标签:network
2.1 Symmetric Key
substitution cipher: encryption on a side, decryption on another side.
DES: Data Encryption Standard
56-bit symmetric key 64-bit plaintext input
AES: Advanced Encryption Standard
A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity).-- From WikiHash H(m) first, then sign it Ks(H(m))
Send both clear message m and Ks(H(m)) to receiver. Receiver Hash m and decrypt H(m), to compare them whether they are same.
Certification Authorities
The third company to verify the public key of Bob‘s.
Other method can be attacked by other host playback process.
5.1 Secrecy
sender:1. random symmetric private key, Ksy2. message m, Ks(m)3. use receiver‘s public key to encrypt the Ks, Kry(Ks)4. send both Ksy(m) and Kr(Ks) to receiver
receiver:1. Use own public key to decrypt the Ksy2. Use Ksy to decrypt message m
5.2 Sender Authentication
sender:1. sign the message m2. send both clear message m and signed message Ksen(H(m))receiver:decrypt the signed message.
5.3 Combination
Three Keys: sender sign key, receiver public key, symmetric key
6.1 Service
6.2 ProcessTwo parts: Client/Server authentication, data encryption
1. HandshakeEstablish TCP connectionAuthentication2. Key Derivation4 keysMAC key and encrption key3. Data Transfercompute MACencrypt data and MACform SSL format record
6.3 Mechanism
Apply for key for encryption and keep secret between server and client.
WEP
[Network]Network Security,布布扣,bubuko.com
标签:network
原文地址:http://blog.csdn.net/toomatoo/article/details/29249371