FIT1047 Lecture Notes - Lecture 6: Message Authentication Code, Block Cipher Mode Of Operation, Initialization Vector

33 views7 pages
Cryptography*algos
!"#$%&'()"*+*&$)',#'-*#)../"(#0'()"*1$).*'2($3*&0$'(,-
4
5"',6$('%*+*&$,7,"'-*#20"6,*')*#)../"(#0'()"*8%*'2($3*&0$'(,-*(MAC)
4
9%..,'$(#*,"#$%&'()"
4
+*0*#$%&')6$0&2(#*:,%*(-*-20$,3*8,';,,"*0'*<,0-'*=*&$("#(&0<->
?2(-*:,%*(-*3/&<(#0',3*0'*'2,*7,$%*-'0$'*0"3*8)'2*&0$'(,-*2)<3*)"*')*('>
@-,-*0*-20$,3*-,#$,' ')*-#$0.8<,*0*.-6*("*0*;0%*'20'*#0"A'*8,*/"3,$-'))3*
;B)*:");("6*'2,*-,#$,'
+*;)$:*<(:,*<)):/&*'08<,-*1)$*0*&0$'*)1*'2,*.,--06,*8<)#:
Eg.*21
E
F
=
E
GH
IJ
IK
F
JL
M=
IN
=
KI
FD
=G
AES CL370"#,3*!"#$%&'()"*9'0"30$3D*/-,-*FO*#%#<,-*("*'2,*=PGQ8('*7,$-()"
R)$:-*)"*.-6*8<)#:-*QQS*&$)7(3("6*#)"1(3,"'(0<('%
§
5"',6$('%*")'*-'$0(62'1;3*C)$3,$*)1*8<)#:-*#20"6,-T*8('-*#20"6,*,'#D
§
N(11*:("3-*)1*8<)#:*#20("("6
§
9'0$'*;B*0"*("('(0<(-0'()"*7,#')$T*'2,"*#).8("3*,0#2*,"#$%&',3*8<)#:*
;B*'2,*",U'*8<)#:
K<)#:-*("*;$)"6*)$3,$*#0"A'*8,*3,#$%&',3T*0"3*0*#20"6,3*
8<)#:*;(<<*3(-08<,*3,#$%&'()"*)1*",U'*8<)#:
V
§
WPA2/CCMP
@-,-*L!9*0"3*W
JKJQXLJ
J(&2,$*K<)#:*J20("("6
®
X,--06,*L/'2,"'(#0'()"*J)3,
@-,3*')*&$)',#'*("',6$('%*)1*0*.-6
L*:,%*(-*$,Y/($,3*')*#).&/',*0*70<(3*.-6*
0/'2,"'(#0'()"*#)3,
}
51*0''0#:,$*3),-"A'*:");*:,%T*#0"A'*#$,0',*0*
XLJ*1)$*'2,*#20"6,3*.-6
}
®
V
§
Z,-/<'("6*8<)#:*#0"*8,*/-,3*')*#2,#:*("',6$('%*)1*#).&<,',*.,--06,
§
[$)-
!11(#(,"'
V
§
J)"-
\)"Q$,&/3(0'()"C'2,*0--/$0"#,*'20'*0*&0$'%*#0"")'*3,"%*'2,*
0/'2,"'(#('%*)1*'2,($*-(6"0'/$,*)"*0*3)#/.,"'B.-6D*
(.&)--(8<,
V
],%*3(-'$(8/'()"*Q')*,-'08<(-2*-20$,3*-,#$,'T*0<',$"0'(7,*
-,#/$,*#20"",<*1)$*:,%*3(-'$(8/'()"*(-*",#,--0$%
V
9#0<08(<('%*Q"/.8,$*)1*:,%-*6$);-*,U&)","'(0<<%*;B*"/.8,$*
)1*&0$'(#(&0"'-T*-("#,*,0#2*&0($*)1*-,"3,$*0"3*$,#,(7,$*",,3-**
0*/"(Y/,*-,#$,'*:,%
F=*&0$'(#(&0"'-*",,3*GG*:,%-
®
FEEE*&0$'(#(&0"'-*",,3*O^^TPEE*:,%-
®
FEG&0$'(#(&0"'-*",,3*O^^T^^^TPEETEEE*:,%-
®
V
§
[/8<(#*:,%*#$%&')6$0&2% C0:0*0-%..,'$(#D4
__*80-,3*)"*0*20$3*.0'2,.0'(#0<*&$)8<,. 0"3*0*<0$6,*$0"3).*"/.8,$T*0*:,%Q
&0($*(-*6,",$0',3T*-/#2*'20'*'2,*&$(70',*:,%*#0"A'*8,*3,$(7,3*1$.*&/8<(#*:,%*;B)*
-)<7("6*'2,*/"3,$<%("6*.0'2,.0'(#0<*&$)8<,.>
!7,$%*&$("#(&0<*);"-*0*/"(Y/,*&0($*)1*:,%-
!6>*,<,#'$)"(#* #0-2T*")"Q$,&/3(0'()"*&$)8<,.-*C__`L9*')*8,*
0/'2,"'(#DT*10($*,U#20"6,*&$)')#)<-T*,<,#'$)"(#* 7)'("6T*./<'(Q&0$'%*
:,%*06$,,.,"'
§
Random*numbers
L<<*'%&,-*)1*#$%&')6$0&2%*",,3*'2,.*1)$W
],%*6,",$0'()"V
@-,*("*&$)')#)<-*')*.0$:*.,--06,-*0-*",;V
5"('(0<(-0'()"*7,#')$-V
§
RSA CZ(7,-'Q920.($QL3<,.0"D
[$(70',*:,%*C3T*"Da*&/8<(#*:,%*C"T*,D
§
