图书介绍

标识鉴别 网际安全技术基础PDF|Epub|txt|kindle电子书版本网盘下载

标识鉴别 网际安全技术基础
  • 南相浩著 著
  • 出版社: 北京:电子工业出版社
  • ISBN:9787121134791
  • 出版时间:2011
  • 标注页数:264页
  • 文件大小:13MB
  • 文件页数:285页
  • 主题词:计算机网络-安全技术-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

标识鉴别 网际安全技术基础PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Part One Authentication Technology2

Chapter 1 Basic Concepts2

1.1 Physical World and Digital World2

1.2 A World with Order and without Order3

1.3 Self-assured Proof and 3rd Party Proof4

1.4 Certification Chain and Trust Chain7

1.5 Centralized and Decentralized Management8

1.6 Physical Signature and Digital Signature9

Chapter 2 Authentication Logics13

2.1 Belief Logic14

2.1.1 The Model14

2.1.2 The Formulae14

2.1.3 The Characteristics of Belief Logic15

2.2 Trust Logic15

2.2.1 Direct Trust15

2.2.2 Axiomatic Trust16

2.2.3 Inference Trust16

2.2.4 Behavior Based Trust17

2.2.5 Characteristics of Trust Logic18

2.3 Truth Logic19

2.3.1 The Needs of Truth Logic19

2.3.2 Entity Authenticity19

2.3.3 The Characteristics of Truth Logic22

2.4 Authentication Protocols23

2.4.1 Standard Protocol23

2.4.2 CPK Protocol24

2.5 Authentication Systems25

2.5.1 PKI Certification System26

2.5.2 CPK Authentication System27

Chapter 3 Identity Authentication29

3.1 Communication Identity Authentication29

3.2 Software Identity Authentication31

3.3 Electronic Tag Authentication32

3.4 Network Management33

3.5 Holistic Security34

Part Two Cryptosystems38

Chapter4 Combined Public Key(v6.0)38

4.1 Introduction38

4.2 Mapping Function39

4.3 Computation of Keys39

4.3.1 Computation of Identity-Key39

4.3.2 Computation of Separating-key40

4.3.3 Computation of General-key40

4.3.4 Computation of District-key40

4.4 Digital Signature and Key Delivery41

4.4.1 Digital Signature41

4.4.2 Key Delivery41

4.5 Security42

Conclusion42

Chapter 5 Cryptosystem and Authentication43

5.1 New Requirements for Cryptosystem43

5.2 Development of Cryptosystems44

5.3 Identity Authentication Schemes45

5.3.1 Identity Authentication with IBC45

5.3.2 Identity Authentication with CPK46

5.3.3 Identity Authentication with PKI47

5.3.4 Identity Authentication with IB-RSA48

5.3.5 Identity Authentication with mRSA48

5.3.6 Comparison of Schemes49

5.4 Key Delivery Schemes49

5.4.1 IBE Key Delivery49

5.4.2 CPK Key Delivery50

5.4.3 Other Key Delivery Schemes51

5.4.4 Performance Comparison52

5.5 Related Discussions52

5.5.1 Discussion on Trust Root52

5.5.2 Discussion on Quantum Attack53

Chapter 6 Bytes Encryption55

6.1 Coding Structure55

6.1.1 Permutation Table(disk)55

6.1.2 Substitution Table(subst)56

6.1.3 Key Structure57

6.2 Working Flow58

6.2.1 Given Conditions58

6.2.2 Key Derivation59

6.2.3 Data Expansion59

6.2.4 Compound of Data and Key59

6.2.5 Left Shift Accumulation60

6.2.6 Permutation60

6.2.7 Right Shift Accumulation60

6.2.8 Data Concentration60

6.2.9 Single Substitution61

6.2.10 Compound of Data and Key61

6.3 Security Analysis61

Part Three CPK System64

Chapter 7 CPK Key Management64

7.1 CPK Key Distribution64

7.1.1 Authentication Network64

7.1.2 Communication Key65

7.1.3 Classification of Keys65

7.2 CPK Signature66

7.2.1 Digital Signature and Verification66

7.2.2 Signature Format67

7.3 CPK Key Delivery67

7.4 CPK Data Encryption68

7.5 Key Protection68

7.5.1 Password Verification69

7.5.2 Password Change69

Chapter 8 CPK-chip Design70

8.1 Background70

8.2 Main Technology70

8.3 Chip Structure72

8.4 Main Functions75

8.4.1 Digital Signature75

8.4.2 Data Encryption76

Chapter 9 CPK ID-card78

9.1 Background78

9.2 ID-card Structure79

9.2.1 The Part of Main Body80

9.2.2 The Part of Variables80

9.3 ID-card Data Format81

9.4 ID-card Management83

9.4.1 Administrative Organization83

9.4.2 Application for ID-card84

9.4.3 Registration Department85

9.4.4 Production Department86

9.4.5 Issuing Department88

Part Four Code Authentication90

Chapter 10 Software ID Authentication90

10.1 Technical Background90

10.2 Main Technology91

10.3 Signing Module92

10.4 Verifying Module93

10.5 The Feature of Code Signing95

Chapter 11 Windows Code Authentication97

11.1 Introduction97

11.2 PE File97

11.3 Mini-filter98

11.3.1 NT I/O Subsystem98

