万本电子书0元读

万本电子书0元读

顶部广告

CPK通向赛博安全之路:理论与实践CPK Solution to Cyber Security:Theory and Practice电子书

售       价:¥

27人正在读 | 2人评论 9.8

作       者:南湘浩

出  版  社:电子工业出版社

出版时间:2019-12-01

字       数:35.8万

所属分类: 科技 > 计算机/网络 > 计算机理论与教程

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(1条)
  • 读书简介
  • 目录
  • 累计评论(1条)
本书以公众网的新视野分析信息安全、网络安全、系统安全、交易安全、安全管理,并探索网信安全的实质。网信空间由实体空间和事件空间构成,鉴别技术是安全的核心技术。由此形成了基于实体鉴别的物联网和基于事件鉴别的事联网的新概念。 新概念必须用新技术才能解决。所用新技术是CPK组合公钥、标识鉴别、虚拟网络、数字印章等。CPK是基于标识的公钥,直到目前兼有数字签名和密钥加密功能的体制,其签名码短,可实现标识鉴别。标识鉴别是信息安全的核心技术,也是难点,唯独CPK才能解决。在解决标识鉴别的基础上就可以构建基于证据的虚拟网络。虚拟网络是从任何标识到任何标识的(I to I)的可证网络,是物联网和是联网的基本型。数字印章提供了是实现可证互联、可证交易的实现方法,并统一了现实世界和网络是世界的印章。 新概念的实现需要将研究思路从形象思维提高到抽象思维;将安全战略从被动防护提高到主动管理;将鉴别逻辑从基于模型的可信逻辑提高到基于证据的真值逻辑,将网信安全的总体构架建立在安全理论的基础之上。
目录展开

