图书介绍
CPK公钥体制与标识鉴别 英文PDF|Epub|txt|kindle电子书版本网盘下载
![CPK公钥体制与标识鉴别 英文](https://www.shukui.net/cover/75/30309896.jpg)
- 南相浩著 著
- 出版社: 北京:电子工业出版社
- ISBN:9787121174858
- 出版时间:2012
- 标注页数:317页
- 文件大小:13MB
- 文件页数:337页
- 主题词:计算机网络-安全技术-英文
PDF下载
下载说明
CPK公钥体制与标识鉴别 英文PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Part One Authentication Technology2
Chapter 1 Basic Concepts2
1.1 Physical World and Digital World2
1.2 A World with Order and without Order3
1.3 Self-assured Proof and 3rd Party Proof5
1.4 Certification Chain and Trust Chain7
1.5 Centralized and Decentralized Management8
1.6 Physical Signature and Digital Signature10
Chapter 2 Authentication Logics14
2.1 Belief Logic15
2.1.1 The Model15
2.1.2 The Formulae16
2.1.3 The Characteristics of Belief Logic16
2.2 Trust Logic17
2.2.1 Direct Trust17
2.2.2 Axiomatic Trust17
2.2.3 Inference Trust18
2.2.4 Behavior Based Trust19
2.2.5 Characteristics of Trust Logic20
2.3 Truth Logic20
2.3.1 The Needs of "Pre-proof"20
2.3.2 Entity Authenticity21
2.3.3 The Characteristics of Truth Logic24
2.4 Authentication Protocols25
2.4.1 Standard Protocol25
2.4.2 CPK Protocol26
2.5 Authentication Systems28
2.5.1 PKI Certification System28
2.5.2 CPK Authentication System30
Chapter 3 Identity Authentication32
3.1 Communication Identity Authentication33
3.2 Software Identity Authentication34
3.3 Electronic Tag Authentication36
3.4 Network Management37
3.5 Holistic Security38
Part Two Cryptosystems42
Chapter 4 Combined Public Key(v6.0)42
4.1 Introduction42
4.2 Mapping Functoin43
4.3 Computation of Keys43
4.3.1 Computation of Identity-key43
4.3.2 Computation of Separating-key44
4.3.3 Computation of General-key44
4.3.4 Computation of District-key44
4.4 Digital Signature and Key Delivery45
4.4.1 Digital Signature45
4.4.2 Key Delivery46
4.5 Security46
4.6 Conclusion47
Chapter 5 Cryptosystem and Authentication48
5.1 New Requirements for Cryptosystem48
5.2 Development of Cryptosystems49
5.3 Identity Authentication Schemes50
5.3.1 Identity Authentication with IBC50
5.3.2 Identity Authentication with CPK51
5.3.3 Identity Authentication with PKI52
5.3.4 Identity Authentication with IB-RSA53
5.3.5 Identity Authentication with mRSA54
5.3.6 Comparison of Schemes54
5.4 Key Delivery Schemes55
5.4.1 IBE Key Delivery55
5.4.2 CPK Key Delivery56
5.4.3 Other Key Delivery Schemes56
5.4.4 Performance Comparison57
5.5 Discussion on Trust Root58
Chapter 6 Bytes Encryption60
6.1 Coding Structure60
6.1.1 Permutation Table(disk)60
6.1.2 Substitution Table(subst)61
6.1.3 Key Structure62
6.2 Working Flow63
6.2.1 Given Conditions63
6.2.2 Key Derivation64
6.2.3 Data Expansion64
6.2.4 Compound of Data and Key64
6.2.5 Left Shift Accumulation65
6.2.6 Permutation65
6.2.7 Right Shift Accumulation65
6.2.8 Data Concentration66
6.2.9 Single Substitution66
6.2.10 Compound of Data and Key66
6.3 Security Analysis67
Part Three CPK System70
Chapter 7 CPK Key Management70
7.1 CPK Key Distribution70
7.1.1 Authentication Network70
7.1.2 Communication Key71
7.1.3 Classification of Keys71
7.2 CPK Signature72
7.2.1 Digital Signature and Verification72
7.2.2 Signature Format73
7.3 CPK Key Delivery73
7.4 CPK Data Encryption74
7.5 Key Protection75
7.5.1 Password Verification75
7.5.2 Password Change76
Chapter 8 CPK-chip Design77
8.1 Background77
8.2 Main Technology77
8.3 Chip Structure79
8.4 Main Functions82
8.4.1 Digital Signature82
8.4.2 Data Encryption84
Chapter 9 CPK ID-card86
9.1 Background86
9.2 ID-card Structure88
9.2.1 The Part of Main Body88
9.2.2 The Part of Variables88
9.3 ID-card Data Format89
9.4 ID-card Management92
9.4.1 Administrative Organization92
9.4.2 Application for ID-card93
9.4.3 Registration Department94
9.4.4 Production Department95
9.4.5 Issuing Department97
Part Four Software Authentication100
Chapter 10 Software ID Authentication100
10.1 Technical Background100
10.2 Main Technology101
1O.3 Signing Module102
10.4 Verifying Module104
10.5 The Feature of Code Signing105
Chapter 11 Windows Code Authentication107
11.1 Introduction107
11.2 PE File107
11.3 Mini-filter108
11.3.1 NT I/O Subsystem108
11.3.2 File Filter Driving110
11.3.3 Mini-filter110
11.4 Code Authentication of Windows111
11.4.1 The System Framework111
11.4.2 Characteristics Collecting112
11.5 Conclusion112
Chapter 12 Linux Code Authentication113
12.1 General Description113
12.2 ELF File113
12.3 Linux Security Module(LSM)Framework114
12.4 Implementation115
Part Five Communication Authentication118
Chapter 13 Phone Authentication118
13.1 Main Technologies118
13.2 Connecting Procedure119
13.3 Data Encryption120
13.4 Data Decryption121
Chapter 14 SSL Communication Authentication123
