更新时间:2018-12-27 12:34:49
封面
版权信息
序
前 言
1 范围
2 术语
2.1 一般概念
2.1.1 自适应选择密文攻击adaptive chosen-ciphertext attack
2.1.2 自适应选择明文攻击adaptive chosen-plaintext attack
2.1.3 雪崩效应avalanche effect
2.1.4 布尔函数Boolean function
2.1.5 蛮力攻击/穷举攻击brute-force attack/exhaustive attack
2.1.6 选择密文攻击chosen-ciphertext attack
2.1.7 选择明文攻击chosen-plaintext attack
2.1.8 密码强度cipher strength
2.1.9 密文ciphertext
2.1.10 唯密文攻击ciphertext-only attack
2.1.11 密文空间ciphertext space
2.1.12 完备性completeness
2.1.13 计算复杂度computational complexity
2.1.14 计算安全computational security
2.1.15 计算不可行computationally infeasible
2.1.16 保密性confidentiality
2.1.17 混淆/混乱confusion
2.1.18 相关免疫correlation immunity
2.1.19 密码算法crypto-algorithm/cryptographic algorithm
2.1.20 密码分析/密码攻击cryptanalysis/cryptographic attack
2.1.21 密码校验函数cryptographic check function
2.1.22 密码校验值cryptographic check value
2.1.23 密码杂凑函数cryptographic hash function
2.1.24 密码协议cryptographic protocol
2.1.25 密码同步cryptography synchronization
2.1.26 密码学cryptology
2.1.27 密码系统cryptosystem
2.1.28 数据完整性data integrity
2.1.29 解密decipherment/decryption
2.1.30 扩散diffusion
2.1.31 数字签名digital signature
2.1.32 有限域离散对数问题discrete logarithm problem over finite field
2.1.33 椭圆曲线离散对数问题discrete logarithm problem over elliptic curve
2.1.34 椭圆曲线elliptic curve
2.1.35 加密encipherment/encryption
2.1.36 有限域finite field
2.1.37 前向保密性forward secrecy
2.1.38 初始化向量/值Initialization Vector/Initialization Value(IV)
2.1.39 Kerckhoffs假设Kerckhoffs' assumption/principle
2.1.40 密钥key
2.1.41 密钥协商key agreement/negotiation
2.1.42 密钥确认key confirmation
2.1.43 密钥周期key cycle
2.1.44 密钥销毁key destruction
2.1.45 密钥加密密钥key-encrypting key
2.1.46 密钥托管key escrow
2.1.47 密钥建立key establishment
2.1.48 密钥交换keyexchange
2.1.49 密钥生存期key lifetime
2.1.50 密钥恢复key recovery
2.1.51 密钥撤销key revocation
2.1.52 密钥编排key schedule
2.1.53 密钥空间key space
2.1.54 密钥传送key transport
2.1.55 密钥更新key update
2.1.56 背包问题knapsack problem
2.1.57 已知明文攻击known-plaintext attack
2.1.58 大整数因子分解问题large integer factorization problem
2.1.59 线性复杂度linear complexity
2.1.60 主密钥master key
2.1.61 抗抵赖non-repudiation
2.1.62 单向函数one-way function
2.1.63 单向陷门函数one-way trapdoor function
2.1.64 口令password
2.1.65 完善保密性perfect secrecy
2.1.66 明文plain text/clear text
2.1.67 明文空间plaintext space
2.1.68 私钥private key
2.1.69 可证明安全provable security
2.1.70 公钥public key
2.1.71 量子密码quantum cryptography
2.1.72 随机数random number
2.1.73 会话密钥session key
2.1.74 严格雪崩准则Strict Avalanche Criterion(SAC)
2.1.75 零知识证明zero-knowledge proof
2.2 技术机制
2.2.1 AES Advanced Encryption Standard
2.2.2 非对称密码算法/公钥密码算法asymmetric cryptographic algorithm/public key cryptographic algorithm
2.2.3 生日攻击birthday attack
2.2.4 盲签名blind signature
2.2.5 分组密码算法block cipher algorithm
2.2.6 分组密码算法工作模式block cipher operation mode
2.2.7 认证机构Certification Authority(CA)
2.2.8 证书签发中心certificate issue center
2.2.9 证书撤销列表Certificate Revocation List(CRL)
2.2.10 证书注册中心certificate register center
2.2.11 密码分组链接工作模式Cipher Block Chaining(CBC)operation mode
2.2.12 密码反馈工作模式Cipher FeedBack(CFB)operation mode
2.2.13 计数器工作模式counter(CTR)operation mode
2.2.14 DES Data Encryption Standard
2.2.15 数据源鉴别data origin authentication
2.2.16 字典攻击dictionary attack
2.2.17 差分密码分析differential cryptanalysis