hello1999 发表于 2021-10-15 16:40

深入浅出密码学——常用加密技术原理与应用

第1章密码学和数据安全导论·············1
1.1密码学及本书内容概述···············1
1.2对称密码学··································3
1.2.1基础知识······························4
1.2.2简单对称加密:替换密码······5
1.3密码分析······································8
1.3.1破译密码体制的一般思路·······8
1.3.2合适的密钥长度····················10
1.4模运算与多种古典密码·············11
1.4.1模运算···································12
1.4.2整数环···································15
1.4.3移位密码(凯撒密码)·············16
1.4.4仿射密码·······························18
1.5讨论及扩展阅读························19
1.6要点回顾····································21
1.7习题············································21
第2章序列密码·································27
2.1引言············································27
2.1.1序列密码与分组密码·············27
2.1.2序列密码的加密与解密·········29
2.2随机数与牢不可破的分组密码····32
2.2.1随机数生成器························32
2.2.2一次一密································34
2.2.3关于实际序列密码················35
2.3基于移位寄存器的序列密码·····38
2.3.1线性反馈移位寄存器(LFSR)···39
2.3.2针对单个LFSR的已知明文
攻击······································43
2.3.3Trivium··································44
2.4讨论及扩展阅读···························46
2.5要点回顾····································47
2.6习题············································48
第3章数据加密标准与替换算法·······51
3.1DES简介····································51
3.2DES算法概述····························54
3.3DES的内部结构························56
3.3.1初始置换与逆初始置换·········56
3.3.2f函数······································58
3.3.3密钥编排································63
3.4解密············································65
3.5DES的安全性····························68
3.5.1穷尽密钥搜索························68
3.5.2分析攻击································70
3.6软件实现与硬件实现·················71
3.6.1软件········································71
3.6.2硬件········································72
3.7DES替换算法····························72
目录
深入浅出密码学—常用加密技术原理与应用
VIII
3.7.1AES和AES入围密码···········72
3.7.23DES与DESX·······················73
3.7.3轻量级密码PRESENT···········73
3.8讨论及扩展阅读························76
3.9要点回顾····································77
3.10习题··········································78
第4章高级加密标准·························83
4.1引言············································83
4.2AES算法概述····························85
4.3一些数学知识:伽罗瓦域简介···87
4.3.1有限域的存在性·····················87
4.3.2素域········································89
4.3.3扩展域GF(2m)························90
4.3.4GF(2m)内的加法与减法··········91
4.3.5GF(2m)内的乘法·····················91
4.3.6GF(2m)内的逆操作·················93
4.4AES的内部结构························95
4.4.1字节代换层·····························96
4.4.2扩散层····································99
4.4.3密钥加法层···························101
4.4.4密钥编排·······························101
4.5解密··········································106
4.6软件实现与硬件实现···············110
4.6.1软件······································110
4.6.2硬件······································111
4.7讨论及扩展阅读······················111
4.8要点回顾··································112
4.9习题··········································112
第5章分组密码的更多内容·············117
5.1分组密码加密:操作模式·······117
5.1.1电子密码本模式(ECB)·······118
5.1.2密码分组链接模式(CBC)·····122
5.1.3输出反馈模式(OFB)············123
5.1.4密码反馈模式(CFB)············125
5.1.5计数器模式(CTR)················126
5.1.6伽罗瓦计数器模式(GCM)···127
5.2回顾穷尽密钥搜索··················129
5.3增强分组密码的安全性···········130
5.3.1双重加密与中间人攻击······131
5.3.2三重加密······························133
5.3.3密钥漂白······························134
5.4讨论及扩展阅读······················136
5.5要点回顾··································137
5.6习题··········································137
第6章公钥密码学简介···················141
6.1对称密码学与非对称密码学···141
6.2公钥密码学的实用性···············145
6.2.1安全机制·····························145
6.2.2遗留问题:公钥的可靠性···146
6.2.3重要的公钥算法·················146
6.2.4密钥长度与安全等级··········147
6.3公钥算法的基本数论知识·······148
6.3.1欧几里得算法·····················148
6.3.2扩展的欧几里得算法··········151
6.3.3欧拉函数·····························155
6.3.4费马小定理与欧拉定理······157
6.4讨论及扩展阅读······················159
6.5要点回顾··································160
6.6习题··········································160
第7章RSA密码体制······················163
7.1引言··········································164
7.2加密与解密······························164
7.3密钥生成与正确性验证···········165
7.4加密与解密:快速指数运算···169
目录
IX
7.5RSA的加速技术······················173
7.5.1使用短公开指数的快速加密···173
7.5.2使用中国余数定理的快速
加密······································174
7.6寻找大素数······························177
7.6.1素数的普遍性······················177
7.6.2素性测试·····························178
7.7实际中的RSA:填充··············182
