25.07.2013 Views

Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu

Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu

Zaštita podataka primenom kriptografskih metoda - Univerzitet u Nišu

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sadržaj<br />

1 Uvod ........................................................................................................................................................ 3<br />

1.1 Vrste napada i zaštita <strong>podataka</strong> na mreži .......................................................................................... 4<br />

1.2 Sigurnosni servisi .............................................................................................................................. 5<br />

2 Kriptografija........................................................................................................................................... 7<br />

2.1 Osnovni pojmovi i terminologija u kriptografiji ............................................................................... 7<br />

2.2 Kratak istorijski pregled, opšti pojmovi i podela u kriptografiji ...................................................... 7<br />

2.3 Bit stringovi, stream šifrovanje i blok šifrovanje .............................................................................. 8<br />

2.4 Blok šifrovanje ................................................................................................................................ 10<br />

2.5 Simetrična kriptografija .................................................................................................................. 10<br />

2.5.1 DES algoritam .......................................................................................................................... 11<br />

2.5.2 Trostruki DES (3-DES) algoritam ........................................................................................... 15<br />

2.5.3 DES-CBC algoritam sa inicijalizacionim vektorom ................................................................ 16<br />

2.5.4 IDEA algoritam ........................................................................................................................ 17<br />

2.5.5 RC5 algoritam .......................................................................................................................... 19<br />

2.5.6 RC6 algoritam .......................................................................................................................... 22<br />

2.5.7 AES (Rijndael) algoritam......................................................................................................... 25<br />

2.5.8 Blowfish ................................................................................................................................... 29<br />

2.6 Prednosti i nedostatci simetričnog kriptovanja ............................................................................... 30<br />

2.7 Asimetrični kriptosistemi ................................................................................................................ 30<br />

2.7.1 RSA .......................................................................................................................................... 31<br />

2.7.2 Diffie-Hellman-ova eksponencijalna razmena ključeva .......................................................... 33<br />

2.7.3 ELGamal algoritam .................................................................................................................. 34<br />

2.8 Prednosti i nedostatci asimetričnih algoritama ............................................................................... 35<br />

2.9 Hibridni kriptosistemi ..................................................................................................................... 35<br />

3 Tehnika digitalnog potpisa .................................................................................................................. 37<br />

3.1 Potpisivanje cele poruke ................................................................................................................. 37<br />

3.2 Potpisivanje sažetka poruke ............................................................................................................ 38<br />

3.3 Heš funkcije .................................................................................................................................... 40<br />

3.3.1 MD5 ......................................................................................................................................... 40<br />

3.3.2 SHA-1 algoritam ...................................................................................................................... 41<br />

4 Autentifikacija entiteta ........................................................................................................................ 43<br />

4.1 Autentifikacija entiteta pomoću simetričnog kriptovanja ............................................................... 43<br />

4.1.1 Prvi vid autentifikacije entiteta ................................................................................................ 43<br />

4.1.2 Drugi vid autentifikacije entiteta.............................................................................................. 43<br />

4.1.3 Bidirekciona autentifikacija ..................................................................................................... 44<br />

4.2 Autentifikacija entiteta korišćenjem asimetričnog kriptovanja ...................................................... 45<br />

5 Upravljanje ključevima ....................................................................................................................... 47<br />

5.1 Kreiranje ključa ............................................................................................................................... 47<br />

5.2 Distribucija ključeva ....................................................................................................................... 48<br />

5.2.1 Distribucija ključeva u simetričnim kriptografskim sistemima ............................................... 48<br />

5.2.1.1 Centar za distribuciju ključeva (KDC).............................................................................. 48<br />

5.2.1.2 Needham-Schroeder protokol ........................................................................................... 49<br />

5.2.1.3 Otway-Rees protokol ......................................................................................................... 51<br />

5.2.2 Distribucija ključeva u asimetričnim kriptografskim sistemima ............................................. 52<br />

5.2.2.1 Potvrda identiteta .............................................................................................................. 52<br />

5.2.2.2 X.509 protokol .................................................................................................................. 53<br />

5.2.2.3 Infrastruktura javnog ključa (Public Key Infrastrukture, PKI) ......................................... 54<br />

5.2.2.4 Kerberos ............................................................................................................................ 54<br />

i

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!