mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 14:54:05 -06:00
vault backup: 2022-10-20 12:50:02
This commit is contained in:
parent
8fa0c6896b
commit
9c1a29a2b7
@ -82,9 +82,36 @@ RSA
|
|||||||
- encrypt message m (<n)
|
- encrypt message m (<n)
|
||||||
- $c = m^e\mod n$
|
- $c = m^e\mod n$
|
||||||
- decrypt recieved c
|
- decrypt recieved c
|
||||||
- $c = m^e\mod n$
|
- $m = c^d\mod n$
|
||||||
|
- magic
|
||||||
|
- $m = (m^e \mod n)^d \mod n$
|
||||||
|
- where $c = m^e\mod n$
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
# Authentication of devices
|
# Authentication of devices
|
||||||
|
- AP2.0 athenticate based on IP: bad because can spoof IP
|
||||||
|
- AP3.0 put secret password into each packet: bad because trudy can get a message and see the password
|
||||||
|
- replay attack
|
||||||
|
- can find password without decrypting
|
||||||
|
- AP4.0 avoid replay attack:
|
||||||
|
- nonce: number R used only once-in-a-lifetime
|
||||||
|
- prove alice "live", Bob sends alice nonce, R
|
||||||
|
- alice must return R, encrypted with shared key
|
||||||
|
- 
|
||||||
|
- problems
|
||||||
|
- must choose a key in a secure way before they communicate
|
||||||
|
- AP5.0: use nonce but with public key techniques
|
||||||
|
- problem: man in the middle attack: trudy poses as alice to bob, and as bob to alice
|
||||||
|
- 
|
||||||
|
- need a better way to get public key
|
||||||
|
- Digital signatures
|
||||||
|
- analogous to hand-signatures
|
||||||
|
- sender digitally signs a document
|
||||||
|
- verifiable, nonforgeable
|
||||||
|
- simple digital signature
|
||||||
|
- bob signs with his private key: creating signed message
|
||||||
|
-
|
||||||
|
|
||||||
|
|
||||||
# digital signature
|
# digital signature
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user