b,"#$%&'()"c*Cipher = (Message)encryptionmod(n)
§
b3,#$%&'()"c*Message = (Cipher)decryptionmod(n)
§
__*x mod(n) +*$,.0("3,$*)1*UB"
§
[<0("*Z9LB#(&2,$',U'*#0"*8,*./<'(&<(,3*0"3*'2,"*3,#$%&',3
§
Encryption*process
9,"3,$*C,6>*K)8D*,"#$%&'-*.-6*/-("6*&/8<(#*:,%*)1*$,#,(7("6*&0$'%
§
Z,#,(7,$*C,6>*L<(#,D*3,#$%&'-*.-6*/-("6*&$(70',*:,%*-2,*);"-
§
[$)-
\)"Q$,&/3(0'()"*");*&)--(8<,*Q8%*$,7,$-,*0&&<(#0'()"*)1*:,%*
&0($
V
C,6>*L<(#,*-(6"-*.-6*/-("6*&$(70',*:,%*0"3*6,",$0',-*.-6*;('2*
3(6('0<*-(6"0'/$,D
+*0*3(6('0<*#)3,*C6,",$0',3*0"3*0/'2,"'(#0',3*8%*&/8<(#*
:,%*,"#$%&'()"D*;2(#2*(-*0''0#2,3*')*0"*,<,#'$)"(#0<<%*
'$0"-.('',3*3)#*')*7,$(1%*('-*#)"',"'-*0"3*'2,*-,"3,$A-*
(3,"'('%
C,6*#"'3>*K)8*7,$(1(,-*'2,*-(6"0'/$,*/-("6*L<(#,A-*&/8<(#*:,%D
],%*3(-'$(8/'()"*&$)8<,.*$,.)7,3*Q)"<%*&/8<(#*:,%-*",,3*')*
8,*3(-'$(8/',3T*8/'*'2,%*3)"A'*207,*')*$,.0("*-,#$,'
V
9#0<08(<('%*&$)8<,.*$,.)7,3*Q,0#2*&$("#(&0<*)"<%*",,3-*0*
-("6<,*:,%*&0($*0<)"6*;B*&/8<(#*:,%-*)1*0<<*)'2,$*&$("#(&0<-
FEEE*&0$'(#(&0"'-*)"<%*",,3*=EEE*:,%-*("-',03*)1*
0<.)-'*PEETEEE
®
V
§
J)"-
X/#2*<,--*,11(#(,"'*,"#$%&'()"B3,#$%&'()"*0-*#).&0$,3*')*
-%..,'$(#*:,%*#$%&')6$0&2%
V
],%*-(d,-*0$,*./#2*8(66,$V
§
`%8$(3*-#2,.,-*)1',"*/-,3*')*-)<7,*&$)8<,.-*'20'*#0"*0$(-,
!6>*key*establishment
L<(#,*0"3*K)8*8)'2*/-,*?`!5Z*eR\*&$(70',*0"3*?`!*e?`!ZA9*
&/8<(#*:,%*')*3,$(7,*0*-20$,3*-,#$,'*:,%
V
§
!6>*Z9L
X0'2,.0'(#0<*&$)8<,.*(-*10#')$(-0'()"*)1*<0$6,*"/.8,$- C(>,>*
1("3("6*&$(.,*10#')$-D
!"#$%&'()"W*1)$*.-6*XT*#0<#/<0',*
®
enc(M) = Memod(n)
N,#$%&'()"W*1)$*.-6*XT*#0<#/<0',*
®
decr(enc(M)) = enc(M)dmod(n) = M
J/$$,"'<%*:,%*<,"6'2*)1*=EOM*8('-*(-*#)"-(3,$,3*-,#/$,
®
V
§
J$%&')6$0&2(#*20-2*1/"#'()"4
+*.0&-*("&/'*)1*0$8('$0$%*<,"6'2*')*0*1(U,3*<,"6'2*)/'&/'
5"1,0-(8<,*')*("7,$'
@-,3*("*.0"%*&<0#,-*("*#).&/'("6*C,6>*("3,U,-*("*38-DT*("*3(6('0<*
-(6"0'/$,-T*1)$*-')$("6*0"3*#).&0$("6*&B;-T*("*.-6*0/'2,"'(#0'()"*#)3,-*
,'#
53,0<<%T*",,3-*')*207,*'2,-,*&$)&,$'(,-W
f0-'T*/-,*<,--*$,-)/$#,-
§
5.&)--(8<,*')*1("3*)$(6("0<*.-6*,U#,&'*'2$)/62*'$(0<*0"3*,$$)$
§
`0-2,-*1)$*-(.(<0$*.-6-*./-'*")'*8,*#)$$,<0',3
9.0<<*#20"6,*("*.-6*++S*<0$6,*#20"6,*("*20-2V
§
5"1,0-(8<,*')*1("3*=*.-6-*;B*-0.,*20-2*C(>,>*#)<<(-()"D
§
!6-
XNP ;0-*;(3,<%*/-,3*8/'*")'*$<%*-,#/$,T*8/'*-).,'(.,-*-'(<<*/-,3*
1)$*("',6$('%*&$)',#'()"
§
9`LQF 8,'',$*'20"*XNPT*8/'*0''0#:("6*('*(-*./#2*,0-(,$*'20"*8$/',*
1)$#,*-("#,*0''0#:-*6,'*.)$,*,11(#(,"'
\)*<)"6,$*$,#)..,"3,3*1)$*3(6('0<*-(6"0'/$,-V
§
9`LQ=PGT*9`LQPF=T*9`L= 0$,*#/$$,"'*$,#)..,"30'()"-
§
Access*control
+*;2)*C&,$-)"-T*&$)#,--T*3,7(#,-*,'#D*20-*0##,--*')*;2(#2*$,-)/$#,-*("*'2,*-%-',.
