Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
4Activity
P. 1
Zastita podataka

Zastita podataka

Ratings: (0)|Views: 969|Likes:
Published by noctornus

More info:

Categories:Types, Speeches
Published by: noctornus on Jul 07, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/21/2013

pdf

text

original

 
Univerzitet
 
u
 
Nišu
 
Elektronski
 
fakultet
 
Predmet:
 
Prenos
 
podataka
 
i
 
umrežavanje
 
SEMINARSKI
 
RAD
 
Zaštita
 
podataka
 
primenom
 
kriptografskih
 
metoda
 
Profesor:
 
Goran
 
Lj.
Đ
or
đ
evi
ć
Student:
 
Kova
č
evi
ć
Vladimir
 
Br.ind.
 
231/08
 
Niš,
 
2010
 
i
Sadržaj
1 Uvod
........................................................................................................................................................ 31.1 Vrste napada i zaštita podataka na mreži .......................................................................................... 41.2 Sigurnosni servisi .............................................................................................................................. 5
2 Kriptografija
........................................................................................................................................... 72.1 Osnovni pojmovi i terminologija u kriptografiji ............................................................................... 72.2 Kratak istorijski pregled, op
 š
ti pojmovi i podela u kriptografiji ...................................................... 72.3 Bit stringovi, stream šifrovanje i blok šifrovanje .............................................................................. 82.4 Blok šifrovanje ................................................................................................................................ 102.5 Simetri
č
na kriptografija .................................................................................................................. 102.5.1 DES algoritam .......................................................................................................................... 112.5.2 Trostruki DES (3-DES) algoritam ........................................................................................... 152.5.3 DES-CBC algoritam sa inicijalizacionim vektorom ................................................................ 162.5.4 IDEA algoritam ........................................................................................................................ 172.5.5 RC5 algoritam .......................................................................................................................... 192.5.6 RC6 algoritam .......................................................................................................................... 222.5.7 AES (
 Rijndael
) algoritam......................................................................................................... 252.5.8 Blowfish ................................................................................................................................... 292.6 Prednosti i nedostatci simetri
č
nog kriptovanja ............................................................................... 302.7 Asimetri
č
ni kriptosistemi ................................................................................................................ 302.7.1 RSA .......................................................................................................................................... 312.7.2
 Diffie-Hellman
-ova eksponencijalna razmena klju
č
eva .......................................................... 332.7.3
 ELGamal
algoritam .................................................................................................................. 342.8 Prednosti i nedostatci asimetri
č
nih algoritama ............................................................................... 352.9 Hibridni kriptosistemi ..................................................................................................................... 35
3 Tehnika digitalnog potpisa
.................................................................................................................. 373.1 Potpisivanje cele poruke ................................................................................................................. 373.2 Potpisivanje sažetka poruke ............................................................................................................ 383.3 Heš funkcije .................................................................................................................................... 403.3.1 MD5 ......................................................................................................................................... 403.3.2 SHA-1 algoritam ...................................................................................................................... 41
4 Autentifikacija entiteta
........................................................................................................................ 434.1 Autentifikacija entiteta pomo
ć
u simetri
č
nog kriptovanja ............................................................... 434.1.1 Prvi vid autentifikacije entiteta ................................................................................................ 434.1.2 Drugi vid autentifikacije entiteta.............................................................................................. 434.1.3 Bidirekciona autentifikacija ..................................................................................................... 444.2 Autentifikacija entiteta koriš
ć
enjem asimetri
č
nog kriptovanja ...................................................... 45
5 Upravljanje klju
č
evima
....................................................................................................................... 47 5.1 Kreiranje klju
č
a ............................................................................................................................... 475.2 Distribucija klju
č
eva ....................................................................................................................... 485.2.1 Distribucija klju
č
eva u simetri
č
nim kriptografskim sistemima ............................................... 485.2.1.1 Centar za distribuciju klju
č
eva (KDC).............................................................................. 485.2.1.2
 Needham-Schroeder 
protokol ........................................................................................... 495.2.1.3
Otway-Rees
protokol ......................................................................................................... 515.2.2 Distribucija klju
č
eva u asimetri
č
nim kriptografskim sistemima ............................................. 525.2.2.1 Potvrda identiteta .............................................................................................................. 525.2.2.2 X.509 protokol .................................................................................................................. 535.2.2.3 Infrastruktura javnog klju
č
a (
Public Key Infrastrukture
, PKI) ......................................... 545.2.2.4 Kerberos ............................................................................................................................ 54
 
 Zaštita podataka primenom kriptografskih metoda Sadržaj
ii5.3 Zamena klju
č
a.................................................................................................................................. 575.4 Uništenje klju
č
a ............................................................................................................................... 57
6 Sigurnosni servisi u TCP/IP modelu
................................................................................................... 596.1 IPSec ................................................................................................................................................ 596.2 SSL/TLS .......................................................................................................................................... 61
7 Zaklju
č
ak 
............................................................................................................................................... 65
Literatura
............................................................................................................................................. 66

Activity (4)

You've already reviewed this. Edit your review.
1 hundred reads
Marina Čeke liked this
Bekir liked this
Jenchy liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->