{"id":535,"date":"2021-06-27T21:43:32","date_gmt":"2021-06-27T13:43:32","guid":{"rendered":"https:\/\/choson.lifenet.com.tw\/?p=535"},"modified":"2023-03-29T16:39:41","modified_gmt":"2023-03-29T08:39:41","slug":"%e6%a9%a2%e5%9c%93%e6%9b%b2%e7%b7%9a%e6%95%b8%e5%ad%97%e7%b0%bd%e5%90%8d%e7%ae%97%e6%b3%95-elliptic-curve-digital-signature-algorithm%ef%bc%9aecdsa","status":"publish","type":"post","link":"https:\/\/choson.lifenet.com.tw\/?p=535","title":{"rendered":"\u6a62\u5713\u66f2\u7dda\u6578\u5b57\u7c3d\u540d\u7b97\u6cd5 (Elliptic Curve Digital Signature Algorithm\uff1aECDSA)"},"content":{"rendered":"\n<p>\u6a62\u5713\u66f2\u7dda\u6578\u5b57\u7c3d\u540d\u7b97\u6cd5 (ECDSA) \u662fFIPS 186-4\u6279\u51c6\u7684\u5408\u6cd5\u6578\u5b57\u7c3d\u540d\u7b97\u6cd5\u3002\u9019\u610f\u5473\u8457 ECDSA \u5728\u6280\u8853\u4e0a\u8db3\u5920\u5f37\u5927\u4e26\u4e14\u5177\u6709\u6cd5\u5f8b\u7d04\u675f\u529b\u3002<br>\u672c\u6a19\u51c6\u5b9a\u7fa9\u4e86\u6578\u5b57\u7c3d\u540d\u751f\u6210\u65b9\u6cd5\uff0c\u53ef\u7528\u65bc\u4fdd\u8b77\u4e8c\u9032\u5236\u6578\u64da\uff08\u901a\u5e38\u7a31\u70ba\u6d88\u606f\uff09\uff0c\u4ee5\u53ca\u9a57\u8b49\u548c\u78ba\u8a8d\u9019\u4e9b\u6578\u5b57\u7c3d\u540d\u3002\u6279\u51c6\u4e86\u4e09\u7a2e\u6280\u8853\u3002<br>(1)\u672c\u6a19\u6e96\u898f\u5b9a\u4e86\u6578\u5b57\u7c3d\u540d\u7b97\u6cd5\uff08DSA\uff09\u3002\u8a72\u898f\u7bc4\u5305\u62ec\u57df\u53c3\u6578\u7684\u751f\u6210\u3001\u516c\u9470\u548c\u79c1\u9470\u5c0d\u7684\u751f\u6210\u4ee5\u53ca\u6578\u5b57\u7c3d\u540d\u7684\u751f\u6210\u548c\u9a57\u8b49\u7684\u6a19\u6e96\u3002<br>(2) RSA\u6578\u5b57\u7c3d\u540d\u7b97\u6cd5\u5728\u7f8e\u570b\u570b\u5bb6\u6a19\u6e96 (ANS) X9.31 \u548c\u516c\u9470\u5bc6\u78bc\u5b78\u6a19\u6e96 (PKCS) #1 \u4e2d\u6307\u5b9a\u3002FIPS 186-4 \u6279\u51c6\u4f7f\u7528\u9019\u4e9b\u6a19\u6e96\u4e2d\u7684\u4e00\u500b\u6216\u5169\u500b\u7684\u5be6\u73fe\uff0c\u4e26\u6307\u5b9a\u9644\u52a0\u8981\u6c42\u3002<br>(3)\u6a62\u5713\u66f2\u7dda\u6578\u5b57\u7c3d\u540d\u7b97\u6cd5 (ECDSA)\u5728 ANS X9.62 \u4e2d\u6307\u5b9a\u3002FIPS 186-4 \u6279\u51c6\u4f7f\u7528 ECDSA \u4e26\u6307\u5b9a\u9644\u52a0\u8981\u6c42\u3002\u6b64\u8655\u63d0\u4f9b\u4e86\u4f9b\u806f\u90a6\u653f\u5e9c\u4f7f\u7528\u7684\u63a8\u85a6\u6a62\u5713\u66f2\u7dda\u3002<br>ECDSA \u5bc6\u9470\u5c0d\u7531\u79c1\u9470d \u548c\u8207\u7279\u5b9a ECDSA \u57df\u53c3\u6578\u96c6\u76f8\u95dc\u806f\u7684\u516c\u9470Q \u7d44\u6210\uff1bd\u3001Q \u548c\u57df\u53c3\u6578\u5728\u6578\u5b78\u4e0a\u76f8\u4e92\u95dc\u806f\u3002\u79c1\u9470\u901a\u5e38\u4f7f\u7528\u4e00\u6bb5\u6642\u9593\uff08\u5373cryptoperiod\uff09\uff1b\u53ea\u8981\u4f7f\u7528\u95dc\u806f\u79c1\u9470\u751f\u6210\u7684\u6578\u5b57\u7c3d\u540d\u9700\u8981\u9a57\u8b49\uff08\u5373\uff0c\u516c\u9470\u53ef\u4ee5\u5728\u95dc\u806f\u79c1\u9470\u7684\u52a0\u5bc6\u671f\u4e4b\u5f8c\u7e7c\u7e8c\u4f7f\u7528\uff09\uff0c\u5c31\u53ef\u4ee5\u7e7c\u7e8c\u4f7f\u7528\u516c\u9470\u3002\u6709\u95dc\u9032\u4e00\u6b65\u6307\u5c0e\uff0c\u8acb\u53c3\u95b1 