__*')*<(.('*30.06,*'20'*#0"*8,*3)",*8%*/-,$-B/-,$*6$&-
Resource*access C-).,*)1*.0"%*,6-D
Z,03*1(<,-*
!U,#/',*&$)6$0.-
J20"6,*38*#)"',"'
920$,*30'0*;('2*)'2,$-
[$(7(<,6,*,-#0<0'()"*(-*0*6)0<*1)$*0''0#:-
4
!--,"'(0<*Y"-W
`);*')*identify;2)*;0"'-*')*/-,*0*3,7(#,B-,$7(#,
`);*')*&$)',#' files 1$.*8,("6*0##,--,3B#20"6,3*8%*/-,$-*)"*-0.,*3,7(#,
`);*')*&$)',#'*transactions ("*0"*0&&
4
L/'2,"'(#0'()"-4
+*(3,"'(1%*0'*<)6("*g*0/'2,"'(#0',*&0$'(#/<0$*'$0"-0#'()"-*80-,3*)"*(3,"'('%
Passwords
X)-'*#)..)"*;0%*)1*0/'2,"'(#0'("6*0"*(3,"'('%
J)..)"<%*$,/-,3T*)1',"*;,0:V
J0"*8,*-')<,"*'2$)/62*&2(-2("6B.0<;0$,V
J0"*8,*-')$,3
92)/<3"A'*8,*-')$,3*("*#<,0$',U'*)$*20-2*70</,
®
K,'',$*')*/-,*-0<',3*20-2
90<'*+*$0"3).*30'0*/-,3*0-*033('()"0<*("&/'*')*0*
)",Q;0%*1/"#'()"*'20'*h20-2,-h*0*&B;
N,1,"3-*060("-'*3(#'()"0$%*)$*$0("8);*'08<,*
0''0#:*C20-2*7,$-()"*)1*3(#'()"0$%D
®
V
N(11(#/<'*')*$,.,.8,$B$,-,'*&$)#,--,-V
§
[$)#,3/$,
9%-',.*#0<<* C/-,$*&$)#,--*')*&$)#,--)$DFD
L##,--*#)"'$)<*C&$)#,--)$*#2,#:-*0"3*0##,--,-*3(-:B1(<,*
-%-',.*0##)$3("6<%D
=D
J2,#:*&B;T*-,&0$0'()"*C/-,$*<)6("*')*e9DHD
§
X/<'(Q10#')$
Biometrics
!6>*1("6,$&$("'-T*7)(#,*$,#)6"('()"T*($(-*-#0"-*,'#V
[$)-
`(62*/-08(<('%
®
J0"A'*8,*$,7):,3B$,&<0#,3
®
\)*0")"%.)/-*0##,--*
®
V
J)"-
\)'*$,0<<%*-,#$,'*("1)
®
V
§
H/w*tokens
9,&0$0',*3,7(#,*++S*033('()"0<*-,#/$('%V
§
e1*transactions
!6>*.)",%*'$0"-1,$*("*80":("6V
?L\*C'$0"-0#'()"*"/.8,$-D
\)'*<(":,3*')*0#'/0<*'$0"-0#'()"
®
9X9*?L\*#0"*-2);*("1)*)1*'$0"-0#'()"
\,,3-*.0"(&/<0'()"*)1*=*-,&0$0',*3,7(#,-
®
i,",$0')$*$,03-*80$#)3,*1$).*-#$,,"T*'2,"*6,",$0',-*
?L\*<(":,3*')*'$0"-0#'()"*
®
V
§
e"*OS*level
N(-'("6/(-2*/-,$-*0"3*/-,$*6$&-*8';"*)'2,$-V
J)"'$)<-*0##,--*')*1(<,-T*&)$'-T*3,7(#,-*0"3*)'2,$*$,-)/$#,-V
@-,$*0/'2,"'(#0'()"*C,6>*&B;T*1("6,$&$("'DV
L<<)#0',-*&$)#,--,-*')*/-,$-*0"3*,"1)$#,-*-,&0$0'()"V
J0"*-/&&)$'*#).&<,U*&)<(#(,-*1)$*("3(7*&$)6-*C,6>*9!j("/UDV
K0-(#*1(<,*&,$.(--()"-*bj("/UcB0##,--*$(62'-
J0"*8,*3,1(",3*1)$*);",$T*6$&T*0<<*/-,$-
®
L##,--*$(62'-W
A$A*+*&,$.(--()"*')*$,03
A;A*+*&,$.(--()"*')*;$(',
AUA*+*&,$.(--()"*')*,U,#/',
AQA*+*")*&,$.(--()"*0'*0<<
!6>*AbU$;cbU$kcbUkkcA
b);",$cb6$&cb0<<*/-,$-c
®
V
§
e"*application*level
R20'*/-,$*#0"*/-/0<<%*-,,*0"3*#)"1(6/$,V
e1',"*#).&<,U*-,#/$('%*&)<(#(,-V
!"',$&$(-,*0&&<(#0'()"*Q-'011*;B*70$()/-*$)<,-T*1(",Q6$0(",3*
0##,--*')*'$0"-0#'()"-
J0"*,"1)$#,*&$)',#'()"*&$)&,$'(,-
®
J)"'$)<-*0##,--*')*$,-)/$#,-T*30'080-,T*'$0"-0#'()"-*,'#
®
J0"*8,*$)<,Q80-,3T*")'*l/-'*/-,$Q80-,3
®
V
9)#(0<*",';)$:-*Q#).&<,U*$/<,-*)"*;2)*#0"*-,,T*#)&%T*
