计算机网络安全——密码学(1)

======

1.加密算法的分类


按密钥方式分类

  • **对称加密(私有密钥)    :**加解密密钥相同或可以相互推出,如AES、AES

  • **非对称加密(公开密钥):**加解密密钥不相同,如RSA

按明文处理方式分类:

  • **流密码    :**对明文进行逐位加密,属于对称加密

  • **分组密码:**将明文分成若干个分组进行加密

2.对称加密技术


2.1.DES加密

2.1.1概述

DES算法是对称加密分组算法,密钥长64bit,其中56位参与运算,8位位校验位

2.1.2步骤

步骤大概分为三个过程,分别是初始置换、16轮迭代、逆置换

第一步:初始置换

根据初始置换表,对明文进行置换

将置换结果分为L0,R0,分别为32个bit

第二步:迭代

迭代过程:

L1=R0,R1=L0异或f(R0,子

英文原版书 部分目录 FOREWORD ix PREFACE xi ABOUT THE AUTHOR xvii CHAPTER 1 APERITIFS 1.1 The Lexicon of Cryptography 1 1.2 Cryptographic Systems 4 1.3 Cryptanalysis 4 1.4 Side Information 6 1.5 Thomas Jefferson and the M-94 6 1.6 Cryptography and History 7 1.7 Cryptography and Computers 8 1.8 The National Security Agency 9 1.9 The Giants 10 1.10 No Sex, Money, Crime or . . . Love 12 1.11 An Example of the Inference Process in Cryptanalysis 13 1.12 Warning! 15 CHAPTER 2 COLUMNAR TRANSPOSITION 2.1 Shannon’s Classification of Secrecy Transformations 18 2.2 The Rules of Columnar Transposition Encipherment 18 2.3 Cribbing 21 2.4 Examples of Cribbing 25 2.5 Plaintext Language Models 30 2.6 Counting k-Grams 33 2.7 Deriving the Parameters of a Markov Model from Sliding Window Counts 34 2.8 Markov Scoring 34 2.9 The ADFGVX Transposition System 47 2.10 CODA 49 2.11 Columnar Transposition Problems 50 CHAPTER 3 MONOALPHABETIC SUBSTITUTION 3.1 Monoalphabetic Substitution 63 3.2 Caesar’s Cipher 65 3.3 Cribbing Using Isomorphs 66 3.4 The x2-Test of a Hypothesis 67 3.5 Pruning from the Table of Isomorphs 68 3.6 Partial Maximum Likelihood Estimation of a Monoalphabetic Substitution 73 3.7 The Hidden Markov Model (HMM) 78 3.8 Hill Encipherment of ASCII N-Grams 90 3.9 Gaussian Elimination 102 3.10 Monoalphabetic Substitution Problems 111 CHAPTER 4 POLYALPHABETIC SUBSTITUTION 4.1 Running Keys 116 4.2 Blaise de Vigene`re 117 4.3 Gilbert S. Vernam 117 4.4 The One-Time Pad 119 4.5 Finding the Key of Vernam–Vigene`re Ciphertext with Known Period by Correlation 120 4.6 Coincidence 124 4.7 Venona 127 4.8 Polyalphabetic Substitution Problems 132 CHAPTER 5 STATISTICAL TESTS 5.1 Weaknesses in a Cryptosystem 136 5.2 The Kolmogorov–Smirnov Test 136 5.3 NIST’s Proposed Statistical Tests 138 5.4 Diagnosis 139 5.5 Statistical Tests Problems 143 CHAPTER 6 THE EMERGENCE OF CIPHER
评论 3
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值