图书介绍

CPK公钥体制与标识鉴别 英文PDF|Epub|txt|kindle电子书版本网盘下载

CPK公钥体制与标识鉴别 英文
  • 南相浩著 著
  • 出版社: 北京:电子工业出版社
  • ISBN:9787121174858
  • 出版时间:2012
  • 标注页数:317页
  • 文件大小:13MB
  • 文件页数:337页
  • 主题词:计算机网络-安全技术-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

CPK公钥体制与标识鉴别 英文PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Part One Authentication Technology2

Chapter 1 Basic Concepts2

1.1 Physical World and Digital World2

1.2 A World with Order and without Order3

1.3 Self-assured Proof and 3rd Party Proof5

1.4 Certification Chain and Trust Chain7

1.5 Centralized and Decentralized Management8

1.6 Physical Signature and Digital Signature10

Chapter 2 Authentication Logics14

2.1 Belief Logic15

2.1.1 The Model15

2.1.2 The Formulae16

2.1.3 The Characteristics of Belief Logic16

2.2 Trust Logic17

2.2.1 Direct Trust17

2.2.2 Axiomatic Trust17

2.2.3 Inference Trust18

2.2.4 Behavior Based Trust19

2.2.5 Characteristics of Trust Logic20

2.3 Truth Logic20

2.3.1 The Needs of "Pre-proof"20

2.3.2 Entity Authenticity21

2.3.3 The Characteristics of Truth Logic24

2.4 Authentication Protocols25

2.4.1 Standard Protocol25

2.4.2 CPK Protocol26

2.5 Authentication Systems28

2.5.1 PKI Certification System28

2.5.2 CPK Authentication System30

Chapter 3 Identity Authentication32

3.1 Communication Identity Authentication33

3.2 Software Identity Authentication34

3.3 Electronic Tag Authentication36

3.4 Network Management37

3.5 Holistic Security38

Part Two Cryptosystems42

Chapter 4 Combined Public Key(v6.0)42

4.1 Introduction42

4.2 Mapping Functoin43

4.3 Computation of Keys43

4.3.1 Computation of Identity-key43

4.3.2 Computation of Separating-key44

4.3.3 Computation of General-key44

4.3.4 Computation of District-key44

4.4 Digital Signature and Key Delivery45

4.4.1 Digital Signature45

4.4.2 Key Delivery46

4.5 Security46

4.6 Conclusion47

Chapter 5 Cryptosystem and Authentication48

5.1 New Requirements for Cryptosystem48

5.2 Development of Cryptosystems49

5.3 Identity Authentication Schemes50

5.3.1 Identity Authentication with IBC50

5.3.2 Identity Authentication with CPK51

5.3.3 Identity Authentication with PKI52

5.3.4 Identity Authentication with IB-RSA53

5.3.5 Identity Authentication with mRSA54

5.3.6 Comparison of Schemes54

5.4 Key Delivery Schemes55

5.4.1 IBE Key Delivery55

5.4.2 CPK Key Delivery56

5.4.3 Other Key Delivery Schemes56

5.4.4 Performance Comparison57

5.5 Discussion on Trust Root58

Chapter 6 Bytes Encryption60

6.1 Coding Structure60

6.1.1 Permutation Table(disk)60

6.1.2 Substitution Table(subst)61

6.1.3 Key Structure62

6.2 Working Flow63

6.2.1 Given Conditions63

6.2.2 Key Derivation64

6.2.3 Data Expansion64

6.2.4 Compound of Data and Key64

6.2.5 Left Shift Accumulation65

6.2.6 Permutation65

6.2.7 Right Shift Accumulation65

6.2.8 Data Concentration66

6.2.9 Single Substitution66

6.2.10 Compound of Data and Key66

6.3 Security Analysis67

Part Three CPK System70

Chapter 7 CPK Key Management70

7.1 CPK Key Distribution70

7.1.1 Authentication Network70

7.1.2 Communication Key71

7.1.3 Classification of Keys71

7.2 CPK Signature72

7.2.1 Digital Signature and Verification72

7.2.2 Signature Format73

7.3 CPK Key Delivery73

7.4 CPK Data Encryption74

7.5 Key Protection75

7.5.1 Password Verification75

7.5.2 Password Change76

Chapter 8 CPK-chip Design77

8.1 Background77

8.2 Main Technology77

8.3 Chip Structure79

8.4 Main Functions82

8.4.1 Digital Signature82

8.4.2 Data Encryption84

Chapter 9 CPK ID-card86

9.1 Background86

9.2 ID-card Structure88

9.2.1 The Part of Main Body88

9.2.2 The Part of Variables88

9.3 ID-card Data Format89

9.4 ID-card Management92

9.4.1 Administrative Organization92

9.4.2 Application for ID-card93

9.4.3 Registration Department94

9.4.4 Production Department95

9.4.5 Issuing Department97

Part Four Software Authentication100

Chapter 10 Software ID Authentication100

10.1 Technical Background100

10.2 Main Technology101

1O.3 Signing Module102

10.4 Verifying Module104

10.5 The Feature of Code Signing105

Chapter 11 Windows Code Authentication107

11.1 Introduction107

11.2 PE File107

11.3 Mini-filter108

11.3.1 NT I/O Subsystem108

11.3.2 File Filter Driving110

11.3.3 Mini-filter110

11.4 Code Authentication of Windows111

11.4.1 The System Framework111

11.4.2 Characteristics Collecting112

11.5 Conclusion112

Chapter 12 Linux Code Authentication113

12.1 General Description113

12.2 ELF File113

12.3 Linux Security Module(LSM)Framework114

12.4 Implementation115

Part Five Communication Authentication118

Chapter 13 Phone Authentication118

13.1 Main Technologies118

13.2 Connecting Procedure119

13.3 Data Encryption120

13.4 Data Decryption121

Chapter 14 SSL Communication Authentication123

