文档介绍:重庆大学软件学院重庆大学软件学院 Final Final Review Review 信息安全导论信息安全导论 2017-1-10 Final Review 胡海波 page 2 2. 2. 对称密码体系对称密码体系 3. 3. 公钥密码体系公钥密码体系 4. 4. 密码散列函数密码散列函数密码学原理及算法密码学原理及算法 1. 1. 概述概述 2017-1-10 Final Review 胡海波 page 3 1. 1. 概述概述??安全攻击: 安全攻击: –– Interruption Interruption 阻断阻断–– Interception Interception 窃听窃听–– Modification Modification 修改修改–– Fabrication Fabrication 伪装伪装?? Active Attack Active Attack ?? Passive Attack Passive Attack 2017-1-10 Final Review 胡海波 page 4 1. 1. 概述概述??安全服务安全服务? Confidentiality (保密性)? Availability (可用性)? Nonrepudiation (防抵赖)? Authentication (真实性)? Integrity (完整性)? Access Control (可控性) 2017-1-10 Final Review 胡海波 page 5 1. 1. 概述概述 Symmetric Cryptography Asymmetric Cryptography Cryptographic Hash Function Cryptography Cryptography 2017-1-10 Final Review 胡海波 page 6 Cryptographic Hash Function Asymmetric Cryptography Symmetric Cryptography General idea of General idea of Symmetric-key Symmetric-key cipher cipher 对称密码对称密码 Plaintext Plaintext Plaintext Plaintext Ciphertext Ciphertext Ciphertext Ciphertext Decryption Algorithm Encryption Algorithm Secure Secure Key-exchange Key-exchange Channel Channel Insecure Channel Insecure Channel Shared Shared Secret-Key Secret-Key Shared Shared Secret-Key Secret-Key Alice Alice Bob Bob Encipherment Encipherment (加密) (加密) 1. 1. 概述概述 2017-1-10 Final Review 胡海波 page 7 Symmetric Cryptography Cryptographic Hash Function Asymmetric Cryptography General idea of General idea of Asymmetric-key Asymmetric-key cipher cipher Plaintext Plaintext Plaintext Plaintext Ciphertext Ciphertext Ciphertext Ciphertext Decryption Algorithm Encryption Algorithm Insecure Channel Insecure Channel Alice Alice Bob Bob Alice Alice ’’s s Private Private -Key -Key Alice Alice ’’s s Public Public Key Key 1 1 Digital Signature Digital Signature 数字签名数字签名 1. 1. 概述概述 2017-1-10 Final Review 胡海波 page 8 Symmetric Cryptography Cryptographic Hash Function Asymmetric Cryptography Gene