SP 800-57\u3002<br>ECDSA \u5bc6\u9470\u53ea\u80fd\u7528\u65bc ECDSA \u6578\u5b57\u7c3d\u540d\u7684\u751f\u6210\u548c\u9a57\u8b49\u3002<br>\u4f86\u6e90\uff1aFIPS 186-4<\/p>\n\n\n\n<p><strong>\u4f7f\u7528\u5bc6\u9470\u5c0d\u7684\u975e\u5c0d\u7a31\u52a0\u5bc6(Asymmetric Encryption Using Key Pairs)<\/strong><br>\u975e\u5c0d\u7a31\u52a0\u5bc6\u4e2d\u4f7f\u7528\u7684\u5bc6\u9470\u5c0d\u4e2d\u7684\u79c1\u9470\u6216\u516c\u9470\u53ea\u662f\u4e00\u500b\u4e8c\u9032\u5236\u4f4d\u5e8f\u5217\u3002\u7d66\u5b9a\u4e00\u500b\u516c\u9470\uff0c\u4f60\u6c38\u9060\u4e0d\u77e5\u9053\u5b83\u5c6c\u65bc\u8ab0\u3002\u5c01\u88dd\u5728\u7531\u53d7\u4fe1\u4efb\u7684\u8b49\u66f8\u9812\u767c\u6a5f\u69cb\u7c3d\u7f72\u7684\u6578\u5b57\u8b49\u66f8\u4e2d\u7684\u516c\u9470\u53ef\u4ee5\u3002\u5c01\u88dd\u5728\u7531\u53d7\u4fe1\u4efb\u7684\u8b49\u66f8\u9812\u767c\u6a5f\u69cb\u7c3d\u7f72\u7684\u6578\u5b57\u8b49\u66f8\u4e2d\u7684\u516c\u9470\u53ef\u4ee5\u3002\u56e0\u6b64\uff0c\u55ae\u7368\u7684\u516c\u9470\u4e0d\u80fd\u7528\u65bc\u8eab\u4efd\u9a57\u8b49\u548c\u4e0d\u53ef\u5426\u8a8d\u6027\u3002<\/p>\n\n\n\n<p><strong>IPsec \u548c\u4e0d\u53ef\u5426\u8a8d\u6027(IPsec and Non-repudiation)<\/strong><br>. \u4e0d\u53ef\u5426\u8a8d\u5305\u5f9e\u6280\u8853\u89d2\u5ea6\u4f86\u770b\u662f\u9060\u96e2\u7684\u4e0d\u53ef\u62b5\u8cf4\u6027\u7684\u6d88\u606f\u5f9e\u6cd5\u5f8b\u7684\u89d2\u5ea6\u3002<br>. \u5728\u65e9\u671f\uff0cCisco \u548c RFC 1826 \u8072\u660e IPsec \u652f\u6301\u4e0d\u53ef\u5426\u8a8d\u6027\u3002\u4f46\u662f\uff0c\u96a8\u5f8c\u7684 RFC\uff08RFC 2403 \u548c RFC 4302\uff09\u985b\u8986\u4e86\u9019\u4e00\u9ede\uff1a<\/p>\n\n\n\n<p><strong>RFC 1826 \u4e0d\u53ef\u5426\u8a8d\u6027(RFC 1826 for Non-repudiation)<\/strong><br>\u8a8d\u8b49\u982d\u662f\u4e00\u7a2e\u70ba IP \u6578\u64da\u5831\u63d0\u4f9b\u5f37\u5b8c\u6574\u6027\u548c\u8a8d\u8b49\u7684\u6a5f\u5236\u3002\u5b83\u9084\u53ef\u80fd\u63d0\u4f9b\u4e0d\u53ef\u5426\u8a8d\u6027\uff0c\u5177\u9ad4\u53d6\u6c7a\u65bc\u4f7f\u7528\u54ea\u7a2e\u52a0\u5bc6\u7b97\u6cd5\u4ee5\u53ca\u5982\u4f55\u57f7\u884c\u5bc6\u9470\u3002\u4f8b\u5982\uff0c\u4f7f\u7528\u975e\u5c0d\u7a31\u6578\u5b57\u7c3d\u540d\u7b97\u6cd5\uff08\u5982 RSA\uff09\u53ef\u4ee5\u63d0\u4f9b\u4e0d\u53ef\u5426\u8a8d\u6027\u3002(&nbsp;<a href=\"https:\/\/tools.ietf.org\/html\/rfc1826\" target=\"_blank\" rel=\"noreferrer noopener\">RFC 1826<\/a>&nbsp;)<br>\u4f46\u662f\uff0cRFC 2403 \u548c RFC 4302 \u985b\u8986\u4e86 AH \u63d0\u4f9b\u4e0d\u53ef\u5426\u8a8d\u6027\u7684\u8aaa\u6cd5\u3002<\/p>\n\n\n\n<p><strong>\u7528\u65bc\u8eab\u4efd\u9a57\u8b49\u7684 RFC 2402(RFC 2402 for Authentication)<\/strong><br>IP \u8a8d\u8b49\u982d (AH) \u7528\u65bc\u70ba IP \u6578\u64da\u5831\u63d0\u4f9b\u7121\u9023\u63a5\u5b8c\u6574\u6027\u548c \u6578\u64da\u6e90\u8a8d\u8b49\uff08\u4ee5\u4e0b\u7c21\u7a31\u201c\u8a8d\u8b49\u201d\uff09\uff0c\u4e26\u63d0\u4f9b\u9632\u6b62\u91cd\u653e\u7684\u4fdd\u8b77\u3002 (<a href=\"https:\/\/tools.ietf.org\/html\/rfc2402\" target=\"_blank\" rel=\"noreferrer noopener\">RFC 2402<\/a>&nbsp;)<\/p>\n\n\n\n<p><strong>RFC 4302 \u5b8c\u6574\u6027(RFC 4302 for Integrity)<\/strong><br>IP \u8a8d\u8b49\u982d (AH) \u7528\u65bc \u70ba IP \u6578\u64da\u5831\uff08\u4ee5\u4e0b\u7c21\u7a31\u201c\u5b8c\u6574\u6027\u201d\uff09\u63d0\u4f9b\u7121\u9023\u63a5\u5b8c\u6574\u6027\u548c \u6578\u64da\u6e90\u8a8d\u8b49\uff0c\u4e26\u63d0\u4f9b\u9632\u6b62\u91cd\u653e\u7684\u4fdd\u8b77\u3002(&nbsp;<a href=\"https:\/\/tools.ietf.org\/html\/rfc4302\" target=\"_blank\" rel=\"noreferrer noopener\">RFC 4302<\/a>&nbsp;)<br>\u6709\u95dc\u8a73\u7d30\u4fe1\u606f\uff0c\u8acb\u53c3\u95b1<a href=\"https:\/\/wentzwu.com\/2020\/07\/27\/ipsec-and-non-repudiation\/\" target=\"_blank\" rel=\"noreferrer noopener\">IPsec \u548c\u4e0d\u53ef\u5426\u8a8d\u6027<\/a>\u3002<\/p>\n\n\n\n<p><strong>\u53c3\u8003<\/strong><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Hotel_rating\" target=\"_blank\" rel=\"noreferrer noopener\">\u9152\u5e97\u8a55\u5206<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/RSA_(cryptosystem)\" target=\"_blank\" rel=\"noreferrer noopener\">RSA\uff08\u5bc6\u78bc\u7cfb\u7d71\uff09<\/a><br>.&nbsp;<a href=\"https:\/\/wentzwu.com\/2019\/09\/05\/non-repudiation\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u4e0d\u53ef\u5426\u8a8d\u6027<\/a><br>.&nbsp;<a href=\"https:\/\/wentzwu.com\/2020\/07\/27\/ipsec-and-non-repudiation\/\" target=\"_blank\" rel=\"noreferrer noopener\">IPsec \u548c\u4e0d\u53ef\u5426\u8a8d\u6027<\/a><\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/wentzwu.com\/2021\/04\/08\/cissp-practice-questions-20210409\/\" target=\"_blank\">Wentz Wu QOTD-20210409<\/a><\/p>\n\n\n\n<p>PS:\u6b64\u6587\u7ae0\u7d93\u904e\u4f5c\u8005\u540c\u610f\u520a\u767b \u4e26\u4e14\u6388\u6b0a\u53ef\u4ee5\u7ffb\u8b6f\u6210\u4e2d\u6587<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6a62\u5713\u66f2\u7dda\u6578\u5b57\u7c3d\u540d\u7b97\u6cd5 (ECDSA) \u662fFIPS 186-4\u6279\u51c6\u7684\u5408\u6cd5\u6578\u5b57\u7c3d\u540d\u7b97\u6cd5\u3002\u9019\u610f\u5473\u8457 ECDSA \u5728\u6280 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-535","post","type-post","status-publish","format-standard","hentry","category-cisspcertified-information-systems-security-professional"],"_links":{"self":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=535"}],"version-history":[{"count":2,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/535\/revisions"}],"predecessor-version":[{"id":2859,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/535\/revisions\/2859"}],"wp:attachment":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}