1)$;0$3T*-,0$#2*C,'#D*;20'*30'0
V
§
[)<(#(,-
ACM CL##,--*J)"'$)<*X0'$(UD
@-,$ e9 L##)/"'-*[$)6 L##)/"'("6*N0'0 L/3('*?$0(<
90.*C03.("D A$;UA A$;UA A$A A$A
L<(#,*C.0"06,$D A$UA AUA AQA AQA
L##*[$)6 A$UA A$A A$;A A;A
K)8*C0/3(')$D A$UA A$A A$A A$A
e"<%*'2,*&$)6$0.*C")",*)1*'2,*/-,$-D*#0"*;$(',*30'0*0"3*0/3('*'$0(<-
Z);-*+*#0&08(<('(,-V
J)</."-*+*LJj- CL##,--*J)"'$)<*j(-'-DV
§
[$)-
!0-%*(1*/-,$-*);"*'2,($*1(<,-*0"3*#0"*.0"06,*0##,--*$(62'-*1)$*
'2,-,*1(<,-
V
§
J)"-
N)"A'*-#0<,*;,<<*QFEEE*$);-*_*=EE*#)<-*+*=*.(<*,"'$(,-*')*
.0"06,
V
R)"A'*;)$:*'))*;,<<*("*3(-'$(8/',3*-%-',.-*;B*<0$6,*0"3*
3%"0.(#-*-,'-*)1*/-,$-
V
J,"'$0<*0/'2)$('(,-*",,3*')*:,,&*'$0#:*)1*0<<*$,-)/$#,-*'20'*
/-,$-*#0"*0##,--
V
§
ZKLJ*CZ)<,Q80-,3*L##,--*J)"'$)<D
+*/-,*6$&-B$)<,-*')*.0"06,*&$(7(<,6,-*)1*<0$6,*-,'-*)1*/-,$-
NLJ*CN(-#$,'()"0$%*L##,--*J)"'$)<D
+*3,&,"3("6*)"*'2,($*$(62'-T*/-,$-*#0"*#20"6,*LJj-*0"3*$,7):,B6(7,*$(62'-*
')*)'2,$*/-,$-
XLJ*CX0"30')$%*L##,--*J)"'$)<D
+*0*-%-',.*Ce9B30'080-,*.0"06,.,"'*-%-',.D*,"1)$#,-*&$,Q3,1(",3*
0##,--*&)<(#(,-
4
?(#:,'B'):,"Q80-,3 0##,--*#)"'$)<
AS CL/'2,"'(#0'()"*9,$7,$D*&*SS C9,$7(#,*9,$7,$D
[$)#,3/$,
J<(,"'*$,Y/,-'-*0##,--*')*-,$7(#,*C')*L9DFD
L9*#2,#:-*0/'2,"'(#('%*0"3*(--/,-*'(#:,'-*')*#<(,"'*(1*7,$(1(,3
?(#:,'*#)"'0("-*(3,"'('%*("1)*0"3*#0"*0<-)*$,-'$(#'*'2,*
#0&08(<('(,-*)1*/-,$
®
=D
J<(,"'*-2);-*'(#:,'*')*99*')*0##,--*-,$7(#,HD
99*$,-&)"3-*0&&$)&$(0',<%*')*#<(,"'OD
§
!6>*],$8,$)-T*X(#$)-)1'*L#'(7,*N($,#')$%
§
4
9("6<,*-(6"Q)"
m/-'*<)6("*)"#,T*'2,"*#0"*0##,--*.0"%*-,$7(#,-*C,6>*X)"0-2*0/'2#0',D
[$)-
n,$%*#)"7,"(,"'
§
`(62*/-08(<('%
§
4
9("6<,*&)("'*)1*10(</$,T*",,3-*2(62*<,7,<*)1*#)"'$)<*0"3*-,#/$,*(.&<,.,"'0'()"4
R20'*#0"*6)*;$)"6o
R,0:",--,-*("*-B;T*("',$10#,-T*&$)')#)<-4
[2%-(#0<*0''0#:-4
Z0#,*#)"3('()"-4
+*/"3,-($08<,*-('/0'()"-*'20'*)##/$*;2,"*0*3,7(#,B-%-',.*0'',.&'-*')*&,$1)$.*
=*)$*.)$,*)&-*0'*'2,*-0.,*'(.,T*8/'*"0'/$,*)1*3,7(#,B-%-',.*1)$#,-*)&-*')*8,*
3)",*("*&$)&,$*-,Y/,"#,*')*8,*3)",*#)$$,#'<%
f,0'/$,*("',$0#')"*&$)8<,.-4
J)"",#'*3,7(#,-*C@9KD4
9)#(0<*,"6(",,$("64
+*/-,*)1*3,#,&'()"*')*.0"(&/<0',*("3(7-*("')*3(7/<6("6*#)"1(3,"'(0<B&,$-)"0<*("1)*
'20'*.0%*8,*/-,3*1)$*1$0/3/<,"'*&/$&)-,-
L33('()"0<*-,#/$('%*.,#20"(-.-
`0$3*3(-:*,"#$%&'()"4
n($/-*&$)',#'()"4
K0#:/&-4
9,#/$('%*/&30',-4
9&,#(0<*-,#/$('%*2B;*C,6>*?$/-',3*J).&/'("6D4
Z9L*#0<#/<0'()"-*0"3*1)$./<0,
__&/8<(#Q:,%*#$%&')6$0&2%
Week$6
?2/$-30%T*I*m/",*=EFM
==WPF
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 7 pages and 3 million more documents.

