为你推荐
扉页
内容简介
版权页
序言
前言
Part One Basic Theory
CHAPTER ONE CPK Public Key
1.1 Combining Principle
1.2 Combination Matrix
1.3 Combination Key
1.4 Annual Key
1.5 Digital Signature
1.6 Key Encryption
1.7 Security Analysis
1.7.1 Security of Private Matrix
1.7.2 Security of Signature Code
1.7.3 Security of Public Matrix
1.7.4 Security of Private Key
Summary
References
CHAPTER TWO CPK Key Management
2.1 Master Keys
2.2 Application for Key
2.3 Key Protection
2.4 Key Distribution
2.5 Digital Signature
2.6 Key Encryption
2.7 Key Update
2.8 Data Encryption
2.8.1 “One-to-One” Encryption
2.8.2 “One-to-Many”Encryption
2.8.3 Role-key
2.8.4 Key for Database
Summary
CHAPTER THREE CPK Truth Logic
3.1 Belief Logic
3.1.1 The Model
3.1.2 The Formula
3.1.3 The Characteristics of Belief Logic
3.2 Trust Logic
3.2.1 Direct Trust
3.2.2 Axiomatic Trust
3.2.3 Inference Trust
3.2.4 Trust Chain
3.2.5 Characteristics of Trust Logic
3.3 Truth Logic
3.3.1 Entity Authentication Logic
3.3.2 Event Authentication Logic
3.4 Authentication Protocols
3.4.1 Communication Authentication
3.4.2 Software Authentication
Summary
References
CHAPTER FOUR CPK Identity Authentication
4.1 Introduction
4.2 Formation of Identity Authentication
4.3 Requirement of Virtual Network
4.4 Requirement of Proof-before-Event
4.5 Requirement of Network Order
4.6 Requirement of Holistic Solution
CHAPTER FIVE CPK Self-Assured Security
5.1 Formation of Assurance
5.2 Components of Assurance
5.3 Realization of Assuance
5.4 Location of Assurance
CHAPTER SIX CPK Virtual Network
6.1 Linkage Between Identities
6.2 Provable Linkage
6.3 IoT and IoE
6.4 Compound Event
Summary
References
CHAPTER SEVEN CPK Virtual Kernel
7.1 Virtual Kernel
7.2 Software Seal
7.3 Software Upload
7.4 Software Execution
7.5 Realization of Kernel
7.6 Security Policy
Summary
CHAPTER EIGHT CPK Digital Seal
Summary
CHAPTER NINE CPK Account Money
9.1 Introduction
9.2 Digital Seal for Account Money
9.2.1 Account Money Templet
9.2.2 Application for Private Key
9.2.3 Circulation Account Money
9.3 Face-to-Face Payment
9.4 Remote Payment
9.5 Account Settlement
9.6 Evidence Chain
9.7 Link Integrity
Summary
References
CHAPTER TEN CPK Systematic Security
10.1 Formation of CPK Pubic Key
10.2 Formation of Identity Authentication
10.3 Formation of Assurance Security
10.4 Formation of Virtual Network
10.5 Formation of Structured Solution
10.6 Formation of New Security Principles
Part Two Mair Practice
CHAPTER ELEVEN Virtual Internet
11.1 Hazards to Internet
11.2 Key Technique of Provable Internet
11.3 The Structure of Virtual Internet
11.4 Authentication of Users
11.5 Implementation Protocol
11.5.1 Digital Seal
11.5.2 Access Process
11.5.3 Adopting Process
Summary
References
CHAPTER TWELVE Virtual Mob-Net
12.1 Introduction
12.2 Virtual Connection
12.2.1 Digital Seal
12.2.2 Access Process
12.2.3 Adopting Process
Summary
CHAPTER THIRTEEN RFID Anti-Fake Label
13.1 Technical Requirements
13.1.1 Relationship of Authentication
13.1.2 Authentication Networks
13.1.3 Security Requirements
13.2 System Structure
13.2.1 Key Distribution
13.2.2 Data Structure
13.2.3 Controller
13.2.4 Instruction Code
13.3 Protocol Design
13.3.1 UID Authentication Protocol
13.3.2 Dual Authentication Protocol
13.3.3 Decryption and Verification Protocol
13.3.4 Encryption and Signature Protocol
CHAPTER FOURTEEN Paper Anti-Fake Label
14.1 Digital Seal for Counterfeit Label
14.2 Vertical Certification Chain
14.3 Horizontal Certification Chain
14.3.1 Elements of Price Tag
14.3.2 Elements of Receipt
14.3.3 Elements of Label
14.3.4 Validation of Label
14.4 Effectiveness of Certification Chain
Summary
CHAPTER FIFTEEN File Classification
15.1 Introduction
15.2 Digital Seal for File
15.3 File Creating
15.4 File Verifying
15.5 File Sending
15.6 File Management
15.6.1 File Seal
15.6.2 Procedure of Verification
15.6.3 File Control
Summary
CHAPTER SIXTEEN CPK Video Monitoring
16.1 Background
16.2 Digital Seal
16.3 Identity Definition
16.4 Provable Access
16.5 Transmission Encryption
16.6 Forward Encryption
16.7 Provable Storage
16.8 Network Layout
16.9 Key Distribution
Summary
CHAPTER SEVENTEENCPK Cloud Storage
17.1 Seals for File
17.1.1 Seal for Document
17.1.2 Seal for Record
17.1.3 CPK ID Certificate
17.2 Document File Control
17.2.1 Structure of File Storage
17.2.2 Access Control to DB
17.2.3 Storage Control
17.2.4 Access Control to Document
17.2.5 Document Encryption
17.3 Table File Control
17.3.1 Structure of Table Storage
17.3.2 Linkage Control
17.3.3 Storage Control
17.3.4 Access Control to Table Files
17.3.5 Table Encryption
Summary
CHAPTER EIGHTEENByte Encryption
18.1 System Structure
18.2 Key Generation
18.3 Data Encryption
18.4 Security Analysis
CHAPTER NINETEENCyber Attack
19.1 DOS Attack and Countermeasure
19.1.1 DOS Attack on Server
19.1.2 DOS Attack on DB
19.2 Copy Attack
19.2.1 Attack on Paper Bill
19.2.2 Attack on Remote Signal
19.2.3 Attack on “ID Card”
19.3 Malware Attack
19.3.1 Data Theft
19.3.2 Illegal Intrusion
19.3.3 Cyber Crime
Summary
CHAPTER TWENTYSituational Awareness
20.1 Introduction
20.2 Main Threats
20.3 Generation Awareness Data
20.3.1 Communication Event
20.3.2 Software Event
20.3.3 Transaction Event
20.4 Registration of Awareness Data
20.5 Summary of Awareness Data
Postscript
COMMENTS
COMMENT 1The CPK Algorithm for Key Management
COMMENT 2Identity Authentication Opening a New Land for Information Security
COMMENT 3“Electronic ID Card” Attracts International Attention
COMMENT 4CPK Goes to the World
COMMENT 5 Identity Authentication Based on CPK
COMMENT 6To Construct Self-Assured Network System with CPK Technology
INTERVIEWS
Interview 1Don't Lock Enthusiasm
Interview 2Walk out of Mysterious “Black Chamber”
Interview 3Searching for Safe “Silver Bullet”
NOTES
Note 1 CPK Symbols
Note 2 CPK Expressions
Note 3 CPK Terms
Note 4 CPK Security Requirement
About the Author
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