(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1
|
|
|
- ゆたか よしなが
- 6 years ago
- Views:
Transcription
1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1
2 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1
3 (obstructions for safe communication) (obstruction) (DoS ) (tapping) (tampering) (disguise) etc. I 2
4 DoS (Denial-of-service attack) A B E B E I 3
5 DoS (Denial-of-service attack) A B E B E I 3
6 DoS (Denial-of-service attack) A B E distributed denial-of-service attack (DDos) I 4
7 (tapping) A P P B E P I 5
8 (tapping) A P P B E P I 5
9 (secret communication) A B P E? P P: (plain text), : (ciphertext) P : (encryption) P : (decryption) (cryptanalysis) I 6
10 (tampering) A B P E P A (authentication), (digital signature) I 7
11 (disguise) A B E P P A (authentication), (digital signature) I 8
12 (disguise) A B E P P A (authentication), (digital signature) I 8
13 (cryptography) A B P E? P A P B P E P B I 9
14 (cryptography) A B P E? P A P B P E P B I 9
15 (cryptography) Assumption: open channels (being tapped) ( ) open cryptographic system (symmetric-key cryptography) ( ) (public-key cryptography) I 10
16 (cryptography) Assumption: open channels (being tapped) ( ) open cryptographic system (symmetric-key cryptography) ( ) (public-key cryptography) I 10
17 (cryptography) ( ) ( ) ( ) I 11
18 (symmetric-key cryptography) substitution ciphers ( ) aesar cipher linear block ciphers ( ) Vernam ciphers (one-time pad) DES (Data Encryption Standard) AES (Advances Encryption Standard) I 12
19 Ex. aesar cipher (aesar ) Key ( ) : n Z/26Z Encryption ( ) : n-shift backward Decryption ( ) : n-shift forward XYZABDEFGHIJKLMN OPQRSTUVWXYZAB : n =? :????? KHOOR I 13
20 Ex. aesar cipher (aesar ) Key ( ) : n Z/26Z Encryption ( ) : n-shift backward Decryption ( ) : n-shift forward XYZABDEFGHIJKLMN OPQRSTUVWXYZAB : n = 3 : HELLO KHOOR I 13
21 aesar (Weakness of aesar cipher) DES (Deta Encryption Standard) AES (Advanced Encryption Standard) I 14
22 aesar (Weakness of aesar cipher) DES (Deta Encryption Standard) AES (Advanced Encryption Standard) I 14
23 ( ) (preperties of symmetric-key cryptography) The encryption key and the decryption key are the same. (simple, fast) (need key-sharing) (need a different key for each pair) I 15
24 : ( ) ( ) I 16
25 : ( ) ( ) I 16
26 : ( ) ( ) I 16
27 (Public-key cryptography) ( ) ( ) The encryption key and the decryption key are different. (No need key-sharing in advance) (authentication) (signature) (non-repudiation) I 17
28 (Public-key cryptography) ( ) ( ) The encryption key and the decryption key are different. (No need key-sharing in advance) (authentication) (signature) (non-repudiation) I 17
29 (Public-key cryptography) ( ) ( ) The encryption key and the decryption key are different. (No need key-sharing in advance) (authentication) (signature) (non-repudiation) I 17
30 (Public-key cryptography) (slow) (first share a secret key under public-key cryptosystem) (then communicate with the key under secret-key cryptosystem) I 18
31 A e public: e B d P E? P secret: d I 19
32 A public: e B e d P E? P secret: d A (signature) I 20
33 (signature) A public: e d P E? secret: d B e P I 21
34 (signature) d A public: e B e P E? P secret: d E P I 22
35 (signature) M M (hash value) h(m) A S M B I 23
36 (signature) A public: e A public: e B B S d A h(m) M secret: d A e B d B ea S M h(m) secret: d B I 24
37 (preperties of public-key cryptography) (Everyone can encrypt.) (Decryption requires the secret key.) ( )?!! ( ) I 25
38 (preperties of public-key cryptography) (Everyone can encrypt.) (Decryption requires the secret key.) ( )?!! ( ) I 25
39 (preperties of public-key cryptography) (Everyone can encrypt.) (Decryption requires the secret key.) ( )?!! ( ) I 25
40 (preperties of public-key cryptography) (Everyone can encrypt.) (Decryption requires the secret key.) ( ) (use of problems hard to compute) (prime decomposition) (discrete logarithm) I 26
41 (public-key cryptosystems) RSA cryptosystem (Rivest-Shamir-Adleman) Diffie-Hellman key-exchange ( ) ElGamal encryption I 27
42 (public-key cryptosystems) RSA cryptosystem (Rivest-Shamir-Adleman) Diffie-Hellman key-exchange ( ) ElGamal encryption I 27
43 : RSA Rivest, Shamir, Adleman (1977) p, q n = pq n e d n e d n e d n n = pq ( ) I 28
Block cipher
18 12 9 1 2 1.1............................... 2 1.2.................. 2 1.3................................. 4 1.4 Block cipher............................. 4 1.5 Stream cipher............................