Already have an account? Log in
Cryptography*algos
!"#$%&'()"*+*&$)',#'-*#)../"(#0'()"*1$).*'2($3*&0$'(,-4
5"',6$('%*+*&$,7,"'-*#20"6,*')*#)../"(#0'()"*8%*'2($3*&0$'(,-*(MAC)4
9%..,'$(#*,"#$%&'()"4
+*0*#$%&')6$0&2(#*:,%*(-*-20$,3*8,';,,"*0'*<,0-'*=*&$("#(&0<->
?2(-*:,%*(-*3/&<(#0',3*0'*'2,*7,$%*-'0$'*0"3*8)'2*&0$'(,-*2)<3*)"*')*('>
@-,-*0*-20$,3*-,#$,' ')*-#$0.8<,*0*.-6*("*0*;0%*'20'*#0"A'*8,*/"3,$-'))3*
;B)*:");("6*'2,*-,#$,'
S-Boxes C9/8-'('/'()"D
+*;)$:*<(:,*<)):/&*'08<,-*1)$*0*&0$'*)1*'2,*.,--06,*8<)#:
Eg.*21 EF=
EGH IJ IK
FJL M= IN
=KI FD =G
AES CL370"#,3*!"#$%&'()"*9'0"30$3D*/-,-*FO*#%#<,-*("*'2,*=PGQ8('*7,$-()"
R)$:-*)"*.-6*8<)#:-*QQS*&$)7(3("6*#)"1(3,"'(0<('%
§
5"',6$('%*")'*-'$0(62'1;3*C)$3,$*)1*8<)#:-*#20"6,-T*8('-*#20"6,*,'#D
§
N(11*:("3-*)1*8<)#:*#20("("6
§
9'0$'*;B*0"*("('(0<(-0'()"*7,#')$T*'2,"*#).8("3*,0#2*,"#$%&',3*8<)#:*
;B*'2,*",U'*8<)#:
K<)#:-*("*;$)"6*)$3,$*#0"A'*8,*3,#$%&',3T*0"3*0*#20"6,3*
8<)#:*;(<<*3(-08<,*3,#$%&'()"*)1*",U'*8<)#:
V
§
WPA2/CCMP
@-,-*L!9*0"3*W
JKJQXLJ
J(&2,$*K<)#:*J20("("6
®
X,--06,*L/'2,"'(#0'()"*J)3,
@-,3*')*&$)',#'*("',6$('%*)1*0*.-6
L*:,%*(-*$,Y/($,3*')*#).&/',*0*70<(3*.-6*
0/'2,"'(#0'()"*#)3,
}
51*0''0#:,$*3),-"A'*:");*:,%T*#0"A'*#$,0',*0*
XLJ*1)$*'2,*#20"6,3*.-6
}
®
V
§
Z,-/<'("6*8<)#:*#0"*8,*/-,3*')*#2,#:*("',6$('%*)1*#).&<,',*.,--06,
§
[$)-
!11(#(,"'
V
§
J)"-
\)"Q$,&/3(0'()"C'2,*0--/$0"#,*'20'*0*&0$'%*#0"")'*3,"%*'2,*
0/'2,"'(#('%*)1*'2,($*-(6"0'/$,*)"*0*3)#/.,"'B.-6D*
(.&)--(8<,
V
],%*3(-'$(8/'()"*Q')*,-'08<(-2*-20$,3*-,#$,'T*0<',$"0'(7,*
-,#/$,*#20"",<*1)$*:,%*3(-'$(8/'()"*(-*",#,--0$%
V
9#0<08(<('%*Q"/.8,$*)1*:,%-*6$);-*,U&)","'(0<<%*;B*"/.8,$*
)1*&0$'(#(&0"'-T*-("#,*,0#2*&0($*)1*-,"3,$*0"3*$,#,(7,$*",,3-**
0*/"(Y/,*-,#$,'*:,%
F=*&0$'(#(&0"'-*",,3*GG*:,%-
®
FEEE*&0$'(#(&0"'-*",,3*O^^TPEE*:,%-
®
FEG&0$'(#(&0"'-*",,3*O^^T^^^TPEETEEE*:,%-
®
V
§
[/8<(#*:,%*#$%&')6$0&2% C0:0*0-%..,'$(#D
4
__*80-,3*)"*0*20$3*.0'2,.0'(#0<*&$)8<,. 0"3*0*<0$6,*$0"3).*"/.8,$T*0*:,%Q
&0($*(-*6,",$0',3T*-/#2*'20'*'2,*&$(70',*:,%*#0"A'*8,*3,$(7,3*1$.*&/8<(#*:,%*;B)*
-)<7("6*'2,*/"3,$<%("6*.0'2,.0'(#0<*&$)8<,.>
!7,$%*&$("#(&0<*);"-*0*/"(Y/,*&0($*)1*:,%-
!6>*,<,#'$)"(#* #0-2T*")"Q$,&/3(0'()"*&$)8<,.-*C__`L9*')*8,*
0/'2,"'(#DT*10($*,U#20"6,*&$)')#)<-T*,<,#'$)"(#* 7)'("6T*./<'(Q&0$'%*
:,%*06$,,.,"'
§
Random*numbers
L<<*'%&,-*)1*#$%&')6$0&2%*",,3*'2,.*1)$W
],%*6,",$0'()"
V
@-,*("*&$)')#)<-*')*.0$:*.,--06,-*0-*",;
V
5"('(0<(-0'()"*7,#')$-
V
§
RSA CZ(7,-'Q920.($QL3<,.0"D
[$(70',*:,%*C3T*"Da*&/8<(#*:,%*C"T*,D
§
b,"#$%&'()"c*Cipher = (Message)encryptionmod(n)