扉页

内容简介

版权页

序言

前言

Part One Basic Theory

CHAPTER ONE CPK Public Key

1.1 Combining Principle

1.2 Combination Matrix

1.3 Combination Key

1.4 Annual Key

1.5 Digital Signature

1.6 Key Encryption

1.7 Security Analysis

1.7.1 Security of Private Matrix

1.7.2 Security of Signature Code

1.7.3 Security of Public Matrix

1.7.4 Security of Private Key

Summary

References

CHAPTER TWO CPK Key Management

2.1 Master Keys

2.2 Application for Key

2.3 Key Protection

2.4 Key Distribution

2.5 Digital Signature

2.6 Key Encryption

2.7 Key Update

2.8 Data Encryption

2.8.1 “One-to-One” Encryption

2.8.2 “One-to-Many”Encryption

2.8.3 Role-key

2.8.4 Key for Database

Summary

CHAPTER THREE CPK Truth Logic

3.1 Belief Logic

3.1.1 The Model

3.1.2 The Formula

3.1.3 The Characteristics of Belief Logic

3.2 Trust Logic

3.2.1 Direct Trust

3.2.2 Axiomatic Trust

3.2.3 Inference Trust

3.2.4 Trust Chain

3.2.5 Characteristics of Trust Logic

3.3 Truth Logic

3.3.1 Entity Authentication Logic

3.3.2 Event Authentication Logic

3.4 Authentication Protocols

3.4.1 Communication Authentication

3.4.2 Software Authentication

Summary

References

CHAPTER FOUR CPK Identity Authentication

4.1 Introduction

4.2 Formation of Identity Authentication

4.3 Requirement of Virtual Network

4.4 Requirement of Proof-before-Event

4.5 Requirement of Network Order

4.6 Requirement of Holistic Solution

CHAPTER FIVE CPK Self-Assured Security

5.1 Formation of Assurance

5.2 Components of Assurance

5.3 Realization of Assuance

5.4 Location of Assurance

CHAPTER SIX CPK Virtual Network

6.1 Linkage Between Identities

6.2 Provable Linkage

6.3 IoT and IoE

6.4 Compound Event

Summary

References

CHAPTER SEVEN CPK Virtual Kernel

7.1 Virtual Kernel

7.2 Software Seal

7.3 Software Upload

7.4 Software Execution

7.5 Realization of Kernel

7.6 Security Policy

Summary

CHAPTER EIGHT CPK Digital Seal

Summary

CHAPTER NINE CPK Account Money

9.1 Introduction

9.2 Digital Seal for Account Money

9.2.1 Account Money Templet

9.2.2 Application for Private Key

9.2.3 Circulation Account Money

9.3 Face-to-Face Payment

9.4 Remote Payment

9.5 Account Settlement

9.6 Evidence Chain

9.7 Link Integrity

Summary

References

CHAPTER TEN CPK Systematic Security

10.1 Formation of CPK Pubic Key

10.2 Formation of Identity Authentication

10.3 Formation of Assurance Security

10.4 Formation of Virtual Network

10.5 Formation of Structured Solution

10.6 Formation of New Security Principles

Part Two Mair Practice

CHAPTER ELEVEN Virtual Internet

11.1 Hazards to Internet

11.2 Key Technique of Provable Internet

11.3 The Structure of Virtual Internet

11.4 Authentication of Users

11.5 Implementation Protocol

11.5.1 Digital Seal

11.5.2 Access Process

11.5.3 Adopting Process

Summary

References

CHAPTER TWELVE Virtual Mob-Net

12.1 Introduction

12.2 Virtual Connection

12.2.1 Digital Seal

12.2.2 Access Process

12.2.3 Adopting Process

Summary

CHAPTER THIRTEEN RFID Anti-Fake Label

13.1 Technical Requirements

13.1.1 Relationship of Authentication

13.1.2 Authentication Networks

13.1.3 Security Requirements

13.2 System Structure

13.2.1 Key Distribution

13.2.2 Data Structure

13.2.3 Controller

13.2.4 Instruction Code

13.3 Protocol Design

13.3.1 UID Authentication Protocol

13.3.2 Dual Authentication Protocol

13.3.3 Decryption and Verification Protocol

13.3.4 Encryption and Signature Protocol

CHAPTER FOURTEEN Paper Anti-Fake Label

14.1 Digital Seal for Counterfeit Label

14.2 Vertical Certification Chain

14.3 Horizontal Certification Chain

14.3.1 Elements of Price Tag

14.3.2 Elements of Receipt

14.3.3 Elements of Label

14.3.4 Validation of Label

14.4 Effectiveness of Certification Chain

Summary

CHAPTER FIFTEEN File Classification

15.1 Introduction

15.2 Digital Seal for File

15.3 File Creating

15.4 File Verifying

15.5 File Sending

15.6 File Management

15.6.1 File Seal

15.6.2 Procedure of Verification

15.6.3 File Control

Summary

CHAPTER SIXTEEN CPK Video Monitoring

16.1 Background

16.2 Digital Seal

16.3 Identity Definition

16.4 Provable Access

16.5 Transmission Encryption

16.6 Forward Encryption

16.7 Provable Storage

16.8 Network Layout

16.9 Key Distribution

Summary

CHAPTER SEVENTEENCPK Cloud Storage

17.1 Seals for File

17.1.1 Seal for Document

17.1.2 Seal for Record

17.1.3 CPK ID Certificate

17.2 Document File Control

17.2.1 Structure of File Storage

17.2.2 Access Control to DB

17.2.3 Storage Control

17.2.4 Access Control to Document

17.2.5 Document Encryption

17.3 Table File Control

17.3.1 Structure of Table Storage

17.3.2 Linkage Control

17.3.3 Storage Control

17.3.4 Access Control to Table Files

17.3.5 Table Encryption

Summary

CHAPTER EIGHTEENByte Encryption

18.1 System Structure

18.2 Key Generation

18.3 Data Encryption

18.4 Security Analysis

CHAPTER NINETEENCyber Attack

19.1 DOS Attack and Countermeasure

19.1.1 DOS Attack on Server

19.1.2 DOS Attack on DB

19.2 Copy Attack

19.2.1 Attack on Paper Bill

19.2.2 Attack on Remote Signal

19.2.3 Attack on “ID Card”

19.3 Malware Attack

19.3.1 Data Theft

19.3.2 Illegal Intrusion

19.3.3 Cyber Crime

Summary

CHAPTER TWENTYSituational Awareness

20.1 Introduction

20.2 Main Threats

20.3 Generation Awareness Data

20.3.1 Communication Event

20.3.2 Software Event

20.3.3 Transaction Event

20.4 Registration of Awareness Data

20.5 Summary of Awareness Data

Postscript

COMMENTS

COMMENT 1The CPK Algorithm for Key Management

COMMENT 2Identity Authentication Opening a New Land for Information Security

COMMENT 3“Electronic ID Card” Attracts International Attention

COMMENT 4CPK Goes to the World

COMMENT 5 Identity Authentication Based on CPK

COMMENT 6To Construct Self-Assured Network System with CPK Technology

INTERVIEWS

Interview 1Don't Lock Enthusiasm

Interview 2Walk out of Mysterious “Black Chamber”

Interview 3Searching for Safe “Silver Bullet”

NOTES

Note 1 CPK Symbols

Note 2 CPK Expressions

Note 3 CPK Terms

Note 4 CPK Security Requirement

About the Author

累计评论(1条) 1个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部