内容简介
本书讨论了未来“网际安全”的关键技术――基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向
目录
Contents
Part oneAuthentication Technology
Chapter 1Basic Concepts
11Physical World and Digital World
12A World with Order and without Order
13Selfassured Proof and 3rd Party Proof
14Certification Chain and Trust Chain
15Centralized and Decentralized Management
16Physical Signature and Digital Signature
Chapter 2Authentication Logics
21Belief Logic
211The Model
212The Formulae
213The Characteristics of Belief Logic
22Trust Logic
221Direct Trust
222Axiomatic Trust
223Inference Trust
224Behavior based Trust
225Characteristics of Trust Logic
23Truth Logic
231The Needs of "Preproof"
232Entity Authenticity
233The Characteristics of Truth Logic
24Authentication Protocols
241Standard Protocol
242CPK Protocol
25Authentication Systems
251PKI Certification System
252CPK Authentication System
Chapter 3Identity Authentication
31Communication Identity Authentication
32Software Identity Authentication
33Electronic Tag Authentication
34Network Management
35Holistic Security
Part TwoCryptosystems
Chapter 4Combined Public Key (v60)
41Introduction
42Mapping Functoin
43Computation of Keys
431Computation of Identitykey
432Computation of Separatingkey
433Computation of Generalkey
434Computation of Districtkey
44Digital Signature and Key Delivery
441Digital Signature
442Key Delivery
45Security
46Conclusion
Chapter 5Cryptosystem and Authentication
51New Requirements for Cryptosystem
52Development of Cryptosystems
53Identity Authentication Schemes
531Identity Authentication with IBC
532Identity Authentication with CPK
533Identity Authentication with PKI
534Identity Authentication with IBRSA
535Identity Authentication with mRSA
536Comparison of Schemes
54Key Delivery Schemes
541IBE Key Delivery
542CPK Key Delivery
543Other Key Delivery Schemes
544Performance Comparison
55Discussion on Trust Root
Chapter 6Bytes Encryption
61Coding Structure
611Permutation Table (disk)
612Substitution Table (subst)
613Key Structure
62Working Flow
621Given Conditions
622Key Derivation
623Data Expansion
624Compound of Data and Key
625Left Shift Accumulation
626Permutation
627Right Shift Accumulation
628Data Concentration
629Single Substitution
6210Compound of Data and Key
63Security Analysis
Part ThreeCPK System
Chapter 7CPK Key Management
71CPK Key Distribution
711Authentication Network
712Communication Key
713Classification of Keys
72CPK Signature
721Digital Signature and Verification
722Signature