Xem mẫu

Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 Key channel for symmetric cryptosystems 3 Perfect encryption 4 Dolev-Yao threat model 5 Protocol “message authentication” 6 Protocol “challenge-response” 7 Public-key cryptosystems Ho Chi Minh City University of Technology Faculty of Computer Science and Engineering © 2011 Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols 2 Cryptography-related concepts  Plaintext is the original content which is readable as textual material. Plaintext needs protecting.  Ciphertext is the result of encryption performed on plaintext using an algorithm. Ciphertext is not readable.  Encryption is the process of turning plaintext into ciphertext, decryption is the inverse of the encryption.  Encryption, decryption process needs keys  Cryptosystems = encryption + decryption algorithms Ho Chi Minh City University of Technology Faculty of Computer Science and Engineering © 2011 Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols 3 Cryptosystems KeyE Plaintext Ciphertext Hello, This content is confidential …................... ……………….. …. Encryption Cryptosystem Decryption À¿¾«§¶   ……………… … ……………… … ….. KeyD Ho Chi Minh City University of Technology Faculty of Computer Science and Engineering © 2011 Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols 4 Cryptography-related concepts  Symmetric (shared-/secret-key) cryptosystem: the same key for (en/de)cryption algorithms  Asymmetric (public-key) cryptosystem: public & private keys for (en/de)cryption algorithms ke = kd ke ≠ kd Ho Chi Minh City University of Technology Faculty of Computer Science and Engineering © 2011 Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols 5 ... - tailieumienphi.vn
nguon tai.lieu . vn