密码算法与协议2密钥交换协议案例分析.ppt

密码算法与协议2密钥交换协议案例分析.ppt

  1. 1、本文档共46页,可阅读全部内容。
  2. 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
* * Passive Attacks For example, an eavesdropper might be able to determine the parity of K, viewing K as an integer, which would mean that the eavesdropper learns one bit of information. To exclude such possibilities we need the DDH assumption. We will now make this more precise. First we argue why we need to require that n is prime. Suppose n is not prime, say n = 2p’, where p’ is prime. For any element y ? G, we have ord(y) ? {1, 2, p’, 2p’} and ord(y) is easily computed. We have the following table, where each case occurs approximately with probability 1/4: * * Passive Attacks Hence, the order of the key K is biased, as Pr[ord(K) = p’] ? 3/4 and Pr[ord(K) = 2p’] ? 1/4. If K would be generated uniformly at random in G, then we would have Pr[ord(K) = p’] ? Pr[ord(K) = 2p’] ? 1/2. Such a slight deviation in the distribution of K seems innocent. However, suppose key K is used to encrypt a 1-bit message, say m ?R {1, g}, using c = mK as ciphertext (like the one-time pad construction). In that case, an eavesdropper would compute ord(c). If ord(c) = p then most likely m = 1, and if ord(c) = 2p then most likely m = g. * * Passive Attacks Exercise: Argue that the DDH assumption is false when n contains a small prime factor. * * Passive Attacks So, assume that n is prime. BTW, if an eavesdropper would be able to determine any partial information on key K, then we would get a contradiction with the DDH assumption. * * A Practical Variant We now consider the Diffie-Hellman protocol as above, except that the key K is defined as follows: K = H(gxAxB), where H is a cryptographic hash function. Clearly, both parties are still able to compute K by first computing gxy and then applying H. A practical choice for H is the standardized SHA-1 hash function. * * A Practical Variant The reason for using a hash function H is that even though gxAxB will have a sufficient amount of entropy, it cannot be simply used as an AES key, for example. The value

文档评论(0)

1112111 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档