密码学基础(07-08) PKI (Public Key Infrastructure) 公钥基础设施 公钥技术的应用 復大辱软件学院 LiJT
LiJT 密码学基础(07-08) PKI (Public Key Infrastructure) 公钥基础设施 ——公钥技术的应用
授课计划 两个部分 应用密码学基础 密码学基础 古典密码 认证、PKl、数字证书 现代对称密码 典型的安全协议 非对称密码/公开密钥密码 报文鉴别码 流密码 復大辱软件学院 LiJT
LiJT 授课计划 密码学基础 古典密码 现代对称密码 非对称密码/公开密钥密码 报文鉴别码 流密码 两个部分 应用密码学基础 认证、PKI、数字证书 典型的安全协议
Outline Public-key Technology Review Why do we need pKI Digital Certificate Format Composition of PKI PKI Trust Relationship Application of PK 復大辱软件学院 LiJT
LiJT Outline • Public-key Technology Review • Why do we need PKI • Digital Certificate Format • Composition of PKI • PKI Trust Relationship • Application of PKI
o Review: Public-key Technology Public-key Technology Based on asymmetric cryptographic algorithms Public-Private Key Pairs Services: confidentiality, integrity, authentication and non-repudiation Cryptanalyst Cryptanalyst Source a Destination B Source a Destination B Encryption Decryption Decryption Destinati Algorithm Algorithm Algerithm KUa 復大辱软件学院 LiJT
LiJT Review: Public-key Technology • Public-key Technology – Based on asymmetric cryptographic algorithms – Public-Private Key Pairs – Services: confidentiality, integrity, authentication and non-repudiation
e Review: Digital Signature Two digital signature schemes KR Compare EKRal h(m) (a)RSA Approach H KUC ①」Sg Ver Compare (b)Dss Approach 復大辱软件学院 LiJT
LiJT Review: Digital Signature • Two digital signature schemes