请输入您要查询的百科知识:

 

词条 标识鉴别:网际安全技术基础
释义

图书信息

书 名: 标识鉴别:网际安全技术基础

作 者:南相浩

出版社: 电子工业出版社

出版时间: 2011年6月1日

ISBN: 9787121134791

开本: 16开

定价: 88.00元

内容简介

本书讨论了未来“网际安全”的关键技术――基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向

图书目录

Contents

Part OneAuthentication Technology

Chapter 1Basic Concepts

1?1Physical World and Digital World

1?2A World with Order and without Order

1?3Self?assured Proof and 3rd Party Proof

1?4Certification Chain and Trust Chain

1?5Centralized and Decentralized Management

1?6Physical Signature and Digital Signature

Chapter 2Authentication Logics

2?1Belief Logic

2?1?1The Model

2?1?2The Formulae

2?1?3The Characteristics of Belief Logic

2?2Trust Logic

2?2?1Direct Trust

2?2?2Axiomatic Trust

2?2?3Inference Trust

2?2?4Behavior Based Trust

2?2?5Characteristics of Trust Logic

2?3Truth Logic

2?3?1The Needs of Truth Logic

2?3?2Entity Authenticity

2?3?3The Characteristics of Truth Logic

2?4Authentication Protocols

2?4?1Standard Protocol

2?4?2CPK Protocol

2?5Authentication Systems

2?5?1PKI Certification System

2?5?2CPK Authentication System

Chapter 3Identity Authentication

3?1Communication Identity Authentication

3?2Software Identity Authentication

3?3Electronic Tag Authentication

3?4Network Management

3?5Holistic Security

Part TwoCryptosystems

Chapter 4Combined Public Key (v6?0)

4?1Introduction

4?2Mapping Function

4?3Computation of Keys

4?3?1Computation of Identity?Key

4?3?2Computation of Separating?key

4?3?3Computation of General?key

4?3?4Computation of District?key

4?4Digital Signature and Key Delivery

4?4?1Digital Signature

4?4?2Key Delivery

4?5Security

Conclusion

Chapter 5Cryptosystem and Authentication

5?1New Requirements for Cryptosystem

5?2Development of Cryptosystems

5?3Identity Authentication Schemes

5?3?1Identity Authentication with IBC

5?3?2Identity Authentication with CPK

5?3?3Identity Authentication with PKI

5?3?4Identity Authentication with IB?RSA

5?3?5Identity Authentication with mRSA

5?3?6Comparison of Schemes

5?4Key Delivery Schemes

5?4?1IBE Key Delivery

5?4?2CPK Key Delivery

5?4?3Other Key Delivery Schemes

5?4?4Performance Comparison

5?5Related Discussions

5?5?1Discussion on Trust Root

5?5?2Discussion on Quantum Attack

Chapter 6Bytes Encryption

6?1Coding Structure

6?1?1Permutation Table (disk)

6?1?2Substitution Table (subst)

