1个简短介绍CLI OpenSSL。。。。。。。。。。。。。。。。。。。。。。。。。。5 1.1打印所有OpenSSL命令。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。6 1.2对称加密使用OpenSSL。。。。。。。。。。。。。。。。。。。。。。。。。。。。。7 1.2.1生成一个随机会话密钥,用于AES。。。。。。。。。。。。。。。。。。。。。。7 1.2.2使用随机会话密钥加密AE。。。。。。。。。。。。。。。。。。。。。。。。7 1.2.3使用密码(变体2)加密AES。。。。。。。。。。。。。。。。。。。。。。。。7 1.2.4使用AES-256解密文件。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。8 1.3使用OpenSSL的非对称加密:密钥生成。。。。。。。。。。。。。。。。。。。。。。。。8 1.3.1生成长度2048位的私有RSA键。。。。。。。。。。。。。。。。。。。。8 1.3.2 OpenSSL文件“私钥”。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。9 1.3.3 OpenSSL文件“公共密钥”。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。10 1.4使用OpenSSL非对称加密:仍然没有混合加密。。。。。。。。。。。。。。。10 1.4.1使用RSA加密(无教科书RSA)。。。。。。。。。。。。。。。。。。。。。。。。。。11 1.4.2用RSA解密(无教科书RSA)。。。。。。。。。。。。。。。。。。。。。。。。。。11 1.5与OpenSSL的混合加密。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。11 1.5.1接收器BOB的预交:密钥生成(RSA)。。。。。。。。。。。。。。。。。。。。。。12 1.5.2加密:爱丽丝发件人站点的三个任务。。。。。。。。。。。。。。。。。。。。。。12 1.5.3解密:接收器鲍勃站点的两个任务。。。。。。。。。。。。。。。。。。。。。12 1.6将私有PEM文件的所有密钥显示为十进制数字(使用自己的Python脚本)。。。。12 1.7将PEM文件的密钥显示为十进制数字(通过rsactftool)。。。。。。。。。。。。。。。。13 1.8先前OpenSSL命令的概述(作为列表和Shell脚本)。。。。。。。。。。。。14 1.9带有OpenSSL和自己的Python脚本的教科书RSA。。。。。。。。。。。。。。。。。。。。。17 1.10生成随机数。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。18 1.11使用OpenSSL生成质数。。。。。。。。。。。。。。。。。。。。。。。。。。。19 1.12将密码速度与OpenSSL进行比较。。。。。。。。。。。。。。。。。。。。。。。。。。。。20 1.13检索和评估证书。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。22 1.14在Cryptool-Online(CTO)中openssl 3。。。。。。。。。。。。。。。。。。。。。。。。。。。27 1.15本附录1的Web链接。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。。34
Introduction ..................................................................................................................................................................... 2 About this Document ....................................................................................................................................................... 2免责声明...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................General ................................................................................................................................................................... 5 2.加密模块接口...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................Roles, Services, and Authentication .................................................................................................................... 13 4.1 Roles ..................................................................................................................................................................... 13 4.2 Authentication ..................................................................................................................................................... 13 4.3 Services ................................................................................................................................................................. 13 5.Cryptographic Module Specification ..................................................................................................................... 6 2.1 Overall Security Design and Rules of Operation ................................................................................................. 11 2.1.1 Usage of AES-GCM .................................................................................................................................................... 11 2.1.2 RSA and ECDSA Keys ................................................................................................................................................. 11 2.1.3 CSP Sharing ............................................................................................................................................................... 11 2.1.4 Modes of Operation ................................................................................................................................................. 11 3.Software/Firmware Security ................................................................................................................................ 17 5.1 Module Format .................................................................................................................................................... 17 6.Operational Environment .................................................................................................................................... 17 7.Physical Security ................................................................................................................................................... 17 8.Non-invasive Security ........................................................................................................................................... 17 9.Sensitive Security Parameter Management ........................................................................................................ 18 10.Self-Tests .............................................................................................................................................................. 22 10.1 Pre-Operational Self-Tests ................................................................................................................................... 22 10.2 Conditional Self-Tests .......................................................................................................................................... 22 11.Life-Cycle Assurance............................................................................................................................................. 