§
b3,#$%&'()"c*Message = (Cipher)decryptionmod(n)
§
__*x mod(n) +*$,.0("3,$*)1*UB"
§
[<0("*Z9LB#(&2,$',U'*#0"*8,*./<'(&<(,3*0"3*'2,"*3,#$%&',3
§
Encryption*process
9,"3,$*C,6>*K)8D*,"#$%&'-*.-6*/-("6*&/8<(#*:,%*)1*$,#,(7("6*&0$'%
§
Z,#,(7,$*C,6>*L<(#,D*3,#$%&'-*.-6*/-("6*&$(70',*:,%*-2,*);"-
§
[$)-
\)"Q$,&/3(0'()"*");*&)--(8<,*Q8%*$,7,$-,*0&&<(#0'()"*)1*:,%*
&0($
V
C,6>*L<(#,*-(6"-*.-6*/-("6*&$(70',*:,%*0"3*6,",$0',-*.-6*;('2*
3(6('0<*-(6"0'/$,D
+*0*3(6('0<*#)3,*C6,",$0',3*0"3*0/'2,"'(#0',3*8%*&/8<(#*
:,%*,"#$%&'()"D*;2(#2*(-*0''0#2,3*')*0"*,<,#'$)"(#0<<%*
'$0"-.('',3*3)#*')*7,$(1%*('-*#)"',"'-*0"3*'2,*-,"3,$A-*
(3,"'('%
C,6*#"'3>*K)8*7,$(1(,-*'2,*-(6"0'/$,*/-("6*L<(#,A-*&/8<(#*:,%D
],%*3(-'$(8/'()"*&$)8<,.*$,.)7,3*Q)"<%*&/8<(#*:,%-*",,3*')*
8,*3(-'$(8/',3T*8/'*'2,%*3)"A'*207,*')*$,.0("*-,#$,'
V
9#0<08(<('%*&$)8<,.*$,.)7,3*Q,0#2*&$("#(&0<*)"<%*",,3-*0*
-("6<,*:,%*&0($*0<)"6*;B*&/8<(#*:,%-*)1*0<<*)'2,$*&$("#(&0<-
FEEE*&0$'(#(&0"'-*)"<%*",,3*=EEE*:,%-*("-',03*)1*
0<.)-'*PEETEEE
®
V
§
J)"-
X/#2*<,--*,11(#(,"'*,"#$%&'()"B3,#$%&'()"*0-*#).&0$,3*')*
-%..,'$(#*:,%*#$%&')6$0&2%
V
],%*-(d,-*0$,*./#2*8(66,$V
§
`%8$(3*-#2,.,-*)1',"*/-,3*')*-)<7,*&$)8<,.-*'20'*#0"*0$(-,
!6>*key*establishment
L<(#,*0"3*K)8*8)'2*/-,*?`!5Z*eR\*&$(70',*0"3*?`!*e?`!ZA9*
&/8<(#*:,%*')*3,$(7,*0*-20$,3*-,#$,'*:,%
V
§
!6>*Z9L
X0'2,.0'(#0<*&$)8<,.*(-*10#')$(-0'()"*)1*<0$6,*"/.8,$- C(>,>*
1("3("6*&$(.,*10#')$-D
!"#$%&'()"W*1)$*.-6*XT*#0<#/<0',*
®
enc(M) = Memod(n)
N,#$%&'()"W*1)$*.-6*XT*#0<#/<0',*
®
decr(enc(M)) = enc(M)dmod(n) = M
J/$$,"'<%*:,%*<,"6'2*)1*=EOM*8('-*(-*#)"-(3,$,3*-,#/$,
®
V
§
J$%&')6$0&2(#*20-2*1/"#'()"4
+*.0&-*("&/'*)1*0$8('$0$%*<,"6'2*')*0*1(U,3*<,"6'2*)/'&/'
5"1,0-(8<,*')*("7,$'
@-,3*("*.0"%*&<0#,-*("*#).&/'("6*C,6>*("3,U,-*("*38-DT*("*3(6('0<*
-(6"0'/$,-T*1)$*-')$("6*0"3*#).&0$("6*&B;-T*("*.-6*0/'2,"'(#0'()"*#)3,-*
,'#
53,0<<%T*",,3-*')*207,*'2,-,*&$)&,$'(,-W
f0-'T*/-,*<,--*$,-)/$#,-
§
5.&)--(8<,*')*1("3*)$(6("0<*.-6*,U#,&'*'2$)/62*'$(0<*0"3*,$$)$
§
`0-2,-*1)$*-(.(<0$*.-6-*./-'*")'*8,*#)$$,<0',3
9.0<<*#20"6,*("*.-6*++S*<0$6,*#20"6,*("*20-2V
§
5"1,0-(8<,*')*1("3*=*.-6-*;B*-0.,*20-2*C(>,>*#)<<(-()"D
§
!6-
XNP ;0-*;(3,<%*/-,3*8/'*")'*$<%*-,#/$,T*8/'*-).,'(.,-*-'(<<*/-,3*
1)$*("',6$('%*&$)',#'()"
§
9`LQF 8,'',$*'20"*XNPT*8/'*0''0#:("6*('*(-*./#2*,0-(,$*'20"*8$/',*
1)$#,*-("#,*0''0#:-*6,'*.)$,*,11(#(,"'
\)*<)"6,$*$,#)..,"3,3*1)$*3(6('0<*-(6"0'/$,-V
§
9`LQ=PGT*9`LQPF=T*9`L= 0$,*#/$$,"'*$,#)..,"30'()"-
§
Access*control
+*;2)*C&,$-)"-T*&$)#,--T*3,7(#,-*,'#D*20-*0##,--*')*;2(#2*$,-)/$#,-*("*'2,*-%-',.