11.3.2 File Filter Driving99

11.3.3 Mini-filter100

11.4 Code Authentication of Windows101

11.4.1 The System Framework101

11.4.2 Characteristics Collecting101

11.5 Conclusion101

Chapter 12 Linux Code Authentication102

12.1 General Description102

12.2 ELF File102

12.3 Linux Security Module(LSM)Framework103

12.4 Implementation104

Part Five Communication Authentication108

Chapter 13 Phone Authentication108

13.1 Main Technologies108

13.2 Connecting Procedure109

13.3 Data Encryption110

13.4 Data Decryption111

Chapter 14 SSL Communication Authentication112

14.1 Layers of Communication112

14.2 Secure Socket Layer(SSL)113

14.3 Authenticated Socket Layer(ASL)115

14.4 TSL Working Principle116

14.5 ASL Address Authentication118

14.6 Comparison120

Chapter 15 Router Communication Authentication121

15.1 Principle of Router122

15.2 Requirements of Authenticated Connection123

15.3 Fundamental Technology124

15.4 Origin Address Authentication125

15.5 Encryption Function127

15.5.1 Encryption Process128

15.5.2 Decryption Process128

15.6 Requirement of Header Format128

15.7 Computing Environment129

15.7.1 Evidence of Software Code129

15.7.2 Authentication of Software Code129

Conclusion130

Part Six e-Commerce Authentication132

Chapter 16 e-Bank Authentication132

16.1 Background132

16.2 Counter Business133

16.3 Business Layer134

16.4 Basic Technology135

16.5 Business at ATM136

16.6 Communication Between ATM and Portal137

16.7 The Advantages138

Chapter 17 e-Bill Authentication140

17.1 Bill Authentication Network140

17.2 Main Technologies141

17.3 Application for Bills141

17.4 Circulation of Bills142

17.5 Verification of Check143

Part Seven Logistics Authentication146

Chapter 18 e-Tag Authentication146

18.1 Background146

18.2 Main Technology147

18.3 Embodiment(Ⅰ)148

18.4 Embodiment(Ⅱ)150

Chapter 19 e-Wallet Authentication151

19.1 Two Kinds of Authentication Concept151

19.2 System Configuration153

19.3 Tag Structure154

19.3.1 Structure of Data Region154

19.3.2 Structure of Control Region154

19.4 Tag Data Generation and Authentication155

19.4.1 KMC155

19.4.2 Enterprise155

19.4.3 Writer and Reader156

19.5 Protocol Design156

19.6 Conclusion158

Part Eight Stored File Authentication160

Chapter 20 Storage Authentication160

20.1 Security Requirements160

20.2 Basic Technology161

20.3 File Uploading Protocol162

20.4 File Downloading Protocol163

20.5 Data Storing164

20.5.1 Establishment of Key File164

20.5.2 Storage of Key File165

20.5.3 Documental Database Encryption165

20.5.4 Relational Database Encryption166

Chapter 21 Secure File Box168

21.1 Background168

21.2 System Framework169

21.3 Features of the System169

21.4 System Implementation171

Chapter 22 Classification Seal Authentication173

22.1 Background Technology173

22.2 Main Technologies173

22.3 Working Flow175

22.4 Embodiment177

22.5 Explanation178

Part Nine Moving Data Authentication186

Chapter 23 e-Mail Authentication186

23.1 Main Technologies186

23.2 Sending Process187

23.3 Receiving Process188

Chapter 24 Digital Right Authentication190

24.1 Technical Background190

24.2 Main Technologies190

24.3 Manufacturer's Digital Right191

24.4 Enterprise's Right of Operation193

24.5 Client's Right of Usage194

Part Ten Network Authentication198

Chapter 25 Pass Authentication198

25.1 Background198

25.2 Working Principles198

25.3 The Diagram of Gate-guard200

25.4 Gate-guard for Individual PC202

25.5 Guarding Policy203

Chapter 26 Address Authentication205

26.1 Background205

26.2 Main Problems206

26.3 Technical Approach206

26.3.1 CPK Cryptosystem206

26.3.2 New Routing Protocol207

26.3.3 Computing Environment207

26.4 New Prototype of Router208

Postscript New Trend of Information Security209

Appendices216

Appendix A Walk Out of Mysterious""Black Chamber""216

Appendix B Identity Authentication Opening a New Land for Information Security221

Appendix C Searching for Safe""Silver Bullet""228

Appendix D ""Electronic-ID Card""Attracts International Attention237

Appendix E CPK System Goes to the World242

Appendix F Identity Authentication Based on CPK System246

Appendix G CPK Cryptosystem255

References259

Glossary Technical Terms261

Symbols263

热门推荐