crypto

Upload: mario-dumitru

Post on 02-Nov-2015

223 views

Category:

Documents


1 download

DESCRIPTION

Criptografie si securitate - curs Unibuc, FMI

TRANSCRIPT

  • 1

    WEP

  • 2

    SECURITATE SEMANTICA INTERCEPTARE SIMPLA

    SECURITATE SEMANTICA INTERCEPTARE MULTIPLA

  • 3

    DEM

    SISTEME DE CRIPTARE BLOC

    PRP

  • 4

    PRF

  • 5

  • 6

    Sisteme bloc ca PRP

    Cum punem PRP in practica?

    RETELE DE SUBSTITUTIE-PERMUTARE

  • 7

  • 8

  • 9

    DES - Data Encryption Standard

  • 10

  • 11

  • 12

  • 13

    AES - Advanced Encryption Standard

    Securitate CPA si CCA

  • 14

  • 15

    Coduri de autentificare a mesajelor

  • 16

  • 17

  • 18

  • 19

    Scheme de criptare CCA sigure

  • 20

    CONFIDENTIALITATE SI AUTENTIFICAREA MESAJELOR

  • 21

  • 22

    FUNCTII HASH

  • 23

  • 24

  • 25

  • 26

    STOCAREA PAROLELOR

  • 27

    MD5

  • 28

  • 29

    Keccak

    HMAC

  • 30

    Atacuri de timp pentru MAC-uri

  • 31

    CRIPTOGRAFIA ASIMETRICA

  • 32

  • 33

    PREZUMTII CRIPTOGRAFICE DIFICILE

  • 34

  • 35

    NOTIUNI DE SECURITATE IN CRIPTOGRAFIA

    ASIMETRICA

  • 36

  • 37

    PERMUTARI CU TRAPA SECRETA

  • 38

  • 39

    RSA

  • 40

    PKCS

  • 41

    Despre problema logaritmului discret

  • 42

  • 43

  • 44

  • 45

    Sistemul de Criptare ElGamal

  • 46

  • 47

  • 48

  • 49

  • 50

    SISTEME ISTORICE DE CRIPTARE

    RAIL FENCE

    MONO CAESAR

    POLI PLAYFARE, HILL, VIGENERE

    PRINCIPIILE DE LA BAZA CRIPTOGRAFIEI MODERNE

  • 51

    SECURITATEA PERFECTA

    OTP (one time pad)

    CRIPTOGRAFIE COMPUTATIONALA

    Securitate perfecta (Scheme informational-teoretic sigure)

    vs. Criptografia computationala

    Sec perf nu e practica...

  • 52

    SISTEME FLUIDE

    SISTEME FLUIDE:

    PRG

    SECURITATE INTERCEPTARE UNICA

    Demonstratie intuitiva

  • 53

    SECURITATE- INTERCETARE MULTIPLA

    MOD SINCRONIZAT

    MOD NESINCRONIZAT

  • 54

    Contents WEP .......................................................................................................................................1

    SECURITATE SEMANTICA INTERCEPTARE SIMPLA .....................................................2

    SECURITATE SEMANTICA INTERCEPTARE MULTIPLA ................................................2

    DEM .......................................................................................................................................3

    SISTEME DE CRIPTARE BLOC .............................................................................................3

    PRP.........................................................................................................................................3

    PRF .........................................................................................................................................4

    Sisteme bloc ca PRP............................................................................................................6

    Cum punem PRP in practica?............................................................................................6

    RETELE DE SUBSTITUTIE-PERMUTARE ............................................................................6

    DES - Data Encryption Standard .......................................................................................9

    AES - Advanced Encryption Standard ........................................................................... 13

    Securitate CPA si CCA ...................................................................................................... 13

    Coduri de autentificare a mesajelor ............................................................................. 15

    Scheme de criptare CCA sigure ..................................................................................... 19

    CONFIDENTIALITATE SI AUTENTIFICAREA MESAJELOR ............................................. 20

    FUNCTII HASH ................................................................................................................... 22

    STOCAREA PAROLELOR ................................................................................................... 26

    MD5 .................................................................................................................................... 27

    Keccak ................................................................................................................................ 29

    HMAC ................................................................................................................................. 29

    Atacuri de timp pentru MAC-uri ................................................................................... 30

    CRIPTOGRAFIA ASIMETRICA........................................................................................... 31

    PREZUMTII CRIPTOGRAFICE DIFICILE ........................................................................... 33

    PERMUTARI CU TRAPA SECRETA................................................................................... 37

    RSA...................................................................................................................................... 39

    PKCS.................................................................................................................................... 40

    Despre problema logaritmului discret ......................................................................... 41

    Sistemul de Criptare ElGamal ........................................................................................ 45

    SISTEME ISTORICE DE CRIPTARE ................................................................................... 50

    RAIL FENCE ........................................................................................................................ 50

    MONO CAESAR.............................................................................................................. 50

    POLI PLAYFARE, HILL, VIGENERE ................................................................................ 50

    PRINCIPIILE DE LA BAZA CRIPTOGRAFIEI MODERNE ................................................. 50

    SECURITATEA PERFECTA ................................................................................................. 51

    OTP (one time pad).......................................................................................................... 51

    CRIPTOGRAFIE COMPUTATIONALA .............................................................................. 51

    SISTEME FLUIDE ............................................................................................................... 52

    SISTEME FLUIDE: .............................................................................................................. 52

    PRG ..................................................................................................................................... 52

    SECURITATE INTERCEPTARE UNICA........................................................................... 52

    SECURITATE- INTERCETARE MULTIPLA ........................................................................ 53

    MOD SINCRONIZAT.......................................................................................................... 53

    MOD NESINCRONIZAT ..................................................................................................... 53