(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

Similar documents
Block cipher

°Å¹æµ»½Ñ¤Î¿ôÍý¤È¤·¤¯¤ß --- ¥á¡¼¥ë¤Ç¤¸¤ã¤ó¤±¤ó¡©¤¹¤ëÊýË¡ ---

( )

21 Key Exchange method for portable terminal with direct input by user


C02.pdf

YMS-VPN1_User_Manual

つるい27-5月号PDF.indd

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

RSA署名方式の安全性を巡る研究動向について

RSA FA FA AND Booth FA FA RSA 3 4 5

Test 1

広報あさぎり27年8月.indd

ISO/IEC 9798プロトコルの安全性評価

JST CREST at JST CREST 1

7,, i

IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPs

ASF-01

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

forum.dvi



将来の暗号技術に関する安全性要件調査報告書

楕円曲線暗号と RSA 暗号の安全性比較

mahoro/2011autumn/crypto/

PDFŠp…f†[…^


ATR-01-D


2 key. 3

katagaitai workshop winter

_CS5.indd

土壌環境行政の最新動向(環境省 水・大気環境局土壌環境課)

syuryoku

資料4-1 一時預かり事業について

1 IPA Hierocrypt-L1 Hierocrypt-L Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 2 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-



1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

馬 場 良 始 90 平文 : book 暗号文 : errn となる. 単純に文字をずらすシーザー暗号は改良され, 文字の置き換え表を作り, それに従って暗号化 復 号をする換字式暗号が作られた. しかし, ある文字を単に別の文字に置き換えるような換字式暗号 は, 頻度分析により簡単に解読される.

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra


通信プロトコルの認証技術

平成13年度 地域工業活性化支援事業報告書(多摩全域)

はたらく若者ハンドブック


katagami No.65

新善-1208

Transcription:

(Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1

(Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1

(obstructions for safe communication) (obstruction) (DoS ) (tapping) (tampering) (disguise) etc. I 2

DoS (Denial-of-service attack) A B E B E I 3

DoS (Denial-of-service attack) A B E B E I 3

DoS (Denial-of-service attack) A B E distributed denial-of-service attack (DDos) I 4

(tapping) A P P B E P I 5

(tapping) A P P B E P I 5

(secret communication) A B P E? P P: (plain text), : (ciphertext) P : (encryption) P : (decryption) (cryptanalysis) I 6

(tampering) A B P E P A (authentication), (digital signature) I 7

(disguise) A B E P P A (authentication), (digital signature) I 8

(disguise) A B E P P A (authentication), (digital signature) I 8

(cryptography) A B P E? P A P B P E P B I 9

(cryptography) A B P E? P A P B P E P B I 9

(cryptography) Assumption: open channels (being tapped) ( ) open cryptographic system (symmetric-key cryptography) ( ) (public-key cryptography) I 10

(cryptography) Assumption: open channels (being tapped) ( ) open cryptographic system (symmetric-key cryptography) ( ) (public-key cryptography) I 10

(cryptography) ( ) ( ) ( ) I 11

(symmetric-key cryptography) substitution ciphers ( ) aesar cipher linear block ciphers ( ) Vernam ciphers (one-time pad) DES (Data Encryption Standard) AES (Advances Encryption Standard) I 12

Ex. aesar cipher (aesar ) Key ( ) : n Z/26Z Encryption ( ) : n-shift backward Decryption ( ) : n-shift forward XYZABDEFGHIJKLMN OPQRSTUVWXYZAB : n =? :????? KHOOR I 13

Ex. aesar cipher (aesar ) Key ( ) : n Z/26Z Encryption ( ) : n-shift backward Decryption ( ) : n-shift forward XYZABDEFGHIJKLMN OPQRSTUVWXYZAB : n = 3 : HELLO KHOOR I 13

aesar (Weakness of aesar cipher) DES (Deta Encryption Standard) AES (Advanced Encryption Standard) I 14

aesar (Weakness of aesar cipher) DES (Deta Encryption Standard) AES (Advanced Encryption Standard) I 14

( ) (preperties of symmetric-key cryptography) The encryption key and the decryption key are the same. (simple, fast) (need key-sharing) (need a different key for each pair) I 15

: ( ) (1976 77) I 16

: ( ) (1976 77) I 16

: ( ) (1976 77) I 16

(Public-key cryptography) ( ) ( ) The encryption key and the decryption key are different. (No need key-sharing in advance) (authentication) (signature) (non-repudiation) I 17

(Public-key cryptography) ( ) ( ) The encryption key and the decryption key are different. (No need key-sharing in advance) (authentication) (signature) (non-repudiation) I 17

(Public-key cryptography) ( ) ( ) The encryption key and the decryption key are different. (No need key-sharing in advance) (authentication) (signature) (non-repudiation) I 17

(Public-key cryptography) (slow) (first share a secret key under public-key cryptosystem) (then communicate with the key under secret-key cryptosystem) I 18

A e public: e B d P E? P secret: d I 19

A public: e B e d P E? P secret: d A (signature) I 20

(signature) A public: e d P E? secret: d B e P I 21

(signature) d A public: e B e P E? P secret: d E P I 22

(signature) M M (hash value) h(m) A S M B I 23

(signature) A public: e A public: e B B S d A h(m) M secret: d A e B d B ea S M h(m) secret: d B I 24

(preperties of public-key cryptography) (Everyone can encrypt.) (Decryption requires the secret key.) ( )?!! ( ) I 25

(preperties of public-key cryptography) (Everyone can encrypt.) (Decryption requires the secret key.) ( )?!! ( ) I 25

(preperties of public-key cryptography) (Everyone can encrypt.) (Decryption requires the secret key.) ( )?!! ( ) I 25

(preperties of public-key cryptography) (Everyone can encrypt.) (Decryption requires the secret key.) ( ) (use of problems hard to compute) (prime decomposition) (discrete logarithm) I 26

(public-key cryptosystems) RSA cryptosystem (Rivest-Shamir-Adleman) Diffie-Hellman key-exchange ( ) ElGamal encryption I 27

(public-key cryptosystems) RSA cryptosystem (Rivest-Shamir-Adleman) Diffie-Hellman key-exchange ( ) ElGamal encryption I 27

: RSA Rivest, Shamir, Adleman (1977) p, q n = pq n e d n e d n e d n n = pq ( ) I 28