Bài giảng Mật mã học: Tổng quan về mật mã học - Huỳnh Trọng Thưa
Số trang: 41
Loại file: pdf
Dung lượng: 1.20 MB
Lượt xem: 16
Lượt tải: 0
Xem trước 5 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Bài giảng "Mật mã học: Tổng quan về mật mã học" cung cấp cho người học các kiến thức: Introduction, information security and cryptography, cryptographic goals, one-way functions, basic terminology and concepts,... Mời các bạn cùng tham khảo.
Nội dung trích xuất từ tài liệu:
Bài giảng Mật mã học: Tổng quan về mật mã học - Huỳnh Trọng Thưa Tổng quan về mật mã học Huỳnh Trọng Thưa htthua@ptithcm.edu.vn Introduction • Cryptography was used as a tool to protect national secrets and strategies. • 1960s (computers and communications systems) -> means to protect information and to provide security services. 2 Introduction (cont.) • 1970s: DES (Feistel, IBM) - the most well-known cryptographic mechanism in history • 1976: public-key cryptography (Diffie and Hellman) • 1978: RSA (Rivest et al.) - first practical public-key encryption and signature scheme • 1991: the first international standard for digital signatures (ISO/IEC 9796) was adopted. 3 Information security and cryptography • Some information security objectives – Privacy or confidentiality – Data integrity – Entity authentication or identification – Message authentication – Signature – Authorization – Validation – Access control 4 Information security and cryptography (cont.) • Some information security objectives – Certification – Timestamping – Witnessing – Receipt – Confirmation – Ownership – Anonymity – non-repudiation – Revocation 5 Information security and cryptography (cont.) • Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. • Cryptography is not the only means of providing information security, but rather one set of techniques. 6 Cryptographic goals • Confidentiality • Data integrity • Authentication • Non-repudiation Cryptography is about the prevention and detection of cheating and other malicious activities. 7 A taxonomy of cryptographic primitives 8 Background on functions • Function: f:XY f(x)=y • Ex: f(1) = 1 f(2) = 4 f(3) = 9 X = {1, 2, 3,... , 10} f(4) = 5 f(5) = 3 f(6) = 3 f(7) = 5 f(8) = 9 f(9) = 4 f(x)= rx, where rx is the remainder f(10) = 1. when x2 is divided by 11. image of f is the set Y = {1, 3, 4, 5, 9} 9 1-1 functions • A function is 1 − 1 (injection - đơn ánh) if each element in Y is the image of at most one element in X • A function is onto (toàn ánh) if each element in Y is the image of at least one element in X, i.e Im(f)=Y • If a function f: X → Y is 1−1 and Im(f)=Y, then f is called a bijection (song ánh). 10 Inverse function • f:XY and g:YX; g(y)=x where f(x)=y • g obtained from f, called the inverse function of f, g = f−1. • Ex: Let X = {a, b, c, d, e}, and Y = {1, 2, 3, 4, 5} 11 One-way functions • A function f from a set X to a set Y is called a one-way function if f(x) is “easy” to compute for all x ∈ X but for “essentially all” elements y ∈ Im(f) it is “computationally infeasible” to find any x ∈ X such that f(x)= y. – Ex: X = {1, 2, 3,... , 16}, f(x)= rx for all x ∈ X where rx is the remainder when 3x is divided by 17. 12 Permutations (Hoán vị) • Let S be a finite set of elements. – A permutation p on S is a bijection from S to itself (i.e., p: S→S). • Ex: S = {1, 2, 3, 4, 5}. A permutation p: S→S is defined as follows: p(1) = 3,p(2) = 5,p(3) = 4,p(4) = 2,p(5) = 1. 13 Involutions (Ánh xạ đồng phôi) • Let S be a finite set and let f be a bijection from S to S (i.e., f : S→S). The function f is called an involution if f = f−1. f(f(x)) = x for all x ∈S. 14 Basic terminology and concepts • M denotes a set called the message space. – An element of M is called a plaintext message – Ex: M may consist of binary strings, English text, computer code, etc. • C denotes a set called the ciphertext space. – C consists of strings of symbols from an alphabet of definition, which may differ from the alphabet of definition for M. – An element of C is called a ciphertext. 15 Encrypt and decrypt transformations (Các phép biến đổi) • K denotes a set called the key space. An element of K is called a key. • Each element e ∈ K uniquely determines a bijection from M to C, denoted by Ee. • Ee is called an encryption function or an encryption transformation • For each d ∈ K, Dd denotes a bijection from C to M (i.e., Dd : C→M). Dd is called a decryption function or decryption transformation. 16 Encrypt and decrypt transformations (cont.) • Ee : e ∈ K ; Dd : d ∈ K – for each e ∈ K there is a unique key d ∈ K such that Dd = Ee-1; – that is, Dd(Ee(m)) = m for all m ∈ M. • The keys e and d in the preceding definition are referred to as a key pair and some times denoted by (e, d). • To construct an encryption scheme requires one to select – a message space M, – a ciphertext space C, – a ...
