Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 1.

Similar presentations


Presentation on theme: "Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 1."— Presentation transcript:

1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 1

2 算法约束 : 密码合规管理统一框架 范学雷 王卫军 高级软件工程师

3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 3 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.

4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 4 议程  密码合规管理的背景和需求  密码合规管理的基本框架  算法约束框架的应用  算法约束框架的展望  演示

5 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 5 密码合规管理的背景  MD2/MD5/SHA-1 的安全性  RSA/DSA 密钥长度  DES/RC4_40/DES_40 的安全性  SHA-2  AEAD 密码分析的发展

6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 6 密码合规管理的背景  美国国家标准与技术研究院 (NIST)  欧洲卓越密码网络 (ECRYPT) 计划  德国联邦信息安全办公室 (BSI)  美国国家安全局 (NSA Suite B)  法国网络与信息安全局 (ANSSI) 密码管理建议

7 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 7 80 位 112 位 128 位 192 位 256 位 加密解密加密解密 < 2010 2010 - 2013 2014 - 2030 X > 2030 X X 示例: NIST 密码管理建议 (I)

8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 8 示例: NIST 密码管理建议 (II) 80 位 112 位 128 位 192 位 256 位 对称密码 2TDEA3TDEAAES-128ASE-192AES-256 数字签名 HASH 算法  SHA-1  SHA-224  SHA-256  SHA-384  SHA-512  SHA-224  SHA-256  SHA-384  SHA-512  SHA-256  SHA-384  SHA-512  SHA-384  SHA-512 HMAC 算法  SHA-1  SHA-224  SHA-256  SHA-384  SHA-512  SHA-1  SHA-224  SHA-256  SHA-384  SHA-512  SHA-1  SHA-224  SHA-256  SHA-384  SHA-512  SHA-224  SHA-256  SHA-384  SHA-512  SHA-256  SHA-384  SHA-512

9 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 9 示例: NIST 密码管理建议 (III) 80 位 112 位 128 位 192 位 256 位 RSAK = 1024k = 2048k = 3072k = 7680k = 15360 DSA L = 1024 N = 160 L = 2048 N = 224 L = 3072 N = 256 L = 7680 N = 384 L = 15360 N = 512 椭圆曲线 ( ECC ) f = 160-223f = 224-255f = 256-383f = 384-511f = 512+

10 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 10 示例: NIST 密码管理建议 (IV) 80 位 112 位 128 位 192 位 256 位 对称密码 2TDEA3TDEAAES-128ASE-192AES-256 数字签名 HASH 算法  SHA-1  SHA-224  SHA-256  SHA-384  SHA-512  SHA-224  SHA-256  SHA-384  SHA-512  SHA-256  SHA-384  SHA-512  SHA-384  SHA-512 HMAC 算法  SHA-1  SHA-224  SHA-256  SHA-384  SHA-512  SHA-1  SHA-224  SHA-256  SHA-384  SHA-512  SHA-1  SHA-224  SHA-256  SHA-384  SHA-512  SHA-224  SHA-256  SHA-384  SHA-512  SHA-256  SHA-384  SHA-512

11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 11 密码合规管理的需求 (I)  不同的应用有不同的约束  不同的组织有不同的建议  合规约束随时间变化而变化  算法有适用范围  算法有适用时限

12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 12 密码合规管理的需求 (II)  独立于算法实现库  集中的密码合规管理模式  一致的密码合规管理接口

13 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 13 密码合规管理的基本框架  统一接口 – java.security.AlgorithmConstraints  创建模式 – java.security.AlgorithmConstraintsFactory  运用模式 – XXX.setAlgorithmConstraints(AlgorithmConstraints)  集中管理 – Java security properties

14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 14 AlgorithmConstraints package java.security; public interface AlgorithmConstraints { public boolean permits(Set primitives, String algorithm, AlgorithmParameters parameters); public boolean permits(Set primitives, Key key); public boolean permits(Set primitives, String algorithm, Key key, AlgorithmParameters parameters); }

15 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 15 AlgorithmConstraintsFactory package java.security; public class AlgorithmConstraintsFactory { public AlgorithmConstraints getInstance( String name, Provider provider); … }

16 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 16 运用模式示例 package javax.net.ssl; public class SSLParameters { public void setAlgorithmConstraints( AlgorithmConstraints constraints); public AlgorithmConstraints getAlgorithmConstraints(); … }

17 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 17 Java security property  jdk.algorithmConstraints  jdk.tls.algorithmConstraints  jdk.certpath.algorithmConstraints

18 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 18 算法约束框架的当前应用  PKI 数字证书验证  JSSE TLS 算法筛选  Java Security Property – jdk.certpath.disabledAlgorithms – jdk.tls.disabledAlgorithms

19 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 19 算法约束框架的展望 (I)  将算法约束扩展到更多模块 – Kerberos – Tools – XML 安全  更加便捷的集中控制属性 – jdk.algorithmConstraints = NIST-192

20 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 20 算法约束框架的展望 (II)  便捷的算法约束集创建模式 – AlgorithmConstraintsFactory.getInstance(“NIST-256”)  灵活的算法约束集导入模式 – PKIXParameters.setAlgorithmConstraints(AlgorithmConstraints)  建议第三方采取统一的框架

21 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 21 实例演示 To fill a shape with an image. 1.Use existing picture box, DO NOT delete and create new picture box. 2.Right click on the shape. 3.At the bottom of the submenu select “Format Shape” 4.Select “Fill” at the top of the “Format Shape” dialog box. 5.Select “Picture or Texture fill” from the options. 6.And select “File” under the “Insert from” option. 7.Navigate to the file you want to use and select “Insert” 8.On the “Format” tab, in the Size group, click on “Crop to Fill” in the Crop tool and drag the image bounding box to the desired size 9.DELETE THIS INSTRUCTION NOTE WHEN NOT IN USE

22 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 22 Graphic Section Divider

23 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 23


Download ppt "Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 1."

Similar presentations


Ads by Google