内容简介
本书讨论了未来“网际安全”的关键技术――基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向。
目录
 Contents
FOREWORD	4
ConTENTS	7
PART ONE	18
AUTHENTICATION TECHNIQUE	18
CHAPTER 1	19
BASIC ConCEPTS	19
1.1 PHYSICAL WORLD AND DIGITAL WORLD	19
1.2 A WORLD WITH ORDER AND WITHOUT ORDER	20
1.3 SELF-ASSURED PROOF AND 3RD PARTY PROOF	22
1.4 CERTIFICATION CHAIN AND TRUST CHAIN	24
1.5 CENTRALIZED AND DECENTRALIZED MANAGEMENT	25
1.6 PHYSICAL SIGNATURE AND DIGITAL SIGNATURE	27
CHAPTER 2	31
AUTHENTICATION LOGIC	31
2.1 BELIEF LOGIC	31
2.2 STANDARD PROTOCOL	32
2.3 TRUST RELATIonSHIP	33
2.3.1 Direct Trust	33
2.3.2 Axiomatic Trust	34
2.3.3 Inference Trust	35
2.4 TRUST LOGIC	36
2.4.1 The requirement of Trust Logic	36
2.3.2 The Progress in Public Key	37
2.4.3 Entity Authenticity	38
2.4.4 The Characteristics of Trust Logic	39
2.5 CPK PROTOCOL	40
2.5.1 One-way Protocol	40
2.5.2 Two-way Protocol	41
CHAPTER 3	43
IDENTITY AUTHENTICATION	43
3.1 COMMUNICATION IDENTITY AUTHENTICATION	44
3.2 SOFTWARE IDENTITY AUTHENTICATION	45
3.3 ELECTRonIC TAG AUTHENTICATION	46
3.4 NETWORK MANAGEMENT	47
3.5 HOLISTIC SECURITY	48
PART TWO	51
CRYPTO-SYSTEMS	51
CHAPTER 4	52
COMBINED PUBLIC KEY (CPK)	52
4.1 INTRODUCTION	52
4.2 ECC COMPOUND THEOREM	53
4.3 IDENTITY-KEY	53
4.3.1 Combining Matrix	53
4.3.2 Mapping from Identity to Matrix Coordinates	54
4.3.3 Computation of Identity-Key	54
4.4. KEY COMPOUNDING	54
4.4.1 The Compounding of Identity-Key and Accompanying-Key	54
4.4.2 The Compounding of Identity-Key and Separating-key	55
4.5 CPK DIGITAL SIGNATURE	55
4.5.1 Signing with Accompanying-Key	55
4.5.2 Signing with Separating-key	55
4.6 CPK KEY EXCHANGE	56
4.6.1 Key Exchange with Separating-key	56
4.6.2 Key Exchange with Accompanying-Key	56
4.7 ConCLUSION	56
CHAPTER 5	58
SELF-ASSURED AND 3RD PARTY PUBLIC KEY	58
5.1 NEW REQUIREMENTS OF THE CRYPTO-SYSTEM	58
5.2 DEVELOPMENT OF CRYPTO-SYSTEMS	59
5.3 DIGITAL SIGNATURE MECHANISM	60
5.3.1 IBC Signature Scheme	60
5.3.2 CPK Signature with Separating-key	61
5.3.3 CPK Signature with Accompanying-Key	61
5.3.4 PKI Signature Scheme	61
5.3.5 IB-RSA Signature Scheme	62
5.3.6 mRSA Signature Scheme	63
5.3.7 Comparison of Schemes	63
5.4 KEY EXCHANGE SCHEME	64
5.4.1 IBE Key Exchange	64
5.4.2 CPK Key Exchange	64
5.4.3 Other Key Exchange Schemes	65
5.4.4 Performance Comparison	65
5.5 DISCUSSION ON TRUST ROOT	66
CHAPTER 6	68
BYTES ENCRYPTION	68
6.1 TECHNICAL BACKGROUND	68
6.2 CODING STRUCTURE	70
6.2.1 Transposition Table (disk)	70
6.2.2 Substitution Table (subst)	72
6.3 8-BIT OPERATION	74
6.3.1 Assumptions	74
6.3.2 Key Derivation	75
6.3.3 Combination of Data and Keys	75
6.3.4 Left Shift Accumulation	76
6.3.5 Transposition Conversion	76
6.3.6 Single Substitution Conversion	77
6.3.7 Re-combination of Data and Keys	77
6.3.8 Right Shift Accumulation	78
6.3.9



   VIP会员