Overview 曹天杰 Tianjie Cao ticao@cumt.edu.cn College of Computer Science and echnology china University of Mining and Technology Xuzhou, China 中国矿业大学计算机科学与技术学院 2003.5.12
1 曹天杰 Tianjie Cao tjcao@cumt.edu.cn College of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China 中国矿业大学计算机科学与技术学院 2003.5.12 Overview
Resources A.J. Menezes p C van oorschot and s.a. vanstone Handbook of Applied Cryptography, CRC Press, 1997 Bruce Schneier. Applied cryptography, Second Edition Protocols, algorthms, and Source Code in C(cloth) John Wiley sons, Inc )1996 Douglas R. Stinson, Cryptography (theory and practice), CRC Press 1995
2 A. J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied Cryptography, CRC Press, 1997. Bruce Schneier. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) John Wiley & Sons, Inc.) 1996 Douglas R. Stinson, Cryptography (Theory and Practice), CRC Press 1995 Resources
Course outline oVerview: Secure communication Attacks to cryptosystems. One time pad randomness and pseudo randomness o Secret-Key cryptography: Block ciphers. DES, AES (Rijndael). Modes of operation. Linear and Differential cryptanalysis Public-Key cryptography: Mathematical Foundations One-way functions Trapdoor one-way functions. Public-key cryptosystems. RSA, Diffie-Hellman, ElGamal, and elliptic curve cryptosystems. Design and Analysis of Cryptographic Protocols: Authentication protocols. Digital cash. Sharing and partial disclosure of secrets, Zero-knowledge proof systems Identification protocols. Key management architectures
3 •Overview : Secure communication. Attacks to cryptosystems. One time pad, randomness and pseudorandomness •Secret-Key Cryptography: Block ciphers .DES, AES (Rijndael). Modes of operation. Linear and Differential cryptanalysis. •Public-Key Cryptography: Mathematical Foundations. One-way functions. Trapdoor one-way functions. Public-key cryptosystems. RSA, Diffie-Hellman, ElGamal, and elliptic curve cryptosystems. •Design and Analysis of Cryptographic Protocols: Authentication protocols. Digital cash. Sharing and partial disclosure of secrets. Zero-knowledge proof systems. Identification protocols. Key management architectures Course Outline
Some security Properties Integrity: no improper modification Authenticity: integrity of source Non-repudiation: integrity of commitments Accountability: integrity of responsibility Secrecy: no improper disclosure Privacy: secrecy of personal data Anonymity: unlinkable secrecy of identity Pseudonymity: linkable secrecy of identity Availability: no improper denial of service
4 Some Security Properties • Integrity: no improper modification – Authenticity: integrity of source – Non-repudiation: integrity of commitments – Accountability: integrity of responsibility • Secrecy: no improper disclosure – Privacy: secrecy of personal data – Anonymity: unlinkable secrecy of identity – Pseudonymity: linkable secrecy of identity • Availability: no improper denial of service
Correctness vs Security Correctness: satisfy specifications For reasonable inputs get reasonable output Security: resist attacks For unreasonable inputs output not completely disastrous Main difference Active interference from the environment
5 Correctness vs. Security • Correctness: satisfy specifications – For reasonable inputs, get reasonable output • Security: resist attacks – For unreasonable inputs, output not completely disastrous • Main difference – Active interference from the environment