__*')*<(.('*30.06,*'20'*#0"*8,*3)",*8%*/-,$-B/-,$*6$&-
Resource*access C-).,*)1*.0"%*,6-D
Z,03*1(<,-*
!U,#/',*&$)6$0.-
J20"6,*38*#)"',"'
920$,*30'0*;('2*)'2,$-
[$(7(<,6,*,-#0<0'()"*(-*0*6)0<*1)$*0''0#:-
4
!--,"'(0<*Y"-W
`);*')*identify;2)*;0"'-*')*/-,*0*3,7(#,B-,$7(#,
`);*')*&$)',#' files 1$.*8,("6*0##,--,3B#20"6,3*8%*/-,$-*)"*-0.,*3,7(#,
`);*')*&$)',#'*transactions ("*0"*0&&
4
L/'2,"'(#0'()"-4
+*(3,"'(1%*0'*<)6("*g*0/'2,"'(#0',*&0$'(#/<0$*'$0"-0#'()"-*80-,3*)"*(3,"'('%
Passwords
X)-'*#)..)"*;0%*)1*0/'2,"'(#0'("6*0"*(3,"'('%
J)..)"<%*$,/-,3T*)1',"*;,0:V
J0"*8,*-')<,"*'2$)/62*&2(-2("6B.0<;0$,V
J0"*8,*-')$,3
92)/<3"A'*8,*-')$,3*("*#<,0$',U'*)$*20-2*70</,
®
K,'',$*')*/-,*-0<',3*20-2
90<'*+*$0"3).*30'0*/-,3*0-*033('()"0<*("&/'*')*0*
)",Q;0%*1/"#'()"*'20'*h20-2,-h*0*&B;
N,1,"3-*060("-'*3(#'()"0$%*)$*$0("8);*'08<,*
0''0#:*C20-2*7,$-()"*)1*3(#'()"0$%D
®
V
N(11(#/<'*')*$,.,.8,$B$,-,'*&$)#,--,-V
§
[$)#,3/$,
9%-',.*#0<<* C/-,$*&$)#,--*')*&$)#,--)$DFD
L##,--*#)"'$)<*C&$)#,--)$*#2,#:-*0"3*0##,--,-*3(-:B1(<,*
-%-',.*0##)$3("6<%D
=D
J2,#:*&B;T*-,&0$0'()"*C/-,$*<)6("*')*e9DHD
§
X/<'(Q10#')$
Biometrics
!6>*1("6,$&$("'-T*7)(#,*$,#)6"('()"T*($(-*-#0"-*,'#V
[$)-
`(62*/-08(<('%
®
J0"A'*8,*$,7):,3B$,&<0#,3
®
\)*0")"%.)/-*0##,--*
®
V
J)"-
\)'*$,0<<%*-,#$,'*("1)
®
V
§
H/w*tokens
9,&0$0',*3,7(#,*++S*033('()"0<*-,#/$('%V
§
e1*transactions
!6>*.)",%*'$0"-1,$*("*80":("6V
?L\*C'$0"-0#'()"*"/.8,$-D
\)'*<(":,3*')*0#'/0<*'$0"-0#'()"
®
9X9*?L\*#0"*-2);*("1)*)1*'$0"-0#'()"
\,,3-*.0"(&/<0'()"*)1*=*-,&0$0',*3,7(#,-
®
i,",$0')$*$,03-*80$#)3,*1$).*-#$,,"T*'2,"*6,",$0',-*
?L\*<(":,3*')*'$0"-0#'()"*
®
V
§
e"*OS*level
N(-'("6/(-2*/-,$-*0"3*/-,$*6$&-*8';"*)'2,$-V
J)"'$)<-*0##,--*')*1(<,-T*&)$'-T*3,7(#,-*0"3*)'2,$*$,-)/$#,-V
@-,$*0/'2,"'(#0'()"*C,6>*&B;T*1("6,$&$("'DV
L<<)#0',-*&$)#,--,-*')*/-,$-*0"3*,"1)$#,-*-,&0$0'()"V
J0"*-/&&)$'*#).&<,U*&)<(#(,-*1)$*("3(7*&$)6-*C,6>*9!j("/UDV
K0-(#*1(<,*&,$.(--()"-*bj("/UcB0##,--*$(62'-
J0"*8,*3,1(",3*1)$*);",$T*6$&T*0<<*/-,$-
®
L##,--*$(62'-W
A$A*+*&,$.(--()"*')*$,03
A;A*+*&,$.(--()"*')*;$(',
AUA*+*&,$.(--()"*')*,U,#/',
AQA*+*")*&,$.(--()"*0'*0<<
!6>*AbU$;cbU$kcbUkkcA
b);",$cb6$&cb0<<*/-,$-c
®
V
§
e"*application*level
R20'*/-,$*#0"*/-/0<<%*-,,*0"3*#)"1(6/$,V
e1',"*#).&<,U*-,#/$('%*&)<(#(,-V
!"',$&$(-,*0&&<(#0'()"*Q-'011*;B*70$()/-*$)<,-T*1(",Q6$0(",3*
0##,--*')*'$0"-0#'()"-
J0"*,"1)$#,*&$)',#'()"*&$)&,$'(,-
®
J)"'$)<-*0##,--*')*$,-)/$#,-T*30'080-,T*'$0"-0#'()"-*,'#
®
J0"*8,*$)<,Q80-,3T*")'*l/-'*/-,$Q80-,3
®
V
9)#(0<*",';)$:-*Q#).&<,U*$/<,-*)"*;2)*#0"*-,,T*#)&%T*
1)$;0$3T*-,0$#2*C,'#D*;20'*30'0
V
§
[)<(#(,-
ACM CL##,--*J)"'$)<*X0'$(UD
@-,$ e9 L##)/"'-*[$)6 L##)/"'("6*N0'0 L/3('*?$0(<
90.*C03.("D A$;UA A$;UA A$A A$A
L<(#,*C.0"06,$D A$UA AUA AQA AQA
L##*[$)6 A$UA A$A A$;A A;A
K)8*C0/3(')$D A$UA A$A A$A A$A
e"<%*'2,*&$)6$0.*C")",*)1*'2,*/-,$-D*#0"*;$(',*30'0*0"3*0/3('*'$0(<-
Z);-*+*#0&08(<('(,-V
J)</."-*+*LJj- CL##,--*J)"'$)<*j(-'-DV
§
[$)-
!0-%*(1*/-,$-*);"*'2,($*1(<,-*0"3*#0"*.0"06,*0##,--*$(62'-*1)$*
'2,-,*1(<,-
