内容简介
本书讨论了未来“网际安全”的关键技术――基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向。
目录
Contents
FOREWORD 4
ConTENTS 7
PART ONE 18
AUTHENTICATION TECHNIQUE 18
CHAPTER 1 19
BASIC ConCEPTS 19
1.1 PHYSICAL WORLD AND DIGITAL WORLD 19
1.2 A WORLD WITH ORDER AND WITHOUT ORDER 20
1.3 SELF-ASSURED PROOF AND 3RD PARTY PROOF 22
1.4 CERTIFICATION CHAIN AND TRUST CHAIN 24
1.5 CENTRALIZED AND DECENTRALIZED MANAGEMENT 25
1.6 PHYSICAL SIGNATURE AND DIGITAL SIGNATURE 27
CHAPTER 2 31
AUTHENTICATION LOGIC 31
2.1 BELIEF LOGIC 31
2.2 STANDARD PROTOCOL 32
2.3 TRUST RELATIonSHIP 33
2.3.1 Direct Trust 33
2.3.2 Axiomatic Trust 34
2.3.3 Inference Trust 35
2.4 TRUST LOGIC 36
2.4.1 The requirement of Trust Logic 36
2.3.2 The Progress in Public Key 37
2.4.3 Entity Authenticity 38
2.4.4 The Characteristics of Trust Logic 39
2.5 CPK PROTOCOL 40
2.5.1 One-way Protocol 40
2.5.2 Two-way Protocol 41
CHAPTER 3 43
IDENTITY AUTHENTICATION 43
3.1 COMMUNICATION IDENTITY AUTHENTICATION 44
3.2 SOFTWARE IDENTITY AUTHENTICATION 45
3.3 ELECTRonIC TAG AUTHENTICATION 46
3.4 NETWORK MANAGEMENT 47
3.5 HOLISTIC SECURITY 48
PART TWO 51
CRYPTO-SYSTEMS 51
CHAPTER 4 52
COMBINED PUBLIC KEY (CPK) 52
4.1 INTRODUCTION 52
4.2 ECC COMPOUND THEOREM 53
4.3 IDENTITY-KEY 53
4.3.1 Combining Matrix 53
4.3.2 Mapping from Identity to Matrix Coordinates 54
4.3.3 Computation of Identity-Key 54
4.4. KEY COMPOUNDING 54
4.4.1 The Compounding of Identity-Key and Accompanying-Key 54
4.4.2 The Compounding of Identity-Key and Separating-key 55
4.5 CPK DIGITAL SIGNATURE 55
4.5.1 Signing with Accompanying-Key 55
4.5.2 Signing with Separating-key 55
4.6 CPK KEY EXCHANGE 56
4.6.1 Key Exchange with Separating-key 56
4.6.2 Key Exchange with Accompanying-Key 56
4.7 ConCLUSION 56
CHAPTER 5 58
SELF-ASSURED AND 3RD PARTY PUBLIC KEY 58
5.1 NEW REQUIREMENTS OF THE CRYPTO-SYSTEM 58
5.2 DEVELOPMENT OF CRYPTO-SYSTEMS 59
5.3 DIGITAL SIGNATURE MECHANISM 60
5.3.1 IBC Signature Scheme 60
5.3.2 CPK Signature with Separating-key 61
5.3.3 CPK Signature with Accompanying-Key 61
5.3.4 PKI Signature Scheme 61
5.3.5 IB-RSA Signature Scheme 62
5.3.6 mRSA Signature Scheme 63
5.3.7 Comparison of Schemes 63
5.4 KEY EXCHANGE SCHEME 64
5.4.1 IBE Key Exchange 64
5.4.2 CPK Key Exchange 64
5.4.3 Other Key Exchange Schemes 65
5.4.4 Performance Comparison 65
5.5 DISCUSSION ON TRUST ROOT 66
CHAPTER 6 68
BYTES ENCRYPTION 68
6.1 TECHNICAL BACKGROUND 68
6.2 CODING STRUCTURE 70
6.2.1 Transposition Table (disk) 70
6.2.2 Substitution Table (subst) 72
6.3 8-BIT OPERATION 74
6.3.1 Assumptions 74
6.3.2 Key Derivation 75
6.3.3 Combination of Data and Keys 75
6.3.4 Left Shift Accumulation 76
6.3.5 Transposition Conversion 76
6.3.6 Single Substitution Conversion 77
6.3.7 Re-combination of Data and Keys 77
6.3.8 Right Shift Accumulation 78
6.3.9