Foundations of Network and Foundations of Network and Computer Security Computer Security
J John Black
Lecture #9 Sep 22nd 2005
CSCI 6268/TLEN 5831, Fall 2005
Foundations of Network and Foundations of Network and Computer - - PowerPoint PPT Presentation
Foundations of Network and Foundations of Network and Computer Security Computer Security J ohn Black J Lecture #9 Sep 22 nd 2005 CSCI 6268/TLEN 5831, Fall 2005 Announcements Midterm #1, next class (Tues, Sept 27 th ) All lecture
CSCI 6268/TLEN 5831, Fall 2005
T ← A << 5 + gt (B, C, D) + E + Kt + Wt Wt = { t-th word of Mi 0 ≤ t ≤ 15 ( Wt-3 ⊕ Wt-8 ⊕ Wt-14 ⊕ Wt-16 ) << 1 16 ≤ t ≤ 79 A ← H0
i-1; B ← H1 i-1; C ← H2 i-1; D ← H3 i-1; E ← H4 i-1
for t = 1 to 80 do E ← D; D ← C; C ← B >> 2; B ← A; A ← T H0
i ← Α + H0 i-1; H1 i ← A + H1 i-1; H2 i ← C+ H2 i-1;
H3
i ← D + H3 i-1; H4 i ← E + H4 i-1
end H0..4
i-1
not in SHA-0 M1, M1
’
E
Block Ciphers Hash Functions Hard Problems Stream Ciphers
Symmetric Encryption Digital Signatures MAC Schemes Asymmetric Encryption
SSH, SSL/TLS, IPSec Electronic Cash, Electronic Voting
mechanism outside our protocol
– In other words, a # b will be written ab – If some other symbol is conventional, we’ll use it instead (examples to follow)
– ab means aaaaLa repeated b times – a-b means a-1a-1a-1La-1 repeated b times – Here a ∈ G, b ∈ Z
– Meaning there are an infinite number of elements in them
*?
*?
*
*| = φ(m)
*, 28 = 256 = 1 mod 15
– 01011 ∈ {0,1}5, 0101132 = 0000016 =00000
Adversary Alice Bob’s Public Key Bob’s Private Key Bob Bob’s Public Key
*
*
*
*, Med =
31074182404900437213507500358885679300373460228427 27545720161948823206440518081504556346829671723286 78243791627283803341547107310850191954852900733772 4822783525742386454014691736602477652346609
take 10M USD to build and one year to run
– Some skepticism has been expressed
– Two large primes – Finding inverses mode φ(n)
– Computing Me mod n for large M, e, n
since then