14.1 Layers of Communication123

14.2 Secure Socket Layer(SSL)124

14.3 Authenticated Socket Layer(ASL)127

14.4 ASL Working Principle128

14.5 ASL Address Authentication130

14.6 Comparison132

Chapter 15 Router Communication Authentication134

15.1 Principle of Router135

15.2 Requirements of Authenticated Connection136

15.3 Fundamental Technology137

15.4 Origin Address Authentication138

15.5 Encryption Function141

15.5.1 Encryption Process142

15.5.2 Decryption Process142

15.6 Requirement of Header Format142

15.7 Computing Environment143

15.7.1 Evidence of Software Code143

15.7.2 Authentication of Software Code143

15.8 Conclusion144

Part Six e-Commerce Authentication146

Chapter 16 e-Bank Authentication146

16.1 Background146

16.2 Counter Business147

16.3 Business Layer148

16.4 Basic Technology149

16.5 Business at ATM151

16.6 Communication Between ATM and Portal151

16.7 The Advantages153

Chapter 17 e-Bill Authentication155

17.1 Bill Authentication Network155

17.2 Main Technologies156

17.3 Application for Bills156

17.4 Circulation of Bills158

17.5 Verification of Check158

Part Seven Logistics Authentication162

Chapter 18 e-Tag Authentication162

18.1 Background162

18.2 Main Technology163

18.3 Embodiment(Ⅰ)165

18.4 Embodiment(Ⅱ)166

Chapter 19 The Design of Mywallet(v1.0)168

19.1 Two Kinds of Authentication Concept168

19.2 System Configuration170

19.3 Tag Structure171

19.3.1 Structure of Data Region171

19.3.2 Structure of Control Region172

19.4 Tag Data Generation and Authentication172

19.4.1 KMC173

19.4.2 Enterprise173

19.4.3 Writer and Reader173

19.5 Protocol Design174

19.6 Conclusion175

Part Eight Stored File Authentication178

Chapter 20 Storage Authentication178

20.1 Security Requirements178

20.2 Basic Technology179

20.3 File Uploading Protocol180

20.4 File Downloading Protocol181

20.5 Data Storing182

20.5.1 Establishment of Key File183

20.5.2 Storage of Key File183

20.5.3 Documental Database Encryption184

20.5.4 Relational Database Encryption185

Chapter 21 Secure File Box187

21.1 Background187

21.2 System Framework188

21.3 Features of the System189

21.4 System Implementation190

Chapter 22 Classification Seal Authentication193

22.1 Background Technology193

22.2 Main Technologies194

22.3 Working Flow196

22.4 Embodiment197

22.5 Explanation198

Part Nine Moving Data Authentication206

Chapter 23 e-Mail Authentication206

23.1 Main Technologies206

23.2 Sending Process208

23.3 Receiving Process208

Chapter 24 Digital Right Authentication210

24.1 Technical Background210

24.2 Main Technologies211

24.3 Manufacturer's Digital Right212

24.4 Enterprise's Right of Operation213

24.5 Client's Right of Usage215

Part Ten Network Authentication218

Chapter 25 Pass Authentication218

25.1 Background218

25.2 Working Principles219

25.3 The Diagram of Gate-guard220

25.4 Gate-guard for Individual PC223

25.5 Guarding Policy224

Chapter 26 Address Authentication225

26.1 Background225

26.2 Main Problems226

26.3 Technical Approach226

26.3.1 CPK Cryptosystem226

26.3.2 New Routing Protocol227

26.3.3 Computing Environment228

26.4 New Prototype of Router228

Part Eleven New Progress230

Chapter 27 Measures against Exhaustion Attack230

27.1 Exhausting Capability230

27.2 Basic Analysis231

27.3 Main Objectives232

27.4 Technical Approach233

27.5 Module Design234

Chapter 28 CPK Cryptosystem236

28.1 Introduction236

28.2 Identity-key237

28.3 Separating-key238

28.4 Compound-key238

28.5 Public and Private Network Key239

28.6 Digital Signature Protocol239

28.7 Key Delivery Protocol240

28.8 Security241

28.9 Summary243

Chapter 29 On-line Key Distribution Protocol244

Chapter 30 The Design of Mywallet(v2.0)247

Abstract247

30.1 Technical Requirements247

30.1.1 Two Kinds of Authentication Concept247

30.1.2 Two Kinds of Authentication Networks248

30.1.3 Two Kinds of Business Requirements249

30.2 System Structure249

30.2.1 Key Distribution250

30.2.2 Data Structure251

30.2.3 Controller Structure251

30.3 Protocol Design252

30.3.1 Authentication Protocol252

30.3.2 Decryption and Verification Protocol253

30.3.3 Encryption and Signature Protocol254

Summary255

Postscript From Information Security to Gyber Security257

Appendices264

Appendix A264

Walk Out of Mysterious "Black Chamber"264

Appendix B270

Identity Authentication Opening a New Land for Information Security270

Appendix C278

Searching for Safe "Silver Bullet"278

Appendix D288

"Electronic-ID Card" Attracts International Attention288

Appendix E293

CPK System Goes to the World293

Appendix F297

Identity Authentication Based on CPK System297

Appendix G308

CPK Cryptosystem308

References313

Glossary315

Technical Terms315

Symbols317

热门推荐