24 11.1 Installation Instructions ....................................................................................................................................... 24 11.1.1 Building for Android ............................................................................................................................................ 24 11.1.2 Building for Linux................................................................................................................................................. 25 11.1.3 Retrieving Module Name and Version .................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................Mitigation of Other Attacks ................................................................................................................................. 26 References and Standards ..................................................................................................................................................... 27 Acronyms ...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Table of Contents FIPS 140-2 Overview ............................................................................................................................................................ 6 1.Introduction ................................................................................................................................................................. 7 1.1 Scope ................................................................................................................................................................... 7 1.2 Module Overview ................................................................................................................................................. 7 1.3 Module Boundary ................................................................................................................................................ 8 2.Security Level ............................................................................................................................................................... 9 3.Tested Configurations ................................................................................................................................................ 10 4.Ports and Interfaces ................................................................................................................................................... 11 5.Physical Security......................................................................................................................................................... 15 7.Roles, Services and Authentication............................................................................................................................. 12 5.1 Roles .................................................................................................................................................................. 12 5.2 Services ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................Operational Environment ........................................................................................................................................... 16 8.加密算法和钥匙管理........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... 17 8.1加密算法..................................................................... .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................电磁干扰/电磁兼容性(EMI/EMC)...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................Self-tests .................................................................................................................................................................... 30
对于使用OpenSL的安全功能的所有产品,应适用以下内容:该产品包括由OpenSSL项目开发的软件,可用于OpenSSL Toolkit(www.openssl.org),由Eric Young(Eay@cryptsoft.com)撰写的加密软件和Bodo Moeller开发的软件。
摘要 - Quantum密钥分布(QKD)承诺信息理论安全性,但是将QKD集成到TLS等现有协议中,由于其根本不同的操作模型,仍然具有挑战性。在本文中,我们提出了一种混合QKD-KEM协议,采用两种不同的集成方法:一种与ETSI 004和014规格兼容的客户端启动流,以及类似于现有工作的服务器发射的流量,但与无状态ETSI 014 API相似。与以前的实现不同,我们的工作专门解决了对生产QKD网络至关重要的状态QKD密钥交换协议(ETSI 004)的集成。通过调整OpenSL的提供商基础架构以适应QKD的预分配密钥模型,我们在提供双层安全性的同时,保持与当前TLS实现的兼容性。绩效评估证明了我们的混合方案具有可接受的开销的可行性,这表明针对量子威胁的强大安全性是可以实现的,同时解决了不同QKD API规格的唯一要求。索引术语 - POST-量词加密,PQC,QKD,TLS,OpenSSL
•本文档的目的。•与本文档内容有关的HPE文档。•在哪里可以获取其他HPE Aruba网络产品信息。•首字母缩写和缩写。•FIPS 140-3标准中所述的每个区域的保证安全级别。此版本补充剂提供有关HEWLETT PACKARD ENTERPRISE OPENSL 3提供商软件版本3.1.4A FIPS 140-3级别1级验证的信息。HPE Aruba Networking是一家Hewlett Packard Enterprise Company。此补充中的材料修改了本产品中包含的一般惠普企业软件文档,应与您的惠普packard企业产品文档一起保存。此补充主要涵盖了惠普企业Openssl 3提供商模块软件版本3.1.4a的非专有密码模块安全策略。此安全策略描述了该模块如何满足FIPS 140-3级别1的安全要求,以及如何在安全FIPS 140-3模式下放置和维护模块。本政策是作为FIPS 140-3级验证产品验证的一部分准备的。FIPS 140-3(联邦信息处理标准出版物140-3,密码模块的安全要求)详细介绍了美国政府对加密模块的要求。fips 140-3与ISO/IEC 19790:2012(e)保持一致,并包括允许进入加密模块验证程序(CMVP)的附件的修改,作为验证授权。本文确定的产品包含机密的商业软件。对这些要求的测试将符合ISO/IEC 24759:2017(e),以及供应商证据的修改,加法或删除,并根据第5.2段作为验证授权允许进行测试。有关FIPS 140-3标准和验证计划的更多信息可在国家标准技术研究所(NIST)网站上获得:https://csrc.nist.gov/project/project/cryptographic-module-module-validation-module-validation-program。 hpe openssl。本文档可以自由复制和分发完整,完整完整,包括版权通知。需要有效的许可证。版权所有©2024 Hewlett Packard Enterprise Company。Hewlett Packard Enterprise Company商标包括HPEArubaNetworking®,HPE Aruba WirelessNetworks®,注册的HPE Aruba网络移动边缘公司徽标,HPE Aruba Networking Mobility ManagementSystems®,Mobile Edge EdgeArchitection®网络必须跟随®,RFPROTECT®,GreenIsland®。保留所有权利。所有其他商标都是其各自所有者的财产。HPE Aruba Networking是一家Hewlett Packard Enterprise Company。
𝑃𝑣+𝑜=𝑃𝑣+++𝑃'(𝑜,𝑣)=𝑦是𝑚变量中的𝑚方程的线性系统。如果系统没有解决方案,请重试新的𝑣