首页
社区
课程
招聘
[转帖]信息安全与密码学博士:应该掌握的52个知识点
发表于: 2019-9-18 17:09 19518

[转帖]信息安全与密码学博士:应该掌握的52个知识点

2019-9-18 17:09
19518
密码学板块人气有点少,打算转一系列关于密码学的贴, Bristol大学对这方面的知识点进行了一个全面的总结和覆盖。
 掌握这些知识点后,对密码学有一个比较全面的了解。
52 Things Every PhD Student Should Know'。

原文地址:http://www.vonwei.com/post/52knowledgeForCryptographyPHD.html  
目前原博客差不多更新完了,vonwei.com 的作者翻译了几篇,没看到后续。
如果有人需要,计划将这系列文章转载过来,可能不会都翻译,怕翻译不好。
英文链接:http://bristolcrypto.blogspot.com/2014/10/52-things-number-1-different-types-of.html ( Blogspot被墙了 )
下面列出这52个需要掌握的知识点:

Computer Engineering ([E])计算机工程方面

                  52 Things: Number 1 : Different Types of Processors

                                  翻译地址:http://vonwei.com/post/1outof52.html

                  Number 2:What is the difference between a multi-core processor and a vector processor?

                                  翻译地址:http://vonwei.com/post/2outof52.html

                  Number 3: Computational and storage power of different form factors

                                  翻译地址:http://vonwei.com/post/3outof52.html

Theoretical Computer Science ([F])理论计算机科学方面

                  Number 4:What is meant by the complexity class P?

                                 翻译地址:http://vonwei.com/post/4outof52.html

                  Number 5:What is meant by the complexity class NP?

                                翻译地址:http://vonwei.com/post/5outof52.html

                  Number 6: How can we interpret NP as the set of theorems whose proofs can be checked in polynomial time?

                                翻译地址:http://vonwei.com/post/6outof52.html

                  Number 7:How does randomness help in computation, and what is the class BPP?

                                翻译地址:http://vonwei.com/post/7outof52.html

                  Number 8:How does interaction help in computation, and what is the class IP?

                                翻译地址:http://vonwei.com/post/8outof52.html

                  Number 9:What are Shannon's definitions of entropy and information?

Mathematical Background ([A,B])数学背景

                  Number 10:What is the difference between the RSA and the Strong-RSA problem?

                  Number 11:What are the DLP, CDH and DDH problems?

                  Number 12:What is the elliptic curve group law?

                  Number 13:Outline the use and advantages of projective point representation.

                  Number 14:What is a cryptographic pairing?

Basic (Practical or Deployed) Cryptographic Schemes and Protocols ([A])基本密码机制与协议

                  Number 15:Describe the key generation, encryption and decryption algorithms for RSA-OAEP and ECIES.

                  Number 16: Describe the key generation, signature and verification algorithms for DSA, Schnorr and RSA-FDH.

                  Number 17:Describe and compare the round structure of DES and AES.

                  Number 18:Draw a diagram (or describe) the ECB, CBC and CTR modes of operation.

                  Number 19:Describe the Shamir secret sharing scheme.

                  Number 20:How are Merkle-Damgaard style hash functions constructed?

Cryptographic Implementation Details ([A])密码实现详情

                  Number 21:How does the CRT method improve performance of RSA?

                  Number 22:How do you represent a number and multiply numbers in Montgomery arithmetic?

                  Number 23:Write a C program to implement Montgomery arithmetic.

                  Number 24:Describe the binary, m-ary and sliding window exponentiation algorithms.

                  Number 25:Describe methods for modular reduction using "special" primes that define GF(p) and GF(2^n).

                  Number 26:Describe the NAF scalar multiplication algorithm.

Security Definitions and Proofs ([A,B,C])安全定义和证明

                  Number 27:What is the IND-CCA security definition for symmetric key encryption?

                  Number 28:What is the IND-CCA security definition for public key encryption?

                  Number 29:What is the UF-CMA security definition for digital signatures?

                  Number 30:Roughly outline the BR security definition for key agreement?

                  Number 31:Give one proof of something which involves game hopping

                  Number 32:Outline the difference between a game based and a simulation based security definition.

Mathematical Attacks ([A,B])数学攻击

                  Number 33:How does the Bellcore attack work against RSA with CRT?

                  Number 34:Describe the Baby-Step/Giant-Step method for breaking DLPs

                  Number 35:Give the rough idea of Pollard rho, Pollard "kangaroo" and parallel Pollard rho attacks on ECDLP.

                  Number 36:What is meant by index calculus algorithms?