°Å¹æµ»½Ñ¤Î¿ôÍý¤È¤·¤¯¤ß --- ¥á¡¼¥ë¤Ç¤¸¤ã¤ó¤±¤ó¡©¤¹¤ëÊýË¡ ---
.... 1 22 9 17 1 / 44 1 (9/17) 2 (10/22) P2P 3 (11/12) 2 / 44 ogawa is.uec.ac.jp http://www.quest.is.uec.ac.jp/ogawa/ http://www.is.uec.ac.jp/ 3 / 44 ARPANet (1969) 4 / 44 M. Blum ( ), Coin Flipping by
( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
( 9 1 ) 1 2 1.1................................... 2 1.2................................................. 3 1.3............................................... 4 1.4...........................................
C02.pdf
/ 1999 12 14 Internet Week 99 Internet Week 99 1999 Yu Inamura, Japan Network Information Center 1 2 2000 1. 2. 3. 4. 1976 5. 1993 2.1 N!! N 2.2 1976 Shannon ConfusionDiffusion 2 SPN Substitution Permutation
YMS-VPN1_User_Manual
YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows
<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>
2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................
RSA署名方式の安全性を巡る研究動向について
RSA RSA RSA RSA RSA RSA PSSRSA PSS RSARSA PSS RSA PSS RSARSA-PSS E-mail:[email protected] RSARSA PKCS ISO ISO IPS ANS X RSARSA RSA RSA RSA RSA RSA RSA bit RSA RSA PSS RSA PSS RSA ISO PKCSVer RSA
RSA FA FA AND Booth FA FA RSA 3 4 5
RSA High-Speed Multiplication for RSA ode using Redundant Binary System 6585 6 6 RSA FA FA AND Booth FA FA RSA 3 4 5 This paper summarizes High-Speed Multiplication for RSA ode using Redundant Binary System,
Test 1
PowerBuilder Engineering, Information Technology and Solutions Group ... 3 PBCrypto... 3 PowerBuilder Exception JCE Exceptions... 4 PBCrypto... 4 PBCrypto API... 5 CreateRSAKeyPair... 5 DecryptCipherTextUsingBlockCipher...
ISO/IEC 9798プロトコルの安全性評価
ISO/IEC 9798 2011 2 4 ISO/IEC 9798-2 (Mechanisms using symmetric encipherment algorithms), ISO/IEC 9798-3 (Mechanisms using digital signature techniques), ISO/IEC 9798-4 (Mechanisms using a cryptographic
JST CREST at JST CREST 1
JST CREST at JST CREST 1 NP 2 3 I F q : q F q [x 1,..., x k ]: F q x 1,..., x k : k p = (p 1,..., p k ) T F k q : n c = (c 1,..., c n ) T F n q T : x 1,..., x k n E(x) F q [x 1,..., x k ] n : p c c = E(p)
7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPs
IPSEC VPN IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE 1 2 2 IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPsec SA IKE Initiator Responder IPsec-VPN ISAKMP
ASF-01
暗号モジュール試験及び認証制度 (JCMVP) 承認されたセキュリティ機能に関する仕様 平成 26 年 4 月 1 日独立行政法人情報処理推進機構 ASF-01 A p p r o v e d S e c u r i t y F u n c t i o n s 目次 1. 目的... 1 2. 承認されたセキュリティ機能... 1 公開鍵... 1 共通鍵... 3 ハッシュ... 4 メッセージ認証...
A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member
A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member (University of Tsukuba), Yasuharu Ohsawa, Member (Kobe
forum.dvi
Web 1 Winny (P2P ) ( ) Windows 1.1 Windows (CIFS: Common Internet File System) CIFS Microsoft OS Windows XP 1 Windows LAN CIFS 1.2 CIFS ( ) ( OS ) Apache Apache Microsoft IIS OS Unix Apache Apache OS Unix
2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70
将来の暗号技術に関する安全性要件調査報告書
i ... 1... 3... 4 DES... 4 DES Cracker (1998 )... 4... 6 3.3.1 Lenstra & Verheul1999... 6 3.3.2 2000... 10 3.3.3 Silverman2000... 12... 12... 13... 13... 14... 17... 18... 18 5.1.1... 18 5.1.2... 18 5.1.3...
