Terminologies in this Class:
- Confidentiality, Integrity, Authenticity etc.
- 安全三要素:保密性、完整性、认证性(真实性)
Communication System Security
Communication system security is achieved in two aspects:
- Make each node a trusted platform: robust hardware, validated system software, authorized applications.
- Protect communications on each link: mutual authentication, key establishment, cipher suite negotiation, failure detection.
课堂笔记
Diffie-Hellman key exchange (DH)
用于在两个终端之间共享一个私密的数字:
此时两个终端直接就共享了一个私密信息:$$\displaystyle g^{X_A X_B}\pmod{p}$$
public-key crypto-systems (RSA)
The keys for the RSA algorithm are generated the following way:
- Choose two distinct prime numbers
p
andq
- For security purposes, the integers
p
andq
should be chosen at random, and should be similar in magnitude but differ in length by a few digits to make factoring harder.[2] Prime integers can be efficiently found using a primality test.
- For security purposes, the integers
- Compute
n = pq
- n is used as the modulus for both the public and private keys. Its length, usually expressed in bits, is the key length.
- Compute $$\phi(n) = lcm(\phi(p), \phi(q)) = lcm(p − 1, q − 1)$$, where $$\phi$$ is Carmichael’s totient function. This value is kept private.
- Choose an integer e such that 1 < e < λ(n) and gcd(e, λ(n)) = 1; i.e., e and λ(n) are coprime.
- Determine d as d ≡ e−1 (mod λ(n)); i.e., d is the modular multiplicative inverse of e modulo λ(n).