                  Number 37:Roughly outline (in two paragraphs only) how the NFS works.

Practical Attacks ([D])实际攻击

                  Number 38:What is the difference between a covert channel and a side-channel?

                  Number 39:What is the difference between a side-channel attack and a fault attack?

                  Number 40:What is usually considered the difference between DPA and SPA?

                  Number 41:Are all side channels related to power analysis?

                  Number 42:Look at your C code for Montgomery multiplication above; can you determine where it could leak side channel information?

                  Number 43:Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for AES.

                  Number 44:Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for ECC.

                  Number 45:Describe some basic (maybe ineffective) defences against side channel attacks proposed in the literature for RSA.

Advanced Protocols and Constructions ([A,B])高级协议与构造

                  Number 46:What is the Fiat-Shamir transform?

                  Number 47:What does correctness, soundness and zero-knowledge mean in the context of a Sigma protocol?

                  Number 48:What is the purpose and use of a TPM?

                  Number 49:Describe the basic ideas behind IPSec and TLS.

                  Number 50:What is the BLS pairing based signature scheme?

                  Number 51:What is the security model for ID-based encryption, and describe one IBE scheme.

                  Number 52:Pick an advanced application concept such as e-Voting, Auctions or Multi-Party Computation. What are the rough security requirements of such a system?

Further Reading(进一步参考文献)

                  [A] Nigel's      book is deliberately informal and tries to give quick flavours of      what is important in theory and practice.

                  [B] The Katz      Lindell book is a better formal introduction to modern      theoretical cryptography but it is less good in its treatment of what is      important in the real world (e.g. the coverage of AES, ECC,      implementation, etc is quite limited).

                  [C] Goldreich's      two volume book is a very good introduction to the deep theory,      but deliberately does not cover practical cryptography.

                  [D] Elisabeth's DPA book is      the best introduction to all things about side-channels.

                  [E] Dan's book is      a good starting place for computer architecture and learning VHDL.

                  [F] Goldreich's      book on complexity theory is a good place to start. Its approach      is much more down-to-earth and sensible than other approaches (i.e. P vs      NP is presented in terms of is it easier to check or find proofs?)



[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)

收藏
免费 4
支持
分享
最新回复 (10)
雪    币: 35726
活跃值: (7155)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
2
有时间  得看看,不错。
2019-10-2 17:14
0
雪    币: 415
活跃值: (19)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
3
感谢,准备考研,能多给安全方面的知识点嘛?帮助我复习一下。
2019-10-10 10:22
0
雪    币: 12
能力值: ( LV1,RANK:0 )
在线值:
发帖
回帖
粉丝
4
沒那么复杂,方法得当既可
2019-10-11 03:49
0
雪    币: 2811
活跃值: (266)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
5
谢谢分享!
2019-10-11 08:49
0
雪    币: 184
活跃值: (49)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
6
我的名叫成长 感谢,准备考研,能多给安全方面的知识点嘛?帮助我复习一下。
安全方面范围太广了,不知道你考哪个学校,还是先按学校的考纲复习好。信息安全/密码学 相对其他热门学科竞争还是要小一些。
2019-10-22 17:01
0
雪    币: 91
活跃值: (10)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
7
还应该掌握一个技巧:快速生成证书的在线工具:gmcert.org,不会用就亏死了
2019-11-13 14:55
0
雪    币: 5
能力值: ( LV1,RANK:0 )
在线值:
发帖
回帖
粉丝
8
http://www.vonwei.com/post/52knowledgeForCryptographyPHD.html,这个网址打不开,麻烦楼主可以重新发一下新的原文地址吗?
2020-5-22 22:38
1
雪    币: 38
活跃值: (29)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
9
网址没法访问, 哪位大神能帮忙下载下来保存为pdf发出来。 谢谢
2020-7-13 17:08
0
雪    币: 10845
活跃值: (1054)
能力值: (RANK:190 )
在线值:
发帖
回帖
粉丝
10
看完这52个问题,算是复习了一遍密码学
Cryptography PhD Student要是能搞清这52个问题,可以优先招过来
2020-7-25 22:50
0
雪    币: 184
活跃值: (49)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
11
mb_xmuwvpju http://www.vonwei.com/post/52knowledgeForCryptographyPHD.html,这个网址打不开,麻烦楼主可以重新发一下新的原文地址吗?
http://bristolcrypto.blogspot.com/2014/10/52-things-number-1-different-types-of.html  英文链接是这个,好久没来看了,不好意思。
2020-9-17 11:25
1
游客
登录 | 注册 方可回帖
返回
//