图书介绍
标识鉴别 网际安全技术基础PDF|Epub|txt|kindle电子书版本网盘下载
![标识鉴别 网际安全技术基础](https://www.shukui.net/cover/71/33822632.jpg)
- 南相浩著 著
- 出版社: 北京:电子工业出版社
- ISBN:9787121134791
- 出版时间:2011
- 标注页数:264页
- 文件大小:13MB
- 文件页数:285页
- 主题词:计算机网络-安全技术-英文
PDF下载
下载说明
标识鉴别 网际安全技术基础PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Part One Authentication Technology2
Chapter 1 Basic Concepts2
1.1 Physical World and Digital World2
1.2 A World with Order and without Order3
1.3 Self-assured Proof and 3rd Party Proof4
1.4 Certification Chain and Trust Chain7
1.5 Centralized and Decentralized Management8
1.6 Physical Signature and Digital Signature9
Chapter 2 Authentication Logics13
2.1 Belief Logic14
2.1.1 The Model14
2.1.2 The Formulae14
2.1.3 The Characteristics of Belief Logic15
2.2 Trust Logic15
2.2.1 Direct Trust15
2.2.2 Axiomatic Trust16
2.2.3 Inference Trust16
2.2.4 Behavior Based Trust17
2.2.5 Characteristics of Trust Logic18
2.3 Truth Logic19
2.3.1 The Needs of Truth Logic19
2.3.2 Entity Authenticity19
2.3.3 The Characteristics of Truth Logic22
2.4 Authentication Protocols23
2.4.1 Standard Protocol23
2.4.2 CPK Protocol24
2.5 Authentication Systems25
2.5.1 PKI Certification System26
2.5.2 CPK Authentication System27
Chapter 3 Identity Authentication29
3.1 Communication Identity Authentication29
3.2 Software Identity Authentication31
3.3 Electronic Tag Authentication32
3.4 Network Management33
3.5 Holistic Security34
Part Two Cryptosystems38
Chapter4 Combined Public Key(v6.0)38
4.1 Introduction38
4.2 Mapping Function39
4.3 Computation of Keys39
4.3.1 Computation of Identity-Key39
4.3.2 Computation of Separating-key40
4.3.3 Computation of General-key40
4.3.4 Computation of District-key40
4.4 Digital Signature and Key Delivery41
4.4.1 Digital Signature41
4.4.2 Key Delivery41
4.5 Security42
Conclusion42
Chapter 5 Cryptosystem and Authentication43
5.1 New Requirements for Cryptosystem43
5.2 Development of Cryptosystems44
5.3 Identity Authentication Schemes45
5.3.1 Identity Authentication with IBC45
5.3.2 Identity Authentication with CPK46
5.3.3 Identity Authentication with PKI47
5.3.4 Identity Authentication with IB-RSA48
5.3.5 Identity Authentication with mRSA48
5.3.6 Comparison of Schemes49
5.4 Key Delivery Schemes49
5.4.1 IBE Key Delivery49
5.4.2 CPK Key Delivery50
5.4.3 Other Key Delivery Schemes51
5.4.4 Performance Comparison52
5.5 Related Discussions52
5.5.1 Discussion on Trust Root52
5.5.2 Discussion on Quantum Attack53
Chapter 6 Bytes Encryption55
6.1 Coding Structure55
6.1.1 Permutation Table(disk)55
6.1.2 Substitution Table(subst)56
6.1.3 Key Structure57
6.2 Working Flow58
6.2.1 Given Conditions58
6.2.2 Key Derivation59
6.2.3 Data Expansion59
6.2.4 Compound of Data and Key59
6.2.5 Left Shift Accumulation60
6.2.6 Permutation60
6.2.7 Right Shift Accumulation60
6.2.8 Data Concentration60
6.2.9 Single Substitution61
6.2.10 Compound of Data and Key61
6.3 Security Analysis61
Part Three CPK System64
Chapter 7 CPK Key Management64
7.1 CPK Key Distribution64
7.1.1 Authentication Network64
7.1.2 Communication Key65
7.1.3 Classification of Keys65
7.2 CPK Signature66
7.2.1 Digital Signature and Verification66
7.2.2 Signature Format67
7.3 CPK Key Delivery67
7.4 CPK Data Encryption68
7.5 Key Protection68
7.5.1 Password Verification69
7.5.2 Password Change69
Chapter 8 CPK-chip Design70
8.1 Background70
8.2 Main Technology70
8.3 Chip Structure72
8.4 Main Functions75
8.4.1 Digital Signature75
8.4.2 Data Encryption76
Chapter 9 CPK ID-card78
9.1 Background78
9.2 ID-card Structure79
9.2.1 The Part of Main Body80
9.2.2 The Part of Variables80
9.3 ID-card Data Format81
9.4 ID-card Management83
9.4.1 Administrative Organization83
9.4.2 Application for ID-card84
9.4.3 Registration Department85
9.4.4 Production Department86
9.4.5 Issuing Department88
Part Four Code Authentication90
Chapter 10 Software ID Authentication90
10.1 Technical Background90
10.2 Main Technology91
10.3 Signing Module92
10.4 Verifying Module93
10.5 The Feature of Code Signing95
Chapter 11 Windows Code Authentication97
11.1 Introduction97
11.2 PE File97
11.3 Mini-filter98
11.3.1 NT I/O Subsystem98
