数字签名算法·········266
( B# F9 _' I. _+ V10.5.1ECDSA算法····················267
: b& S3 F7 K* {: @) g1 g10.5.2计算方面··························270
# \7 e, K/ a7 W' o7 q10.5.3安全性······························270
& ? E1 W$ v5 q/ l10.6讨论及扩展阅读····················271
6 }1 Q. x4 L( l7 P) ?5 ~+ C10.7要点回顾································272+ _0 D/ `! q5 T/ ^; v. ^/ ?7 R
10.8习题········································272 K6 H# n2 }4 o* B# B& Y
第11章哈希函数·····························2778 }4 u& E6 D4 C
11.1动机:对长消息签名·············277
& k8 F# @3 e* ~9 @* t3 J. {$ A11.2哈希函数的安全性要求·········280& q) {$ q: A+ G1 S" c
11.2.1抗第一原像性或单向性···280
( L, \9 Q3 T! G5 [, X2 h11.2.2抗第二原像性或弱抗8 c, G/ l0 x- i: w$ E. ]; U0 y
冲突性······························281
+ ~6 ~, t7 J9 \11.2.3抗冲突性与生日攻击·······282
+ v7 ?3 k8 ^& l' n11.3哈希函数概述·························2864 L, d3 {% o: J0 K2 |: Q5 d" D) J
11.3.1专用的哈希函数:MD4
( i- F& @0 E9 h) Q* j* K家族··································287
( H! N7 _! m% `. r11.3.2从分组密码构建的哈希
1 B6 W8 h7 |3 i2 }. b1 @函数··································288
" H! g* A3 Y; m) o1 g11.4安全哈希算法SHA-1·············290# ?1 I$ p0 ?& k6 F
11.4.1预处理······························291
( u) G( g; c$ ]4 t11.4.2哈希计算··························292
4 R7 j8 \8 w$ [* @" {11.4.3实现··································294
- G' E/ b3 X( X: S0 B& D; _11.5讨论及扩展阅读·····················295 c- `/ O% n4 I' X1 B" ^! a0 L. {
11.6要点回顾································296' D9 x& {0 J9 t) q$ x
11.7习题········································297
. n" s3 O, K/ a9 Q& ~' J$ V8 t第12章消息验证码·························3016 z( {( f5 U; |; ?+ v
12.1消息验证码的基本原理·········301 m" y$ h- g4 x. |
12.2来自哈希函数的MAC:5 L! m$ ?, Q- O& w! | N
HMAC····································303
0 U8 {& _0 N- W2 d12.3来自分组密码的MAC:2 s. F, |7 F& z' v" ], O
CBC-MAC·····························3079 |0 v6 \# ?# ?% p/ a. W3 P/ V
12.4伽罗瓦计数器消息验证码·····308) ?1 Q8 h0 g7 I7 ^# r: ~/ j7 R
12.5讨论及扩展阅读····················309" G. e u3 C6 i0 y& n
12.6要点回顾································309( ^, e5 D, @& A' u
12.7习题········································3105 F, E7 Z. X$ ~. b! s
第13章密钥建立····························313
& B$ E2 K9 I# q( @13.1引言········································314
) k' Z5 z; s4 c. A13.1.1一些术语··························3140 @" d# C2 L" A2 s6 X
13.1.2密钥刷新和密钥衍生·······314
. k0 l1 m& U* {* [13.1.3n2密钥分配问题··············316
: J+ |; n) W" f# x2 L# b13.2使用对称密钥技术的密钥/ A/ R$ b" A$ c' N5 G6 C
建立··············································317
! ~$ U! d' F& A. y H: F13.2.1使用密钥分配中心的密钥
. w1 q) u# ?9 N建立··································318
) o- a) ^! y# Y1 ~, Q: [" c/ v13.2.2Kerberos···························321
, X7 Q. c [3 \9 ]( \1 p6 Q+ a6 L13.2.3使用对称密钥分配的其他
9 I0 ?' {& I: y9 W4 z3 `$ u& G问题·································323
* a k( B; F: F6 g13.3使用非对称密钥技术的密钥" n( ]; ^$ J. T; z
建立·······································323% [. E* E, J* Y0 r9 w$ t
13.3.1中间人攻击······················3245 k! s+ l2 ]# h/ [# ~# N2 ^
13.3.2证书·································326( h7 M+ P4 o7 H4 @% r0 W4 D
13.3.3PKI和CA························329* Q, L& @- i* g
13.4讨论及扩展阅读····················332
+ x. O: f8 C* y; p# j13.5要点回顾································333
6 }" s1 y: f" `6 M+ E' `13.6习题········································333
% I* [ u8 D6 u; y" T& G7 e参考文献·················································339
% M& s. E( `1 R" G( m' t1 ]7 a& R. \% e% y6 J9 O* N
& ^9 w+ `. z& G6 @
侵权联系与免责声明1、本站资源所有言论和图片纯属用户个人意见,与本论坛立场无关! ]; s8 G! r- e2 z$ Y
2、本站所有资源收集于互联网,由用户分享,该帖子作者与瑞客论坛不享有任何版权,如有侵权请联系本站删除6 J* o, q F7 ^" ]. U
3、本站部分内容转载自其它网站,但并不代表本站赞同其观点和对其真实性负责8 H7 E, a( D- d( l. u
4、如本帖侵犯到任何版权问题,请立即告知本站,本站将及时予与删除并致以最深的歉意, l' U( L9 i3 o! W- S |6 p
如有侵权联系邮箱:ruikelink@gmai.com深入浅出密码学——常用加密技术原理与应用.zip. p( Q4 `- z7 t. s2 G& p3 p6 t* V$ y8 w" l
资源下载地址和密码(百度云盘): [/hide] 百度网盘信息回帖可见+ d5 Q# k% {( ^. L
% X0 x0 x! N0 m8 {6 q! _- ?4 o a1 X. c- Y4 b4 A" G4 b
: B. O! e8 \- U7 M9 ^
本资源由Java自学网收集整理【www.javazx.com】 |
|