《公钥加密 - 从 RSA 和 EC 到后量子.pdf》由会员分享,可在线阅读,更多相关《公钥加密 - 从 RSA 和 EC 到后量子.pdf(61页珍藏版)》请在三个皮匠报告上搜索。
1、#CiscoLive#CiscoLiveFrederic DetienneDistinguished EngineerBRKSEC-3129Public Key CryptographyFrom RSA and EC to Post-Quantum 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveEnter your personal notes hereCisco Webex App 3Questions?Use Cisco Webex App to chat with the speake
2、r after the sessionFind this session in the Cisco Live Mobile AppClick“Join the Discussion”Install the Webex App or go directly to the Webex spaceEnter messages/questions in the Webex spaceHowWebex spaces will be moderated by the speaker until June 9,2023.12343https:/ 2023 Cisco and/or its affiliate
3、s.All rights reserved.Cisco PublicBRKSEC-3129Agenda 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicA Brief IntroductionMODP:Multiplicative Group of Integers Modulo PECC:Elliptic Curve CryptographyEnters The Quantum ComputerLattice Based CryptographyConclusion and RecommendationsBRK
4、SEC-31294 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveToday is a bout making math fun!5BRKSEC-3129Introduction 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveCryptographic Mechanisms7BRKSEC-3129EncryptionData Authentication(HMAC)Key Establis
5、hmentHashingSignaturesRandom NumberGeneration 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveToday-Suite B8BRKSEC-3129Key Establishment ECDHDigital SignaturesECDSAHashingSHA-2AuthenticatedEncryptionAES-GCMAuthenticationHMAC-SHA-2EntropySP800-90ProtocolsTLSv1.2,IKEv2,IPsec
6、,MACSecHashes and HMACsFocus on SHA-2 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat is a Cryptographic Hash Function10BRKSEC-3129Legitimate MessageHashHashFunctionAny LengthFixed LengthEasy&Fastvery hardIllegitimate MessageHashHashFunctionvery hardPre-image resistan