Encryption and VPN TechnologyWord文档格式.docx

上传人:b****5 文档编号:15710289 上传时间:2022-11-15 格式:DOCX 页数:30 大小:1.32MB
下载 相关 举报
Encryption and VPN TechnologyWord文档格式.docx_第1页
第1页 / 共30页
Encryption and VPN TechnologyWord文档格式.docx_第2页
第2页 / 共30页
Encryption and VPN TechnologyWord文档格式.docx_第3页
第3页 / 共30页
Encryption and VPN TechnologyWord文档格式.docx_第4页
第4页 / 共30页
Encryption and VPN TechnologyWord文档格式.docx_第5页
第5页 / 共30页
点击查看更多>>
下载资源
资源描述

Encryption and VPN TechnologyWord文档格式.docx

《Encryption and VPN TechnologyWord文档格式.docx》由会员分享,可在线阅读,更多相关《Encryption and VPN TechnologyWord文档格式.docx(30页珍藏版)》请在冰豆网上搜索。

Encryption and VPN TechnologyWord文档格式.docx

EncryptionandVPNTechnology@#@ @#@@#@EncryptionandVPNTechnology@#@Symmetricalencryption@#@Figureshowssymmetricalencryption,whichisalsoknownassecretkeyencryption.SymmetricalencryptionisusedforlargevolumesofdatasinceasymmetricalencryptionismuchmoreCPUintensive.ThethreeencryptionalgorithmsavailableintheIOSincludeDigitalEncryptionStandard(DES),TripleDES(3DES),andAdvancedEncryptionStandard(AES).@#@DESisoneofthemostwidelyusedstandards.DESturnscleartextintociphertextthroughanencryptionalgorithm.Thedecryptionalgorithmontheremoteendrestorescleartextfromciphertext.Keysenabletheencryptionanddecryption.DESisthemostwidelyusedsymmetricencryptionschemetoday.Itoperateson64-bitmessageblocks.Thealgorithmusesaseriesofstepstotransform64-inputbitsinto64-outputbits.Inthestandardform,thealgorithmuses64-bitkeys.56ofthese64-bits,arechosenrandomly.Theremaining8bitsareparitybits,oneforeach7-bitblockofthe56-bitrandomvalue.@#@3DESisanalternativetoDESthatpreservestheexistinginvestmentinsoftwarebutmakesabrute-forceattackmoredifficult.3DEStakesa64-bitblockofdataandperformstheoperationsofencrypt,decrypt,andencrypt.3DEScanuseone,two,orthreedifferentkeys.Theadvantageofusingonekeyisthat3DESwithonekeyisthesameasstandardDESforbackwardcompatibility.However,additionalprocessingtimeisrequiredwithonekey.BoththeDESand3DESalgorithmsareinthepublicdomainandfreelyavailable.TheUSGovernmentrestrictsexportof3DEStechnologyandmanyothergovernmentsrestrictencryptiontechnologywithintheirownboundariessotheymaymonitorcommunications.@#@AESisanewerencryptionalgorithm.Itcurrentlyspecifieskeyswithalengthof128,192,or256bitstoencryptblockswithalengthof128,192,or256bits.Allninecombinationsofkeylengthandblocklengtharepossible.AESisnowavailableinthelatestCiscorouterimagesthathaveIPSecDES/3DESfunctionality.@#@Themostimportantfeatureofacryptographicalgorithmisitssecurityagainstbeingcompromised.Thesecurityofacryptosystem,orthedegreeofdifficultyforanattackertodeterminethecontentsoftheciphertext,isafunctionofafewvariables.Inmostprotocols,thecornerstonetosecurityliesinthesecrecyofthekeyusedtoencryptdata.Symmetricencryptionalgorithmsarebuiltsothatitisextremelydifficultforanyonetodeterminethecleartextwithouthavingthiskey.Inanycryptosystem,greatlengthsaretakentoprotectthesecrecyoftheencryptionkey.@#@Asymmetricalencryption@#@Asymmetricencryptionisoftenreferredtoaspublickeyencryption.Itcanuseeitherthesamealgorithm,ordifferentbutcomplementaryalgorithmstoscrambleandunscrambledata.Therequiredpublickeyandaprivatekeyaredifferent,butrelated.Forexample,ifAliceandBobwanttocommunicateusingpublickeyencryption,bothneedapublickeyandprivatekeypair.Alicehastocreateherpublickey/privatekeypair,andBobhastocreatehisownpublickey/privatekeypair.Whencommunicatingwitheachothersecurely,AliceandBobusedifferentkeystoencryptanddecryptdata.@#@Themechanismsusedtogeneratethesepublic/privatekeypairsarecomplex,buttheyresultinthegenerationoftwoverylargerandomnumbers.Oneofwhichbecomesthepublickeyandtheotherbecomestheprivatekey.Becausethesenumbers,aswellastheirproduct,mustadheretostringentmathematicalcriteriatopreservetheuniquenessofeachpublic/privatekeypair,generatingthesenumbersisfairlyprocessorintensive.@#@SomeofthemorecommonpublickeyalgorithmsaretheRivest-Shamir-Adleman(RSA)algorithmandtheElGamalalgorithm.Publickeyencryptionalgorithmsarerarelyusedfordataconfidentialitybecauseoftheirperformanceconstraints.Instead,publickeyencryptionalgorithmsaretypicallyusedinapplicationsinvolvingauthenticationusingdigitalsignaturesandkeymanagement.@#@RSAisthepublickeycryptographicsystemdevelopedbyRonRivest,AdiShamir,andLeonardAdleman.ThetwomethodsareRSAsignaturesandRSAencryption.RSAencryptiongeneratesavalueknownasanonce.Anonceistemporaryrandomstring,whichisgeneratedandcombinedwiththepeerpublickey.Thisismoresecurethanthesharedkeymethodofauthentication.However,itrequiresmoreprocessingpoweranddecreasesthroughputperformance.AnRSAsignatureisthemethodthatusesdigitalcertificates.Thismethodisveryscalableandtypicallyisusedbymediumandlargecorporations.@#@Non-repudiationistheabilitytoproveatransactionoccurred,similartoasignedpackagereceivedfromashippingcompany.Thisisveryimportantinfinancialtransactionsandsimilardatatransactions.RSAsignaturesprovidenon-repudiation.RSAencryptiondoesnotprovidenon-repudiat

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 工程科技 > 能源化工

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1