楕円曲線暗号と RSA 暗号の安全性比較
RSA, RSA RSA 7 NIST SP-7 Neal Koblitz Victor Miller ECDLP (Elliptic Curve Discrete Logarithm Problem) RSA Blu-ray AACS (Advanced Access Control System) DTCP (Digital Transmission Content Protection) RSA
mahoro/2011autumn/crypto/
http://www.ss.u-tokai.ac.jp/ mahoro/2011autumn/crypto/ 1 1 2011.9.29, ( ) http://www.ss.u-tokai.ac.jp/ mahoro/2011autumn/crypto/ 1.1 1.1.1 DES MISTY AES 1.1.2 RSA ElGamal 2 1 1.2 1.2.1 1.2.2 1.3 Mathematica
PDFŠp…f†[…^
DIGITAL IMAGING SYSTEM DICOM Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview NEMA Part 4 Service Class Specifications Part 3 Information Object
By Kenji Kinoshita, I taru Fukuda, Taiji Ota A Study on the Use of Overseas Construction Materials There are not few things which are superior in the price and the aspect of the quality to a domestic
ATR-01-D
(JCMVP) 24 2 29 ATR-01-D Cryptographic Algorithm Implementation Testing Requirements 1 1 1.1....................... 1 1.2....................................... 2 2 3 2.1.....................................
1 2 3 4 5 1 1 136 2 137 2 1 1 138 2 1 2 139 140 141 142 3 143 3 144 145 4 1 2 146 3 4 147 5 1 2 3 148 1 2 149 3 5 1 2 150 3 151 1 152 2 153 6 1 2 154 3 155 4 1 156 2 3 4 5 157 7 1 2 3 4 158 5 159 6 8 1
katagaitai workshop winter
katagaitai workshop 2018 winter 0CTF Finals: Authentication & Secrecy Shiho Midorikawa Shiho Midorikawa katagaitai workshop winter March 18, 2018 1 / 142 Introduction Introduction Shiho Midorikawa katagaitai
土壌環境行政の最新動向(環境省 水・大気環境局土壌環境課)
201022 1 18801970 19101970 19201960 1970-2 1975 1980 1986 1991 1994 3 1999 20022009 4 5 () () () () ( ( ) () 6 7 Ex Ex Ex 8 25 9 10 11 16619 123 12 13 14 5 18() 15 187 1811 16 17 3,000 2241 18 19 ( 50
syuryoku
248 24622 24 P.5 EX P.212 2 P271 5. P.534 P.690 P.690 P.690 P.690 P.691 P.691 P.691 P.702 P.702 P.702 P.702 1S 30% 3 1S 3% 1S 30% 3 1S 3% P.702 P.702 P.702 P.702 45 60 P.702 P.702 P.704 H17.12.22 H22.4.1
1 IPA Hierocrypt-L1 Hierocrypt-L Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 2 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-
Hierocrypt-L1 : Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Abstract: In this report, we address our security evaluation of Hierocrypt-L1. As a result, we found no critical security flaw during the limited
1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush
PKI LAN EDB/PKI and Campus Wireless LAN Authentication EDB/PKI http://web.db.tokushima-u.ac.jp/edb-manual/pki.html http://ldap.db.tokushima-u.ac.jp/wireless/ @. E-mail: [email protected] Id: itrc20th-20061005.tex,v
/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR
for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web
馬 場 良 始 90 平文 : book 暗号文 : errn となる. 単純に文字をずらすシーザー暗号は改良され, 文字の置き換え表を作り, それに従って暗号化 復 号をする換字式暗号が作られた. しかし, ある文字を単に別の文字に置き換えるような換字式暗号 は, 頻度分析により簡単に解読される.
44 2015 89 2015 3 31 2014, RSA, 17,. (,,.),,.,,, RSA, RSA, RSA.,,, RSA I. 1.,, (,,, 3 ),., IC ( IC ),.,.,,.,.,. ( ) :. :. :,. (, ( ) ) :,. :,. (,, 3.) II.. (,.),.,., (, ),., 3 馬 場 良 始 90 平文 : book 暗号文
IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
1 2 1.1............................................ 3 1.2.................................... 7 1.3........................................... 9 1.4..
2010 8 3 ( ) 1 2 1.1............................................ 3 1.2.................................... 7 1.3........................................... 9 1.4........................................
通信プロトコルの認証技術
PKI IPsec/SSL IETF (http://www.netcocoon.com) 2004.12.9 IPsec ESP,AH,IPComp DOI:SA IKE SA ISAKMP IKE ESP IKE AH DOI Oakley ISAKMP IPComp SKEME IPsec IPv4TCP + IPv6TCP + IPv4 AH TCP + IPv6 AH + TCP IPv4
2008 (2008/09/30) 1 ISBN 7 1.1 ISBN................................ 7 1.2.......................... 8 1.3................................ 9 1.4 ISBN.............................. 12 2 13 2.1.....................