6?1?3Key Structure

6?2Working Flow

6?2?1Given Conditions

6?2?2Key Derivation

6?2?3Data Expansion

6?2?4Compound of Data and Key

6?2?5Left Shift Accumulation

6?2?6Permutation

6?2?7Right Shift Accumulation

6?2?8Data Concentration

6?2?9Single Substitution

6?2?10Compound of Data and Key

6?3Security Analysis

Part ThreeCPK System

Chapter 7CPK Key Management

7?1CPK Key Distribution

7?1?1Authentication Network

7?1?2Communication Key

7?1?3Classification of Keys

7?2CPK Signature

7?2?1Digital Signature and Verification

7?2?2Signature Format

7?3CPK Key Delivery

7?4CPK Data Encryption

7?5Key Protection

7?5?1Password Verification

7?5?2Password Change

Chapter 8CPK?chip Design

8?1Background

8?2Main Technology

8?3Chip Structure

8?4Main Functions

8?4?1Digital Signature

8?4?2Data Encryption

Chapter 9CPK ID?card

9?1Background

9?2ID?card Structure

9?2?1The Part of Main Body

9?2?2The Part of Variables

9?3ID?card Data Format

9?4ID?card Management

9?4?1Administrative Organization

9?4?2Application for ID?card

9?4?3Registration Department

9?4?4Production Department

9?4?5Issuing Department

Part FourCode Authentication

Chapter 10Software ID Authentication

10?1Technical Background

10?2Main Technology

10?3Signing Module

10?4Verifying Module

10?5The Feature of Code Signing

Chapter 11Windows Code Authentication

11?1Introduction

11?2PE File

11?3Mini?filter

11?3?1NT I/O Subsystem

11?3?2File Filter Driving

11?3?3Mini?filter

11?4Code Authentication of Windows

11?4?1The System Framework

11?4?2Characteristics Collecting

11?5Conclusion

Chapter 12Linux Code Authentication

12?1General Description

12?2ELF File

12?3Linux Security Module (LSM) Framework

12?4Implementation

Part FiveCommunication Authentication

Chapter 13Phone Authentication

13?1Main Technologies

13?2Connecting Procedure

13?3Data Encryption

13?4Data Decryption

Chapter 14SSL Communication Authentication

14?1Layers of Communication

14?2Secure Socket Layer (SSL)

14?3Authenticated Socket Layer (ASL)

14?4TSL Working Principle

14?5ASL Address Authentication

14?6Comparison

Chapter 15Router Communication Authentication

15?1Principle of Router

15?2Requirements of Authenticated Connection

15?3Fundamental Technology

15?4Origin Address Authentication

15?5Encryption Function

15?5?1Encryption Process

15?5?2Decryption Process

15?6Requirement of Header Format

15?7Computing Environment

15?7?1Evidence of Software Code

15?7?2Authentication of Software Code

Conclusion

Part Sixe?Commerce Authentication

Chapter 16e?Bank Authentication

16?1Background

16?2Counter Business

16?3Business Layer

16?4Basic Technology

16?5Business at ATM

16?6Communication Between ATM and Portal

16?7The Advantages

Chapter 17e?Bill Authentication

17?1Bill Authentication Network

17?2Main Technologies

17?3Application for Bills

17?4Circulation of Bills

17?5Verification of Check

Part SevenLogistics Authentication

Chapter 18e?Tag Authentication

18?1Background

18?2Main Technology

18?3Embodiment (Ⅰ)

18?4Embodiment (Ⅱ)

Chapter 19e?Wallet Authentication

19?1Two Kinds of Authentication Concept

19?2System Configuration

19?3Tag Structure

19?3?1Structure of Data Region

19?3?2Structure of Control Region

19?4Tag Data Generation and Authentication

19?4?1KMC

19?4?2Enterprise

19?4?3Writer and Reader

19?5Protocol Design

19?6Conclusion

Part EightStored File Authentication

Chapter 20Storage Authentication

20?1Security Requirements

20?2Basic Technology

20?3File Uploading Protocol

20?4File Downloading Protocol

20?5Data Storing

20?5?1Establishment of Key File

20?5?2Storage of Key File

20?5?3Documental Database Encryption

20?5?4Relational Database Encryption

Chapter 21Secure File Box

21?1Background

21?2System Framework

21?3Features of the System

21?4System Implementation

·ⅩⅦ·Chapter 22Classification Seal Authentication

22?1Background Technology

22?2Main Technologies

22?3Working Flow

22?4Embodiment

22?5Explanation

Part NineMoving Data Authentication

Chapter 23e?Mail Authentication

23?1Main Technologies

23?2Sending Process

23?3Receiving Process

Chapter 24Digital Right Authentication

24?1Technical Background

24?2Main Technologies

24?3Manufacturer′s Digital Right

24?4Enterprise′s Right of Operation

24?5Client′s Right of Usage

Part TenNetwork Authentication

Chapter 25Pass Authentication

25?1Background

25?2Working Principles

25?3The Diagram of Gate?guard

25?4Gate?guard for Individual PC

25?5Guarding Policy

·ⅩⅧ·Chapter 26Address Authentication

26?1Background

26?2Main Problems

26?3Technical Approach

26?3?1CPK Cryptosystem

26?3?2New Routing Protocol

26?3?3Computing Environment

26?4New Prototype of Router

PostscriptNew Trend of Information Security

Appendices

·ⅩⅦ·Appendix A

Walk Out of Mysterious "Black Chamber"

Appendix B

Identity Authentication Opening a New Land for Information Security

Appendix C

Searching for Safe "Silver Bullet"

Appendix D

"Electronic?ID Card" Attracts International Attention

Appendix E

CPK System Goes to the World

Appendix F

Identity Authentication Based on CPK System

Appendix G

CPK Cryptosystem

References

Glossary

Technical Terms

Symbols

随便看

 

百科全书收录4421916条中文百科知识,基本涵盖了大多数领域的百科知识,是一部内容开放、自由的电子版百科全书。

 

Copyright © 2004-2023 Cnenc.net All Rights Reserved
更新时间:2025/2/25 6:01:13