14.1 Layers of Communication123
14.2 Secure Socket Layer(SSL)124
14.3 Authenticated Socket Layer(ASL)127
14.4 ASL Working Principle128
14.5 ASL Address Authentication130
14.6 Comparison132
Chapter 15 Router Communication Authentication134
15.1 Principle of Router135
15.2 Requirements of Authenticated Connection136
15.3 Fundamental Technology137
15.4 Origin Address Authentication138
15.5 Encryption Function141
15.5.1 Encryption Process142
15.5.2 Decryption Process142
15.6 Requirement of Header Format142
15.7 Computing Environment143
15.7.1 Evidence of Software Code143
15.7.2 Authentication of Software Code143
15.8 Conclusion144
Part Six e-Commerce Authentication146
Chapter 16 e-Bank Authentication146
16.1 Background146
16.2 Counter Business147
16.3 Business Layer148
16.4 Basic Technology149
16.5 Business at ATM151
16.6 Communication Between ATM and Portal151
16.7 The Advantages153
Chapter 17 e-Bill Authentication155
17.1 Bill Authentication Network155
17.2 Main Technologies156
17.3 Application for Bills156
17.4 Circulation of Bills158
17.5 Verification of Check158
Part Seven Logistics Authentication162
Chapter 18 e-Tag Authentication162
18.1 Background162
18.2 Main Technology163
18.3 Embodiment(Ⅰ)165
18.4 Embodiment(Ⅱ)166
Chapter 19 The Design of Mywallet(v1.0)168
19.1 Two Kinds of Authentication Concept168
19.2 System Configuration170
19.3 Tag Structure171
19.3.1 Structure of Data Region171
19.3.2 Structure of Control Region172
19.4 Tag Data Generation and Authentication172
19.4.1 KMC173
19.4.2 Enterprise173
19.4.3 Writer and Reader173
19.5 Protocol Design174
19.6 Conclusion175
Part Eight Stored File Authentication178
Chapter 20 Storage Authentication178
20.1 Security Requirements178
20.2 Basic Technology179
20.3 File Uploading Protocol180
20.4 File Downloading Protocol181
20.5 Data Storing182
20.5.1 Establishment of Key File183
20.5.2 Storage of Key File183
20.5.3 Documental Database Encryption184
20.5.4 Relational Database Encryption185
Chapter 21 Secure File Box187
21.1 Background187
21.2 System Framework188
21.3 Features of the System189
21.4 System Implementation190
Chapter 22 Classification Seal Authentication193
22.1 Background Technology193
22.2 Main Technologies194
22.3 Working Flow196
22.4 Embodiment197
22.5 Explanation198
Part Nine Moving Data Authentication206
Chapter 23 e-Mail Authentication206
23.1 Main Technologies206
23.2 Sending Process208
23.3 Receiving Process208
Chapter 24 Digital Right Authentication210
24.1 Technical Background210
24.2 Main Technologies211
24.3 Manufacturer's Digital Right212
24.4 Enterprise's Right of Operation213
24.5 Client's Right of Usage215
Part Ten Network Authentication218
Chapter 25 Pass Authentication218
25.1 Background218
25.2 Working Principles219
25.3 The Diagram of Gate-guard220
25.4 Gate-guard for Individual PC223
25.5 Guarding Policy224
Chapter 26 Address Authentication225
26.1 Background225
26.2 Main Problems226
26.3 Technical Approach226
26.3.1 CPK Cryptosystem226
26.3.2 New Routing Protocol227
26.3.3 Computing Environment228
26.4 New Prototype of Router228
Part Eleven New Progress230
Chapter 27 Measures against Exhaustion Attack230
27.1 Exhausting Capability230
27.2 Basic Analysis231
27.3 Main Objectives232
27.4 Technical Approach233
27.5 Module Design234
Chapter 28 CPK Cryptosystem236
28.1 Introduction236
28.2 Identity-key237
28.3 Separating-key238
28.4 Compound-key238
28.5 Public and Private Network Key239
28.6 Digital Signature Protocol239
28.7 Key Delivery Protocol240
28.8 Security241
28.9 Summary243
Chapter 29 On-line Key Distribution Protocol244
Chapter 30 The Design of Mywallet(v2.0)247
Abstract247
30.1 Technical Requirements247
30.1.1 Two Kinds of Authentication Concept247
30.1.2 Two Kinds of Authentication Networks248
30.1.3 Two Kinds of Business Requirements249
30.2 System Structure249
30.2.1 Key Distribution250
30.2.2 Data Structure251
30.2.3 Controller Structure251
30.3 Protocol Design252
30.3.1 Authentication Protocol252
30.3.2 Decryption and Verification Protocol253
30.3.3 Encryption and Signature Protocol254
Summary255
Postscript From Information Security to Gyber Security257
Appendices264
Appendix A264
Walk Out of Mysterious "Black Chamber"264
Appendix B270
Identity Authentication Opening a New Land for Information Security270
Appendix C278
Searching for Safe "Silver Bullet"278
Appendix D288
"Electronic-ID Card" Attracts International Attention288
Appendix E293
CPK System Goes to the World293
Appendix F297
Identity Authentication Based on CPK System297
Appendix G308
CPK Cryptosystem308
References313
Glossary315
Technical Terms315
Symbols317