密码编码学与网络安全:原理与实践-第四版英文-Cryptography-and-Network-Se.ppt
《密码编码学与网络安全:原理与实践-第四版英文-Cryptography-and-Network-Se.ppt》由会员分享,可在线阅读,更多相关《密码编码学与网络安全:原理与实践-第四版英文-Cryptography-and-Network-Se.ppt(39页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Cryptography and Network SecurityChapter 3Fifth Editionby William StallingsLecture slides by Lawrie BrownChapter 3 Block Ciphers and the Data Encryption StandardAll the afternoon Mungo had been working on All the afternoon Mungo had been working on Sterns code,principally with the aid of the latest
2、Sterns code,principally with the aid of the latest messages which he had copied down at the messages which he had copied down at the Nevin Square drop.Stern was very confident.Nevin Square drop.Stern was very confident.He must be well aware London Central knew He must be well aware London Central kn
3、ew about that drop.It was obvious that they didnt about that drop.It was obvious that they didnt care how often Mungo read their messages,so care how often Mungo read their messages,so confident were they in the impenetrability of the confident were they in the impenetrability of the code.code.Talki
4、ng to Strange Men,Talking to Strange Men,Ruth RendellRuth RendellModern Block Ciphersnow look at modern block ciphersone of the most widely used types of cryptographic algorithms provide secrecy/authentication servicesfocus on DES(Data Encryption Standard)to illustrate block cipher design principles
5、Block vs Stream Ciphersblock ciphers process messages in blocks,each of which is then en/decrypted like a substitution on very big charactersl l64-bits or more 64-bits or more stream ciphers process messages a bit or byte at a time when en/decryptingmany current ciphers are block ciphersl lbetter an
6、alysedbetter analysedl lbroader range of applicationsbroader range of applicationsBlock Cipher Principlesmost symmetric block ciphers are based on a most symmetric block ciphers are based on a Feistel Cipher StructureFeistel Cipher Structureneeded since must be able to needed since must be able to d
7、ecryptdecrypt ciphertext ciphertext to recover messages efficientlyto recover messages efficientlyblock ciphers look like an extremely large block ciphers look like an extremely large substitution substitution would need table of 2would need table of 26464 entries for a 64-bit block entries for a 64
8、-bit block instead create from smaller building blocks instead create from smaller building blocks using idea of a product cipher using idea of a product cipher Ideal Block CipherClaude Shannon and Substitution-Permutation CiphersClaude Shannon introduced idea of substitution-Claude Shannon introduc
9、ed idea of substitution-permutation(S-P)networks in 1949 paperpermutation(S-P)networks in 1949 paperform basis of modern block ciphers form basis of modern block ciphers S-P nets are based on the two primitive S-P nets are based on the two primitive cryptographic operations seen before:cryptographic
10、 operations seen before:l lsubstitutionsubstitution(S-box)(S-box)l lpermutation permutation(P-box)(P-box)provide provide confusionconfusion&diffusiondiffusion of message&key of message&keyFeistel Cipher StructureHorst Feistel devised the feistel cipherl lbased on concept of invertible product cipher
11、based on concept of invertible product cipherpartitions input block into two halvesl lprocess through multiple rounds whichprocess through multiple rounds whichl lperform a substitution on left data halfperform a substitution on left data halfl lbased on round function of right half&subkeybased on r
12、ound function of right half&subkeyl lthen have permutation s halvesthen have permutation s halvesimplements Shannons S-P net conceptFeistel Cipher StructureData Encryption Standard(DES)most widely used block cipher in world adopted in 1977 by NBS(now NIST)l las FIPS PUB 46as FIPS PUB 46encrypts 64-b
13、it data using 56-bit keyhas widespread usehas been considerable controversy over its securityDES Design Controversyalthough DES standard is publicwas considerable controversy over design l lin choice of 56-bit key(vs Lucifer 128-bit)in choice of 56-bit key(vs Lucifer 128-bit)l land because design cr
14、iteria were classified and because design criteria were classified subsequent events and public analysis show in fact design was appropriateuse of DES has flourishedl lespecially in financial applicationsespecially in financial applicationsl lstill standardised for legacy application usestill standa
15、rdised for legacy application useDES Encryption OverviewDES Round Structureuses two 32-bit L&R halvesas for any Feistel cipher can describe as:L Li i =R Ri i11R Ri i =L Li i11 F(F(R Ri i11,K Ki i)F takes 32-bit R half and 48-bit subkey:l lexpands R to 48-bits using perm Eexpands R to 48-bits using p
16、erm El ladds to subkey using XORadds to subkey using XORl lpasses through 8 S-boxes to get 32-bit resultpasses through 8 S-boxes to get 32-bit resultl lfinally permutes using 32-bit perm Pfinally permutes using 32-bit perm PDES Round StructureSubstitution Boxes Shave eight S-boxes which map 6 to 4 b
17、its each S-box is actually 4 little 4 bit boxes l louter bits 1&6(outer bits 1&6(rowrow bits)select one row of 4 bits)select one row of 4 l linner bits 2-5(inner bits 2-5(colcol bits)are substituted bits)are substituted l lresult is 8 lots of 4 bits,or 32 bitsresult is 8 lots of 4 bits,or 32 bitsrow
18、 selection depends on both data&keyl lfeature known as autoclaving(autokeying)feature known as autoclaving(autokeying)example:l lS(18 09 12 3d 11 17 38 39)=5fd25e03S(18 09 12 3d 11 17 38 39)=5fd25e03 DES Key Scheduleforms subkeys used in each roundl linitial permutation of the key(PC1)which initial
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 密码 编码 网络安全 原理 实践 第四 英文 Cryptography and Network Se
链接地址:https://www.taowenge.com/p-83284915.html
限制150内