Nội dung trích xuất từ tài liệu:
Bài giảng Mật mã học: Tổng quan về mật mã học - Huỳnh Trọng Thưa Tổng quan về mật mã học Huỳnh Trọng Thưa htthua@ptithcm.edu.vn Introduction • Cryptography was used as a tool to protect national secrets and strategies. • 1960s (computers and communications systems) -> means to protect information and to provide security services. 2 Introduction (cont.) • 1970s: DES (Feistel, IBM) - the most well-known cryptographic mechanism in history • 1976: public-key cryptography (Diffie and Hellman) • 1978: RSA (Rivest et al.) - first practical public-key encryption and signature scheme • 1991: the first international standard for digital signatures (ISO/IEC 9796) was adopted. 3 Information security and cryptography • Some information security objectives – Privacy or confidentiality – Data integrity – Entity authentication or identification – Message authentication – Signature – Authorization – Validation – Access control 4 Information security and cryptography (cont.) • Some information security objectives – Certification – Timestamping – Witnessing – Receipt – Confirmation – Ownership – Anonymity – non-repudiation – Revocation 5 Information security and cryptography (cont.) • Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. • Cryptography is not the only means of providing information security, but rather one set of techniques. 6 Cryptographic goals • Confidentiality • Data integrity • Authentication • Non-repudiation Cryptography is about the prevention and detection of cheating and other malicious activities. 7 A taxonomy of cryptographic primitives 8 Background on functions • Function: f:XY f(x)=y • Ex: f(1) = 1 f(2) = 4 f(3) = 9 X = {1, 2, 3,... , 10} f(4) = 5 f(5) = 3 f(6) = 3 f(7) = 5 f(8) = 9 f(9) = 4 f(x)= rx, where rx is the remainder f(10) = 1. when x2 is divided by 11. image of f is the set Y = {1, 3, 4, 5, 9} 9 1-1 functions • A function is 1 − 1 (injection - đơn ánh) if each element in Y is the image of at most one element in X • A function is onto (toàn ánh) if each element in Y is the image of at least one element in X, i.e Im(f)=Y • If a function f: X → Y is 1−1 and Im(f)=Y, then f is called a bijection (song ánh). 10 Inverse function • f:XY and g:YX; g(y)=x where f(x)=y • g obtained from f, called the inverse function of f, g = f−1. • Ex: Let X = {a, b, c, d, e}, and Y = {1, 2, 3, 4, 5} 11 One-way functions • A function f from a set X to a set Y is called a one-way function if f(x) is “easy” to compute for all x ∈ X but for “essentially all” elements y ∈ Im(f) it is “computationally infeasible” to find any x ∈ X such that f(x)= y. – Ex: X = {1, 2, 3,... , 16}, f(x)= rx for all x ∈ X where rx is the remainder when 3x is divided by 17. 12 Permutations (Hoán vị) • Let S be a finite set of elements. – A permutation p on S is a bijection from S to itself (i.e., p: S→S). • Ex: S = {1, 2, 3, 4, 5}. A permutation p: S→S is defined as follows: p(1) = 3,p(2) = 5,p(3) = 4,p(4) = 2,p(5) = 1. 13 Involutions (Ánh xạ đồng phôi) • Let S be a finite set and let f be a bijection from S to S (i.e., f : S→S). The function f is called an involution if f = f−1. f(f(x)) = x for all x ∈S. 14 Basic terminology and concepts • M denotes a set called the message space. – An element of M is called a plaintext message – Ex: M may consist of binary strings, English text, computer code, etc. • C denotes a set called the ciphertext space. – C consists of strings of symbols from an alphabet of definition, which may differ from the alphabet of definition for M. – An element of C is called a ciphertext. 15 Encrypt and decrypt transformations (Các phép biến đổi) • K denotes a set called the key space. An element of K is called a key. • Each element e ∈ K uniquely determines a bijection from M to C, denoted by Ee. • Ee is called an encryption function or an encryption transformation • For each d ∈ K, Dd denotes a bijection from C to M (i.e., Dd : C→M). Dd is called a decryption function or decryption transformation. 16 Encrypt and decrypt transformations (cont.) • Ee : e ∈ K ; Dd : d ∈ K – for each e ∈ K there is a unique key d ∈ K such that Dd = Ee-1; – that is, Dd(Ee(m)) = m for all m ∈ M. • The keys e and d in the preceding definition are referred to as a key pair and some times denoted by (e, d). • To construct an encryption scheme requires one to select – a message space M, – a ciphertext space C, – a ...
Tìm kiếm theo từ khóa liên quan:
Bài giảng Mật mã học Mật mã học Tổng quan về mật mã học Cryptographic goals Basic terminology Communication participantsGợi ý tài liệu liên quan:
-
Giáo trình Mật mã học - PGS.TS. Nguyễn Bình (chủ biên)
325 trang 106 0 0 -
Giáo trình Cơ sở mật mã học: Phần 1
85 trang 44 0 0 -
Bài giảng An toàn an ninh thông tin: Bài 2 - Bùi Trọng Tùng
42 trang 29 0 0 -
Hệ mật mã dựa trên đường cong Elliptic
12 trang 27 0 0 -
Bài giảng Phát triển ứng dụng web: Chương 8 - Lê Đình Thanh
70 trang 27 0 0 -
Bài giảng Mật mã học: Mật mã cơ sở - Huỳnh Trọng Thưa
7 trang 26 0 0 -
Bài giảng An toàn thông tin - Chương 2: Mật mã học
39 trang 25 0 0 -
Giáo trình Mật mã học: Phần 2 – HV Bưu chính Viễn thông
168 trang 25 0 0 -
Giáo trình An toàn và bảo mật thông tin – ĐH Hàng Hải
145 trang 24 0 0 -
Bài giảng Mật mã học: Mã hóa DES - Huỳnh Trọng Thưa
31 trang 23 0 0