7.8攻击··········································183
7.9软件实现与硬件实现···············186
7.10讨论及扩展阅读······················187
7.11要点回顾··································188
7.12习题··········································189
第8章基于离散对数问题的公钥
密码体制·······························193
8.1Diffie-Hellman密钥交换·········194
8.2一些代数知识··························196
8.2.1群·········································196
8.2.2循环群·································198
8.2.3子群·····································202
8.3离散对数问题··························204
8.3.1素数域内的离散对数问题····204
8.3.2推广的离散对数问题············205
8.3.3针对离散对数问题的攻击····207
8.4Diffie-Hellman密钥交换的安
全性···············································211
8.5Elgamal加密方案····················212
8.5.1从Diffie-Hellman密钥交换
到Elgamal加密··················212
8.5.2Elgamal协议·······················213
8.5.3计算方面·····························215
8.5.4安全性·································216
8.6讨论及扩展阅读······················218
8.7要点回顾··································219
8.8习题··········································219
第9章椭圆曲线密码体制················225
9.1椭圆曲线的计算方式···············226
9.1.1椭圆曲线的定义··················227
9.1.2椭圆曲线上的群操作···········228
9.2使用椭圆曲线构建离散对数
问题················································232
9.3基于椭圆曲线的Diffie-Hellman
密钥交换··································236
9.4安全性······································238
9.5软件实现与硬件实现···············238
9.6讨论及扩展阅读······················239
9.7要点回顾··································241
9.8习题··········································241
第10章数字签名····························245
10.1引言········································245
10.1.1对称密码学尚不能完全
满足需要的原因··············246
10.1.2数字签名的基本原理······247
10.1.3安全服务·························248
10.2RSA签名方案························249
10.2.1教科书的RSA数字签名···250
10.2.2计算方面··························251
10.2.3安全性······························252
10.3Elgamal数字签名方案··········255
10.3.1教科书的Elgamal
数字签名··························255
10.3.2计算方面··························257
10.3.3安全性······························258
10.4数字签名算法························261
10.4.1DSA算法·························261
深入浅出密码学—常用加密技术原理与应用
X
10.4.2计算方面··························264
10.4.3安全性······························265
10.5椭圆曲线数字签名算法·········266
10.5.1ECDSA算法····················267
10.5.2计算方面··························270
10.5.3安全性······························270
10.6讨论及扩展阅读····················271
10.7要点回顾································272
10.8习题········································272
第11章哈希函数·····························277
11.1动机:对长消息签名·············277
11.2哈希函数的安全性要求·········280
11.2.1抗第一原像性或单向性···280
11.2.2抗第二原像性或弱抗
冲突性······························281
11.2.3抗冲突性与生日攻击·······282
11.3哈希函数概述·························286
11.3.1专用的哈希函数:MD4
家族··································287
11.3.2从分组密码构建的哈希
函数··································288
11.4安全哈希算法SHA-1·············290
11.4.1预处理······························291
11.4.2哈希计算··························292
11.4.3实现··································294
11.5讨论及扩展阅读·····················295
11.6要点回顾································296
11.7习题········································297
第12章消息验证码·························301
12.1消息验证码的基本原理·········301
12.2来自哈希函数的MAC:
HMAC····································303
12.3来自分组密码的MAC:
CBC-MAC·····························307
12.4伽罗瓦计数器消息验证码·····308
12.5讨论及扩展阅读····················309
12.6要点回顾································309
12.7习题········································310
第13章密钥建立····························313
13.1引言········································314
13.1.1一些术语··························314
13.1.2密钥刷新和密钥衍生·······314
13.1.3n2密钥分配问题··············316
13.2使用对称密钥技术的密钥
建立··············································317
13.2.1使用密钥分配中心的密钥
建立··································318
13.2.2Kerberos···························321
13.2.3使用对称密钥分配的其他
问题·································323
13.3使用非对称密钥技术的密钥
建立·······································323
13.3.1中间人攻击······················324
13.3.2证书·································326
13.3.3PKI和CA························329
13.4讨论及扩展阅读····················332
13.5要点回顾································333
13.6习题········································333
参考文献·················································339


tomcat0927 发表于 2021-10-15 17:43

激动人心,无法言表!

tztztztz 发表于 2021-10-16 12:11

666

w2dy 发表于 2022-1-10 00:12

多谢分享!

Bones 发表于 2022-2-9 17:45

111

yukunli 发表于 2023-9-29 18:38

看到这帖子真是高兴!

yukunli 发表于 2023-10-3 10:02

强烈支持楼主ing……

90210 发表于 2024-11-20 16:23

强烈支持楼主ing……
页: [1]
查看完整版本: 深入浅出密码学——常用加密技术原理与应用