V
§
J)"-
N)"A'*-#0<,*;,<<*QFEEE*$);-*_*=EE*#)<-*+*=*.(<*,"'$(,-*')*
.0"06,
V
R)"A'*;)$:*'))*;,<<*("*3(-'$(8/',3*-%-',.-*;B*<0$6,*0"3*
3%"0.(#-*-,'-*)1*/-,$-
V
J,"'$0<*0/'2)$('(,-*",,3*')*:,,&*'$0#:*)1*0<<*$,-)/$#,-*'20'*
/-,$-*#0"*0##,--
V
§
ZKLJ*CZ)<,Q80-,3*L##,--*J)"'$)<D
+*/-,*6$&-B$)<,-*')*.0"06,*&$(7(<,6,-*)1*<0$6,*-,'-*)1*/-,$-
NLJ*CN(-#$,'()"0$%*L##,--*J)"'$)<D
+*3,&,"3("6*)"*'2,($*$(62'-T*/-,$-*#0"*#20"6,*LJj-*0"3*$,7):,B6(7,*$(62'-*
')*)'2,$*/-,$-
XLJ*CX0"30')$%*L##,--*J)"'$)<D
+*0*-%-',.*Ce9B30'080-,*.0"06,.,"'*-%-',.D*,"1)$#,-*&$,Q3,1(",3*
0##,--*&)<(#(,-
4
?(#:,'B'):,"Q80-,3 0##,--*#)"'$)<
AS CL/'2,"'(#0'()"*9,$7,$D*&*SS C9,$7(#,*9,$7,$D
[$)#,3/$,
J<(,"'*$,Y/,-'-*0##,--*')*-,$7(#,*C')*L9DFD
L9*#2,#:-*0/'2,"'(#('%*0"3*(--/,-*'(#:,'-*')*#<(,"'*(1*7,$(1(,3
?(#:,'*#)"'0("-*(3,"'('%*("1)*0"3*#0"*0<-)*$,-'$(#'*'2,*
#0&08(<('(,-*)1*/-,$
®
=D
J<(,"'*-2);-*'(#:,'*')*99*')*0##,--*-,$7(#,HD
99*$,-&)"3-*0&&$)&$(0',<%*')*#<(,"'OD
§
!6>*],$8,$)-T*X(#$)-)1'*L#'(7,*N($,#')$%
§
4
9("6<,*-(6"Q)"
m/-'*<)6("*)"#,T*'2,"*#0"*0##,--*.0"%*-,$7(#,-*C,6>*X)"0-2*0/'2#0',D
[$)-
n,$%*#)"7,"(,"'
§
`(62*/-08(<('%
§
4
9("6<,*&)("'*)1*10(</$,T*",,3-*2(62*<,7,<*)1*#)"'$)<*0"3*-,#/$,*(.&<,.,"'0'()"4
R20'*#0"*6)*;$)"6o
R,0:",--,-*("*-B;T*("',$10#,-T*&$)')#)<-4
[2%-(#0<*0''0#:-4
Z0#,*#)"3('()"-4
+*/"3,-($08<,*-('/0'()"-*'20'*)##/$*;2,"*0*3,7(#,B-%-',.*0'',.&'-*')*&,$1)$.*
=*)$*.)$,*)&-*0'*'2,*-0.,*'(.,T*8/'*"0'/$,*)1*3,7(#,B-%-',.*1)$#,-*)&-*')*8,*
3)",*("*&$)&,$*-,Y/,"#,*')*8,*3)",*#)$$,#'<%
f,0'/$,*("',$0#')"*&$)8<,.-4
J)"",#'*3,7(#,-*C@9KD4
9)#(0<*,"6(",,$("64
+*/-,*)1*3,#,&'()"*')*.0"(&/<0',*("3(7-*("')*3(7/<6("6*#)"1(3,"'(0<B&,$-)"0<*("1)*
'20'*.0%*8,*/-,3*1)$*1$0/3/<,"'*&/$&)-,-
L33('()"0<*-,#/$('%*.,#20"(-.-
`0$3*3(-:*,"#$%&'()"4
n($/-*&$)',#'()"4
K0#:/&-4
9,#/$('%*/&30',-4
9&,#(0<*-,#/$('%*2B;*C,6>*?$/-',3*J).&/'("6D4
Z9L*#0<#/<0'()"-*0"3*1)$./<0,
__&/8<(#Q:,%*#$%&')6$0&2%
Week$6
?2/$-30%T*I*m/",*=EFM ==WPF
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 7 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Integrity = prevents change to communication by third parties (mac) = a cryptographic key is shared between at least 2 principals. This key is duplicated at the very start and both parties hold on to it. Uses a shared secret to scramble a msg in a way that can"t be understood w/o knowing the secret. = work like lookup tables for a part of the message block. Aes (advanced encryption standard) uses 14 cycles in the 256-bit version. Integrity not straightfwd (order of blocks changes, bits change etc) Start w/ an initialisation vector, then combind each encrypted block w/ the next block. Blocks in wrong order can"t be decrypted, and a changed block will disable decryption of next block. A key is required to compute a valid msg authentication code. If attacker doesn"t know key, can"t create a. Resulting block can be used to check integrity of complete message.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents