现代密码学实验五:签名算法
一、實(shí)驗(yàn)?zāi)康?/p>
1.掌握數(shù)字簽名的基本原理,理解RSA算法如何提供數(shù)字簽名。
2.熟悉實(shí)驗(yàn)環(huán)境和加密軟件CrypTool 1.4(CrypTool 2)的使用。
3.編寫(xiě)代碼實(shí)現(xiàn)簽名算法。
二、實(shí)驗(yàn)內(nèi)容
- 運(yùn)行CrypTool 1.4(CrypTool 2),使用RSA算法對(duì)消息進(jìn)行簽名操作,選擇公鑰PK=(e,N),私鑰為sk=(d,N)。例如:
消息:
Out of all cryptographic primitives, the digital signature using public key cryptography is considered as very important and useful tool to achieve information security. Apart from ability to provide non-repudiation of message, the digital signature also provides message authentication and data integrity.
密鑰:e = 11
N =
97837973726418359868516951718991281325771149750958732944765111213631328027493925740023000937277990315891588119835562940190113563334615471147089645563941484459898854377253031679968434226000865737244299665393453851802313775580309976978804698982229486068546397607971083305570968358870209409102684170827187712579
d =
53366167487137287201009246392177062541329718045977490697144606116526178924087595858194364147606176535940866247183034331012789216364335711534776170307604435275621882890925722486791216663911766481240927473604083681494108652553529557950472379863877351129463207267185120618342084129306558631987155442108022251891
- 編程實(shí)現(xiàn)RSA/ElGamal簽名算法并測(cè)試簽名和驗(yàn)證過(guò)程。要求消息頭部包含作者的姓名拼音,并通過(guò)哈希函數(shù)SHA-1得到消息摘要,對(duì)摘要進(jìn)行簽名,編程語(yǔ)言不限。
- 實(shí)驗(yàn)步驟
實(shí)驗(yàn)(1):
- 通過(guò)課堂與課本得知,RSA簽名和實(shí)驗(yàn)4中的RSA算法正好相反,解密對(duì)應(yīng)于簽名,且解密的密鑰為加密者的私鑰。加密對(duì)應(yīng)于驗(yàn)證,于是打開(kāi)Cryptool2.1使用RSA解密算法生成16進(jìn)制文件。如圖一、二。
?
圖一:簽名過(guò)程
?
圖二:驗(yàn)證過(guò)程
實(shí)驗(yàn)(2):
1、運(yùn)用python自帶的庫(kù)生成sha-1消息摘要(圖三):
?
圖三:sha-1實(shí)現(xiàn)
2、將實(shí)驗(yàn)4的RSA算法實(shí)現(xiàn)倒置,解密對(duì)應(yīng)簽名,加密對(duì)應(yīng)驗(yàn)證(如圖四,五)
?
圖四:解密對(duì)應(yīng)簽名
?
圖五:加密對(duì)應(yīng)驗(yàn)證
- 實(shí)驗(yàn)結(jié)果
實(shí)驗(yàn)(1):
數(shù)字簽名:
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
RSA加密后生成的密文:
Out of all cryptographic primitives, the digital signature using public key cryptography is considered as very important and useful tool to achieve information security. Apart from ability to provide non-repudiation of message, the digital signature also provides message authentication and data integrity.
與原文相同,驗(yàn)證成功。
實(shí)驗(yàn)(2):
私鑰對(duì)消息摘要進(jìn)行簽名后,運(yùn)用公鑰驗(yàn)證簽名,結(jié)果與摘要相同,驗(yàn)證成功!(如圖六)
?
圖六:運(yùn)行結(jié)果
- 實(shí)驗(yàn)心得
本次實(shí)驗(yàn)的綜合性較高,運(yùn)用了前幾課的知識(shí),包括sha-1算法生成消息驗(yàn)證碼,RSA算法實(shí)現(xiàn)不對(duì)稱加密,在運(yùn)用其不對(duì)稱加密的性質(zhì)實(shí)現(xiàn)數(shù)字簽名,而這一切都是基于復(fù)雜的離散對(duì)數(shù)問(wèn)題。Sha-1算法生成固定長(zhǎng)度但又對(duì)明文具有強(qiáng)抗碰撞性,使得對(duì)摘要生成的簽名長(zhǎng)度很短都能達(dá)到較好的驗(yàn)證效果。
- 附錄 (程序代碼)
from random import randintfrom datetime import datetimeimport hashlib"""判斷是否是素?cái)?shù)"""def is_sushu(sushu):for i in range(2,sushu):if sushu % i == 0:return Falsereturn True"""隨機(jī)生成指定范圍的大素?cái)?shù)"""def Create_Sushu():while True:sushu = randint(100,1000 )#下限越大,加密越安全,此處考慮計(jì)算時(shí)間,取值較小if is_sushu(sushu):return sushu"""計(jì)算歐拉函數(shù)"""def Oula(sushu1 , sushu2):return (sushu1-1)*(sushu2-1)"""判斷是否互質(zhì)"""def Is_Huzhi(int_min,int_max):for i in range(2,int_min+1):if int_min % i == 0 and int_max % i == 0:return Falsereturn True"""計(jì)算公鑰,直接計(jì)算編程較簡(jiǎn)單,此處考慮了計(jì)算效率的優(yōu)化"""def Creat_E(oula):top = oulawhile True:i = randint(2,top)for e in range(i,top):if Is_Huzhi(e,oula):return etop = i"""計(jì)算私鑰"""def Compute_D(oula,e):k = 1while ( k*oula+1 )% e != 0:k+=1return int((k*oula+1)/e)"""將字符串轉(zhuǎn)成ASCII"""def Transfer_To_Ascii(messages):result = []for message in messages:result.append(? ord(message) )return result"""將列表轉(zhuǎn)化成字符串"""def Transfer_To_String(string_list):string = ''.join('%s' %id for id in string_list)?????? #有數(shù)字不能直接join .join('%s' %id for id in list1))return stringif __name__ == "__main__":"""p、q為大素?cái)?shù)
n=p*qoula = (p-1)* (q-1)
e 為公鑰
d 為私鑰
"""print("通信開(kāi)始,正在計(jì)算公鑰與私鑰...")time_start = datetime.now()p = Create_Sushu()q = pwhile p ==q :q = Create_Sushu()n = p * qoula = Oula(p, q)e = Creat_E(oula)d = Compute_D(oula,e)time_end = datetime.now()print(f"計(jì)算完成,用時(shí){str(time_end -time_start)}秒 ")print(f"公鑰:n = {str(n)} , e = {str(e)}")print(f"私鑰:n = {str(n)} , d = {str(d)}")m = input('待簽名信息:')hash = hashlib.sha1(m.encode("utf-8")).hexdigest()c_list= Transfer_To_Ascii(hash)print(f"sha-1消息摘要為:{hash}")print("正在簽名...")decode_messages=[]for c in c_list:decode_message = c**d%ndecode_messages.append(chr(decode_message))m_list = Transfer_To_Ascii(decode_messages)print(f"簽名信息:{m_list}")c_list = []for m in m_list:c = m**e%nc_list.append(chr(c))print("正在驗(yàn)證...")print(f"收到的摘要為:{Transfer_To_String(c_list)}")if Transfer_To_String(c_list) == hash:print("驗(yàn)證成功!!!")
總結(jié)
以上是生活随笔為你收集整理的现代密码学实验五:签名算法的全部?jī)?nèi)容,希望文章能夠幫你解決所遇到的問(wèn)題。
- 上一篇: BSGS及其拓展
- 下一篇: 2019牛客暑期多校训练营(第五场)C