期刊文献+

密码学在《网络安全协议》课程中的应用分析

Analysis on Application of Cryptography in the Course of Network Security Protocol
下载PDF
导出
摘要 网络安全协议是保障信息安全的重要技术,是以密码学为基础的通信协议。加密、消息验证码、数字签名、密钥协商与密钥传输等技术在不同的网络安全协议中被用于实现数据通信过程中的机密性、完整性、不可否认性和真实性。分析密码学相关技术在具体的安全协议中的应用是《网络安全协议》课程的授课重点。本文在深入研究各层网络安全协议原理的基础上,总结了对称加密和非对称两种加密体制、消息验证码和数字签名两种完整性保护技术在网络安全协议中的具体应用,还以IPSec协议为例分析了网络安全协议中的密钥协商机制。 As an important technology to ensure information security,network security protocol is a communication protocol based on the cryptography.Encryption,message authentication code,digital signature,key agreement and key transmission technology are used to achieve confidentiality,integrity,non-repudiation and authenticity during the process of data communication in different network security protocols.Analyzing the application of technologies related to the cryptography in specific security protocols is the teaching focus of the network security protocol course.Based on an in-depth study on the principles of network security protocols,specific applications of the encryption schemes(including the symmetric and the asymmetric)and the integrity protection technologies(including the message authentication code and the digital signature)in network security protocols are summarized in this paper.In addition,the key agreement mechanism in network security protocols is analyzed with the IPSec protocol as an example.
作者 范洁 池亚平 李冬冬 FAN Jie;Chi Yaping;Li Dongdong(Beijing Electronic Science and Technology Institute,Beijing 100070,P.R.China)
出处 《北京电子科技学院学报》 2020年第2期61-69,共9页 Journal of Beijing Electronic Science And Technology Institute
基金 国家重点研发计划项目:私有云环境下服务化智能办公系统平台(2018YFB1004100)
关键词 网络安全协议 加密 消息验证码 数字签名 密钥协商 network security protocol encryption message authentication code digital signature key agreement
  • 相关文献

参考文献2

二级参考文献29

  • 1Wang Xiao-Yun, Wang Lei, Jia Ke-Ting, Wang Mei-Qin. New distinguishing attack on MAC using secret-prefix method //Proceedings of Fast Software Encryption 2009. Leuven, Belgium, 2009:363-374.
  • 2Leurent G, Peyrin T, Wang Lei. New generic attacks against hash-based MACs//Proceedings of Advances in Cryptology-ASIACRYPT 2013, Part II. Bengaluru, India, 2013:1-20.
  • 3Shannon C. Communication theory o secrecy systems. Bell System Technical Journal, 1949, 28(4): 656-715.
  • 4Goldwasser S, Micali S. Probabilistic encryption. Journal of Computer and System Sciences, 1984, 28(2) : 270-299 B.
  • 5Bellare M, Kiliarty J, Rogaway P. The security o{ the cipher block chaining message authentication code. Journal of Computer and System Sciences, 2000, 61(3):362-399.
  • 6Bellare M, Kilian J, Rogaway P. The security of cipher block ehaining//Proceedings of Advances in Cryptology CRYPTO 1994. Santa Barbara, USA, 1994: 341-358.
  • 7Bellare M, Desai A, Jokipii E, Rogaway P. A concrete secu- rity treatment of symmetric encryption: Analysis of the DES modes of operation//Proceedings of the 38th Symposium on Foundations of Computer Science. Miami Beach, USA, 1997:394-403.
  • 8Rogaway P, Bellare M, Black J, Krovetz T. OCB: A block- cipher mode of operation for efficient authenticated encryption //Proceedings of the 8th ACM Conference on Computer and Communications Security. Philadelphia, USA, 2001:196-205.
  • 9Kohno T, Viega J, Whiting D. CWC: A high-performance conventional authenticated encryption mode//Proceedings of Fast Software Encryption 2004. Delhi, India, 2004:408-426.
  • 10Bellare M, Canetti R, Krawczyk H. Keying hash functions for message authentication//Proceedings of Advances in Cryptology-CRYPTO 1996. Santa Barbara, USA, 1996: 1-15.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部