2918.G密钥分散管理系统——密钥确认算法实现外文资料翻译原文.doc
《2918.G密钥分散管理系统——密钥确认算法实现外文资料翻译原文.doc》由会员分享,可在线阅读,更多相关《2918.G密钥分散管理系统——密钥确认算法实现外文资料翻译原文.doc(13页珍藏版)》请在三一办公上搜索。
1、 大学毕业设计(论文)外文资料翻译学院(系): 计算机学院 专业: 信息安全 学生姓名: 班级学号: 外文出处:WilliamStallings. Cryptography and Network Security, Fourth Edition. Prentice Hall. November 16, 2005附件:1.外文资料翻译译文;2.外文原文指导教师评语:指导教师签名:年月日外文资料翻译原文10.1. Key ManagementIn Chapter 7, we examined the problem of the distribution of secret keys. One
2、of the major roles of public-key encryption has been to address the problem of key distribution. There are actually two distinct aspects to the use of public-key cryptography in this regard:The distribution of public keysThe use of public-key encryption to distribute secret keysWe examine each of th
3、ese areas in turn.Distribution of Public KeysSeveral techniques have been proposed for the distribution of public keys. Virtually all these proposals can be grouped into the following general schemes:Public announcementPublicly available directoryPublic-key authorityPublic-key certificatesPublic Ann
4、ouncement of Public KeysOn the face of it, the point of public-key encryption is that the public key is public. Thus, if there is some broadly accepted public-key algorithm, such as RSA, any participant can send his or her public key to any other participant or broadcast the key to the community at
5、large (Figure 10.1). For example, because of the growing popularity of PGP (pretty good privacy, discussed in Chapter 15), which makes use of RSA, many PGP users have adopted the practice of appending their public key to messages that they send to public forums, such as USENET newsgroups and Interne
6、t mailing lists.Although this approach is convenient, it has a major weakness. Anyone can forge such a public announcement. That is, some user could pretend to be user A and send a public key to another participant or broadcast such a public key. Until such time as user A discovers the forgery and a
7、lerts other participants, the forger is able to read all encrypted messages intended for A and can use the forged keys for authentication (see Figure 9.3).Publicly Available DirectoryA greater degree of security can be achieved by maintaining a publicly available dynamic directory of public keys. Ma
8、intenance and distribution of the public directory would have to be the responsibility of some trusted entity or organization (Figure 10.2). Such a scheme would include the following elements:1.The authority maintains a directory with a name, public key entry for each participant.2.Each participant
9、registers a public key with the directory authority. Registration would have to be in person or by some form of secure authenticated communication.3.A participant may replace the existing key with a new one at any time, either because of the desire to replace a public key that has already been used
10、for a large amount of data, or because the corresponding private key has been compromised in some way.4.Participants could also access the directory electronically. For this purpose, secure, authenticated communication from the authority to the participant is mandatory.This scheme is clearly more se
11、cure than individual public announcements but still has vulnerabilities. If an adversary succeeds in obtaining or computing the private key of the directory authority, the adversary could authoritatively pass out counterfeit public keys and subsequently impersonate any participant and eavesdrop on m
12、essages sent to any participant. Another way to achieve the same end is for the adversary to tamper with the records kept by the authority.Public-Key AuthorityStronger security for public-key distribution can be achieved by providing tighter control over the distribution of public keys from the dire
13、ctory. A typical scenario is illustrated in Figure 10.3, which is based on a figure in POPE79. As before, the scenario assumes that a central authority maintains a dynamic directory of public keys of all participants. In addition, each participant reliably knows a public key for the authority, with
14、only the authority knowing the corresponding private key. The following steps (matched by number to Figure 10.3) occur:1. A sends a timestamped message to the public-key authority containing a request for the current public key of B.2. The authority responds with a message that is encrypted using th
15、e authoritys private key, PRauth Thus, A is able to decrypt the message using the authoritys public key. Therefore, A is assured that the message originated with the authority. The message includes the following:Bs public key, PUb which A can use to encrypt messages destined for BThe original reques
16、t, to enable A to match this response with the corresponding earlier request and to verify that the original request was not altered before reception by the authorityThe original timestamp, so A can determine that this is not an old message from the authority containing a key other than Bs current p
17、ublic key3. A stores Bs public key and also uses it to encrypt a message to B containing an identifier of A (IDA) and a nonce (N1), which is used to identify this transaction uniquely.4. B retrieves As public key from the authority in the same manner as A retrieved Bs public key.At this point, publi
18、c keys have been securely delivered to A and B, and they may begin their protected exchange. However, two additional steps are desirable:5. B sends a message to A encrypted with PUa and containing As nonce (N1) as well as a new nonce generated by B (N2) Because only B could have decrypted message (3
19、), the presence of N1 in message (6) assures A that the correspondent is B.6. A returns N2, encrypted using Bs public key, to assure B that its correspondent is A.Thus, a total of seven messages are required. However, the initial four messages need be used only infrequently because both A and B can
20、save the others public key for future use, a technique known as caching. Periodically, a user should request fresh copies of the public keys of its correspondents to ensure currency.Public-Key CertificatesThe scenario of Figure 10.3 is attractive, yet it has some drawbacks. The public-key authority
21、could be somewhat of a bottleneck in the system, for a user must appeal to the authority for a public key for every other user that it wishes to contact. As before, the directory of names and public keys maintained by the authority is vulnerable to tampering.An alternative approach, first suggested
22、by Kohnfelder KOHN78, is to use certificates that can be used by participants to exchange keys without contacting a public-key authority, in a way that is as reliable as if the keys were obtained directly from a public-key authority. In essence, a certificate consists of a public key plus an identif
23、ier of the key owner, with the whole block signed by a trusted third party. Typically, the third party is a certificate authority, such as a government agency or a financial institution, that is trusted by the user community. A user can present his or her public key to the authority in a secure mann
24、er, and obtain a certificate. The user can then publish the certificate. Anyone needed this users public key can obtain the certificate and verify that it is valid by way of the attached trusted signature. A participant can also convey its key information to another by transmitting its certificate.
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2918. 密钥 分散 管理 系统 确认 算法 实现 外文 资料 翻译 原文

链接地址:https://www.31ppt.com/p-2401651.html