11.3.2 File Filter Driving99
11.3.3 Mini-filter100
11.4 Code Authentication of Windows101
11.4.1 The System Framework101
11.4.2 Characteristics Collecting101
11.5 Conclusion101
Chapter 12 Linux Code Authentication102
12.1 General Description102
12.2 ELF File102
12.3 Linux Security Module(LSM)Framework103
12.4 Implementation104
Part Five Communication Authentication108
Chapter 13 Phone Authentication108
13.1 Main Technologies108
13.2 Connecting Procedure109
13.3 Data Encryption110
13.4 Data Decryption111
Chapter 14 SSL Communication Authentication112
14.1 Layers of Communication112
14.2 Secure Socket Layer(SSL)113
14.3 Authenticated Socket Layer(ASL)115
14.4 TSL Working Principle116
14.5 ASL Address Authentication118
14.6 Comparison120
Chapter 15 Router Communication Authentication121
15.1 Principle of Router122
15.2 Requirements of Authenticated Connection123
15.3 Fundamental Technology124
15.4 Origin Address Authentication125
15.5 Encryption Function127
15.5.1 Encryption Process128
15.5.2 Decryption Process128
15.6 Requirement of Header Format128
15.7 Computing Environment129
15.7.1 Evidence of Software Code129
15.7.2 Authentication of Software Code129
Conclusion130
Part Six e-Commerce Authentication132
Chapter 16 e-Bank Authentication132
16.1 Background132
16.2 Counter Business133
16.3 Business Layer134
16.4 Basic Technology135
16.5 Business at ATM136
16.6 Communication Between ATM and Portal137
16.7 The Advantages138
Chapter 17 e-Bill Authentication140
17.1 Bill Authentication Network140
17.2 Main Technologies141
17.3 Application for Bills141
17.4 Circulation of Bills142
17.5 Verification of Check143
Part Seven Logistics Authentication146
Chapter 18 e-Tag Authentication146
18.1 Background146
18.2 Main Technology147
18.3 Embodiment(Ⅰ)148
18.4 Embodiment(Ⅱ)150
Chapter 19 e-Wallet Authentication151
19.1 Two Kinds of Authentication Concept151
19.2 System Configuration153
19.3 Tag Structure154
19.3.1 Structure of Data Region154
19.3.2 Structure of Control Region154
19.4 Tag Data Generation and Authentication155
19.4.1 KMC155
19.4.2 Enterprise155
19.4.3 Writer and Reader156
19.5 Protocol Design156
19.6 Conclusion158
Part Eight Stored File Authentication160
Chapter 20 Storage Authentication160
20.1 Security Requirements160
20.2 Basic Technology161
20.3 File Uploading Protocol162
20.4 File Downloading Protocol163
20.5 Data Storing164
20.5.1 Establishment of Key File164
20.5.2 Storage of Key File165
20.5.3 Documental Database Encryption165
20.5.4 Relational Database Encryption166
Chapter 21 Secure File Box168
21.1 Background168
21.2 System Framework169
21.3 Features of the System169
21.4 System Implementation171
Chapter 22 Classification Seal Authentication173
22.1 Background Technology173
22.2 Main Technologies173
22.3 Working Flow175
22.4 Embodiment177
22.5 Explanation178
Part Nine Moving Data Authentication186
Chapter 23 e-Mail Authentication186
23.1 Main Technologies186
23.2 Sending Process187
23.3 Receiving Process188
Chapter 24 Digital Right Authentication190
24.1 Technical Background190
24.2 Main Technologies190
24.3 Manufacturer's Digital Right191
24.4 Enterprise's Right of Operation193
24.5 Client's Right of Usage194
Part Ten Network Authentication198
Chapter 25 Pass Authentication198
25.1 Background198
25.2 Working Principles198
25.3 The Diagram of Gate-guard200
25.4 Gate-guard for Individual PC202
25.5 Guarding Policy203
Chapter 26 Address Authentication205
26.1 Background205
26.2 Main Problems206
26.3 Technical Approach206
26.3.1 CPK Cryptosystem206
26.3.2 New Routing Protocol207
26.3.3 Computing Environment207
26.4 New Prototype of Router208
Postscript New Trend of Information Security209
Appendices216
Appendix A Walk Out of Mysterious""Black Chamber""216
Appendix B Identity Authentication Opening a New Land for Information Security221
Appendix C Searching for Safe""Silver Bullet""228
Appendix D ""Electronic-ID Card""Attracts International Attention237
Appendix E CPK System Goes to the World242
Appendix F Identity Authentication Based on CPK System246
Appendix G CPK Cryptosystem255
References259
Glossary Technical Terms261
Symbols263