無線網絡安全英文課件3_第1頁
無線網絡安全英文課件3_第2頁
無線網絡安全英文課件3_第3頁
無線網絡安全英文課件3_第4頁
無線網絡安全英文課件3_第5頁
已閱讀5頁,還剩27頁未讀 繼續免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

1、Wireless Networks and SecurityPublic Key Cryptography & Message Authentication共三十二頁Approaches to Message AuthenticationUsing conventional encryptionSymmetric encryption alone is not a suitable tool for data authenticationWe assume that only the sender and receiver share a key, so only the genuine se

2、nder would be able to encrypt a message successfullyThe receiver assumes that no alterations have been made and that sequencing is proper if the message includes an error detection code and a sequence numberIf the message includes a timestamp, the receiver assumes that the message has not been delay

3、ed beyond that normally expected for network transitWithout message encryptionAn authentication tag is generated and appended to each message for transmissionThe message itself is not encrypted and can be read at the destination independent of the authentication function at the destinationBecause th

4、e message is not encrypted, message confidentiality is not provided共三十二頁共三十二頁One-way Hash FunctionsAccepts a variable-size message M as input and produces a fixed-size message digest H(M) as outputDoes not take a secret key as inputTo authenticate a message, the message digest is sent with the messa

5、ge in such a way that the message digest is authentic共三十二頁共三十二頁Secure Hash FunctionsIs important not only in message authentication but in digital signaturesPurpose is to produce a “fingerprint” of a file, message, or other block of dataTo be useful for message authentication, a hash function H must

6、 have the following properties:1. H can be applied to a block of data of any size.2. H produces a fixed-length output.3. H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical.4. For any given code h, it is computationally infeasible to find x

7、 such that H(x) = h. A hash function with this property is referred to as one-way or preimage resistant.5. For any given block x, it is computationally infeasible to find y x with H(y) = H(x). A hash function with this property is referred to as second preimage resistant. This is sometimes referred

8、to as weak collision resistant.6. It is computationally infeasible to find any pair (x, y) such that H(x) = H(y).A hash function with this property is referred to as collision resistant. This is sometimes referred to as strong collision resistant.共三十二頁Security of Hash FunctionsThere are two approach

9、es to attacking a secure hash function:CryptanalysisInvolves exploiting logical weaknesses in the algorithmBrute-force attackThe strength of a hash function against this attack depends solely on the length of the hash code produced by the algorithm共三十二頁共三十二頁The sha Secure Hash functionSHA was develo

10、ped by NIST and published as a federal information processing standard (FIPS 180) in 1993Was revised in 1995 as SHA-1 and published as FIPS 180-1The actual standards document is entitled “Secure Hash Standard”Based on the hash function MD4 and its design closely models MD4Produces 160-bit hash value

11、s In 2005 NIST announced the intention to phase out approval of SHA-1 and move to a reliance on SHA-2 by 2010共三十二頁Table 3.1 Comparison of SHA Parameters Note: All sizes are measured in bits.共三十二頁共三十二頁共三十二頁Sha-3Basic requirements that must be satisfied by any candidate for SHA-31. It must be possible

12、 to replace SHA-2 with SHA-3 in any application by a simple drop-in substitution. Therefore, SHA-3 must support hash value lengths of 224, 256, 384, and 512 bits.2. SHA-3 must preserve the online nature of SHA-2. That is, the algorithm must process comparatively small blocks (512 or 1024 bits) at a

13、time instead of requiring that the entire message be buffered in memory before processing it.共三十二頁HMACThere has been an increased interest in developing a MAC derived from a cryptographic hash code, such as SHA-1Cryptographic hash functions generally execute faster in software than conventional encr

14、yption algorithms such as DESLibrary code for cryptographic hash functions is widely availableA hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret keyThere have been a number of proposals for the incorporati

15、on of a secret key into an existing hash algorithmThe approach that has received the most support is HMACHMACHas been issued as RFC 2104Has been chosen as the mandatory-to-implement MAC for IP SecurityIs used in other Internet protocols, such as Transport Layer Security (TLS) and Secure Electronic T

16、ransaction (SET)共三十二頁HMAC Design ObjectivesTo use, without modifications, available hash functions - in particular, hash functions that perform well in software, and for which code is freely and widely availableTo allow for easy replaceability of the embedded hash function in case faster or more sec

17、ure hash functions are found or requiredTo preserve the original performance of the hash function without incurring a significant degradationTo use and handle keys in a simple wayTo have a well understood cryptographic analysis of the strength of the authentication mechanism based on reasonable assu

18、mptions on the embedded hash function共三十二頁共三十二頁共三十二頁Counter with Cipher Block Chaining-Message Authentication Code (CCM) NIST standard SP 800-38CReferred to as an authenticated encryption mode “Authenticated encryption” is a term used to describe encryption systems that simultaneously protect confid

19、entiality and authenticity of communicationsA single key is used for both encryption and MAC algorithms AES encryption algorithmCTR mode of operationCMAC authentication algorithmKey algorithmic ingredients共三十二頁共三十二頁Public-Key encryption structureFirst publicly proposed by Diffie and Hellman in 1976B

20、ased on mathematical functions rather than on simple operations on bit patternsIs asymmetric, involving the use of two separate keysMisconceptions:Public-key encryption is more secure from cryptanalysis than conventional encryptionPublic-key encryption is a general-purpose technique that has made co

21、nventional encryption obsoleteThere is a feeling that key distribution is trivial when using public-key encryption, compared to the rather cumbersome handshaking involved with key distribution centers for conventional encryption共三十二頁共三十二頁Applications for public-key cryptosystemsPublic-key systems ar

22、e characterized by the use of a cryptographic type of algorithm with two keys, one held private and one available publiclyDepending on the application, the sender uses either the senders private key, the receivers public key, or both to perform some type of cryptographic functionThe use of public-ke

23、y cryptosystems can be classified into three categories:Encryption/decryptionThe sender encrypts a message with the recipients public keyDigital signatureThe sender “signs” a message with its private keyKey exchange Two sides cooperate to exchange a session key共三十二頁Table 3.2applications for public-k

24、ey cryptosystems共三十二頁共三十二頁共三十二頁Diffie-Hellman Key ExchangeFirst published public-key algorithmA number of commercial products employ this key exchange techniquePurpose of the algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of message

25、sThe algorithm itself is limited to the exchange of the keysDepends for its effectiveness on the difficulty of computing discrete logarithms共三十二頁共三十二頁共三十二頁Digital Signature standard (DSS)FIPS PUB 186Makes use of the SHA-1 and presents a new digital signature technique, the Digital Signature Algorith

26、m (DSA)Originally proposed in 1991 and revised in 1993 and again in 1996Uses an algorithm that is designed to provide only the digital signature functionUnlike RSA, it cannot be used for encryption or key exchange共三十二頁Elliptic-curve cryptology (ECC)Technique is based on the use of a mathematical construct known as the elliptic curvePrincipal attraction of ECC compared to RSA is that it appears to offer equal security for a far smaller bit

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
  • 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論