CPK公钥体制与标识鉴别

价格 98.00对比
发货 广东东莞市
销量 暂无
评价 已有 0 条评价
人气 已有 5 人关注
数量
+-
库存100
 
联系方式
加关注0

新图书资料发布

VIP   VIP会员第1年
资料未认证
保证金未缴纳

内容简介

本书讨论了未来“网际安全”的关键技术――基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向

目录

Contents
Part oneAuthentication Technology
Chapter 1Basic Concepts
11Physical World and Digital World
12A World with Order and without Order
13Selfassured Proof and 3rd Party Proof
14Certification Chain and Trust Chain
15Centralized and Decentralized Management
16Physical Signature and Digital Signature
Chapter 2Authentication Logics
21Belief Logic
211The Model
212The Formulae
213The Characteristics of Belief Logic
22Trust Logic
221Direct Trust
222Axiomatic Trust
223Inference Trust
224Behavior based Trust
225Characteristics of Trust Logic
23Truth Logic
231The Needs of "Preproof"
232Entity Authenticity
233The Characteristics of Truth Logic
24Authentication Protocols
241Standard Protocol
242CPK Protocol
25Authentication Systems
251PKI Certification System
252CPK Authentication System
Chapter 3Identity Authentication
31Communication Identity Authentication
32Software Identity Authentication
33Electronic Tag Authentication
34Network Management
35Holistic Security
Part TwoCryptosystems
Chapter 4Combined Public Key (v60)
41Introduction
42Mapping Functoin
43Computation of Keys
431Computation of Identitykey
432Computation of Separatingkey
433Computation of Generalkey
434Computation of Districtkey
44Digital Signature and Key Delivery
441Digital Signature
442Key Delivery
45Security
46Conclusion
Chapter 5Cryptosystem and Authentication
51New Requirements for Cryptosystem
52Development of Cryptosystems
53Identity Authentication Schemes
531Identity Authentication with IBC
532Identity Authentication with CPK
533Identity Authentication with PKI
534Identity Authentication with IBRSA
535Identity Authentication with mRSA
536Comparison of Schemes
54Key Delivery Schemes
541IBE Key Delivery
542CPK Key Delivery
543Other Key Delivery Schemes
544Performance Comparison
55Discussion on Trust Root
Chapter 6Bytes Encryption
61Coding Structure
611Permutation Table (disk)
612Substitution Table (subst)
613Key Structure
62Working Flow
621Given Conditions
622Key Derivation
623Data Expansion
624Compound of Data and Key
625Left Shift Accumulation
626Permutation
627Right Shift Accumulation
628Data Concentration
629Single Substitution
6210Compound of Data and Key
63Security Analysis
Part ThreeCPK System
Chapter 7CPK Key Management
71CPK Key Distribution
711Authentication Network
712Communication Key
713Classification of Keys
72CPK Signature
721Digital Signature and Verification
722Signature

举报收藏 0
网站首页  |  关于我们  |  联系方式  |  用户协议  |  隐私政策  |  版权声明  |  网站地图  |  排名推广  |  广告服务  |  积分换礼  |  网站留言  |  RSS订阅  |  违规举报  |  粤ICP备2021111040号