• 商品
  • 详情
  • 评价
  • 联系
  • 推荐
立即购买 分享好友 商城首页 商城分类 切换频道 秒杀活动 购物车
1/5
CPK公钥体制与标识鉴别图1

CPK公钥体制与标识鉴别

50IP属地 广东
价格 98.00
发货 广东东莞市
数量
-+
库存 100
商品详情

内容简介

本书讨论了未来“网际安全”的关键技术――基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向

目录

Contents
Part oneAuthentication Technology
Chapter 1Basic Concepts
11Physical World and Digital World
12A World with Order and without Order
13Selfassured Proof and 3rd Party Proof
14Certification Chain and Trust Chain
15Centralized and Decentralized Management
16Physical Signature and Digital Signature
Chapter 2Authentication Logics
21Belief Logic
211The Model
212The Formulae
213The Characteristics of Belief Logic
22Trust Logic
221Direct Trust
222Axiomatic Trust
223Inference Trust
224Behavior based Trust
225Characteristics of Trust Logic
23Truth Logic
231The Needs of "Preproof"
232Entity Authenticity
233The Characteristics of Truth Logic
24Authentication Protocols
241Standard Protocol
242CPK Protocol
25Authentication Systems
251PKI Certification System
252CPK Authentication System
Chapter 3Identity Authentication
31Communication Identity Authentication
32Software Identity Authentication
33Electronic Tag Authentication
34Network Management
35Holistic Security
Part TwoCryptosystems
Chapter 4Combined Public Key (v60)
41Introduction
42Mapping Functoin
43Computation of Keys
431Computation of Identitykey
432Computation of Separatingkey
433Computation of Generalkey
434Computation of Districtkey
44Digital Signature and Key Delivery
441Digital Signature
442Key Delivery
45Security
46Conclusion
Chapter 5Cryptosystem and Authentication
51New Requirements for Cryptosystem
52Development of Cryptosystems
53Identity Authentication Schemes
531Identity Authentication with IBC
532Identity Authentication with CPK
533Identity Authentication with PKI
534Identity Authentication with IBRSA
535Identity Authentication with mRSA
536Comparison of Schemes
54Key Delivery Schemes
541IBE Key Delivery
542CPK Key Delivery
543Other Key Delivery Schemes
544Performance Comparison
55Discussion on Trust Root
Chapter 6Bytes Encryption
61Coding Structure
611Permutation Table (disk)
612Substitution Table (subst)
613Key Structure
62Working Flow
621Given Conditions
622Key Derivation
623Data Expansion
624Compound of Data and Key
625Left Shift Accumulation
626Permutation
627Right Shift Accumulation
628Data Concentration
629Single Substitution
6210Compound of Data and Key
63Security Analysis
Part ThreeCPK System
Chapter 7CPK Key Management
71CPK Key Distribution
711Authentication Network
712Communication Key
713Classification of Keys
72CPK Signature
721Digital Signature and Verification
722Signature

举报
收藏 0
买家评价
正在加载评价详情...
联系方式
加关注0

新图书资料发布

VIP会员第2年
资料通过认证
保证金未缴纳