Presentation is loading. Please wait.

Presentation is loading. Please wait.

資管三 C 網路建構實習課 加解密概念 3/18. 埃及人的故事 Every Egyptian received two names, which were known respectively as the true name and the good name, or the great name.

Similar presentations


Presentation on theme: "資管三 C 網路建構實習課 加解密概念 3/18. 埃及人的故事 Every Egyptian received two names, which were known respectively as the true name and the good name, or the great name."— Presentation transcript:

1 資管三 C 網路建構實習課 加解密概念 3/18

2 埃及人的故事 Every Egyptian received two names, which were known respectively as the true name and the good name, or the great name and the little name; and while the good or little name was made public, the true or great name appears to have been carefully concealed. —The Golden Bough, Sir James George Frazer

3 基本名詞 鑰匙( Key ) 公鑰( Public Key ) 私鑰( Private Key )

4 私鑰密碼學

5 traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications are compromised also is symmetric, parties are equal hence does not protect sender from receiver forging a message & claiming is sent by sender

6 公鑰密碼學

7 probably most significant advance in the 3000 year history of cryptography uses two keys – a public & a private key asymmetric since parties are not equal uses clever application of number theoretic concepts to function complements rather than replaces private key cryptography

8 公鑰密碼學 public-key/two-key/asymmetric cryptography involves the use of two keys: a public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures a private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures is asymmetric because those who encrypt messages or verify signatures cannot decrypt messages or create signatures

9 加密系統 對稱式 (Symmetric) ex:DES(Data Encryption Standard) 非對稱式 (Asymmetric) ex:RSA(Rivest-Shamir-Adelman)

10 DES Data Encryption Standard (DES) is a widely-used method of data encryption using a private (secret) key that was judged so difficult to break by the U.S. government that it was restricted for exportation to other countries.encryption Symmetric!

11 RSA RSA is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. The RSA algorithm is the most commonly used encryption and authentication algorithm and is included as part of the Web browsers from Microsoft and Netscape.encryptionalgorithmbrowser Asymmetric!

12 RSA 演算法 C=P e mod n P=C d mod n C: Ciphertext 密文 P: Plaintext 明文 e: Encryption 加密 d: Decryption 解密

13 RSA 範例 88 mod 187 = 1111 mod 187 = 88 Encryption KU = 7, 187 Decryption KR = 23, 187 Plaintext 88 Plaintext 88 Ciphertext 11 723 KU :公鑰 KR :私鑰

14 作業一 請將下列名詞,詳細加以介紹,並附上心得 digital certificate SSL(Secure Sockets Layer) SET(Secure Electronic Transaction) CA(Certificate Authority)


Download ppt "資管三 C 網路建構實習課 加解密概念 3/18. 埃及人的故事 Every Egyptian received two names, which were known respectively as the true name and the good name, or the great name."

Similar presentations


Ads by Google