下载此文档

密码学及网络安全 第二讲.pptx


文档分类:IT计算机 | 页数:约54页 举报非法文档有奖
1/54
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/54 下载此文档
文档列表 文档介绍
密码学与网络安全
第二讲传统加密技术
Outline
Course reviews
Cryptography & Steganography
Basic concepts of cryptography
Cryptanalysis and brute-force attack
Roadmap of cryptography
Classical Cipher
Substitution & Permutation Cipher
2018/2/20
2
OSI Security Architecture
2018/2/20
3
2018/2/20
4
Cryptography & Steganography
Cryptography
Greek origins, means secret writing
It encodes a message so it cannot be understood
Steganography
Greek origins, means covered writing
Art of hiding information in ways that prevent the detection of hidden message, Existence is not known
2018/2/20
5
Steganography
Example: covering data with text
We can use single space between words to represent the binary digit 0 and double space to represent binary digit 1. The following short message hides the 8-bit binary representation of the letter A in ASCII code 01000001.
2018/2/20
6
Steganography
Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun and admit swordfish rank overwhelming anyday
Send Lawyers, Guns, and Money
Simmons Prisoner's Problem, The prisoners' problem and the subliminal channel
2018/2/20
7
Cryptography is everywhere
munication
SSL/TLS, WEP, WPA2,
Encrypting files on disk
EFS, TrueCrypt
Content protection (. DVD, Blu-ray)
CSS, AACS
User authentication, ……
2018/2/20
8
Building Block
Encryption algorithm is publicly known
Never use a proprietary cipher
2018/2/20
9
Crypto core
2018/2/20
10
Secret key
Establishment
Secure
Communication
attacker???
k
k
confidentiality and integrity
m1
m2
Alice
Bob
Talking to Alice
Talking to Bob

密码学及网络安全 第二讲 来自淘豆网www.taodocs.com转载请标明出处.

相关文档 更多>>
非法内容举报中心
文档信息
  • 页数54
  • 收藏数0 收藏
  • 顶次数0
  • 上传人85872037
  • 文件大小2.08 MB
  • 时间2018-02-20