




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、 along with the technical developing of the network,the network safety also becomes the focus in the focus of the network society nowadays,almost no one not at discuss the safe problem of the network,virus, a procedure,mail bomb,the long range interception etc.the all these let person's tremble
2、with fear scared.virus,black guest of rampant make body for today the people of the networksociety feel talk that thenet colorchange,indecisive. but we are essential to know clearly,the safe problem of all these everything we can't find out the solution once and all,having plenty of besides basi
3、cally can't find out the exhaustive solution, suchas the virus procedure,because any anti-virus procedure all only the ability then can develop out after mew virus detection,returning to have no currently which ability an anti-virus software develop the software that the company dares to promise
4、 them and can check to kill all have already know ofand unknown virus ,so we can't have work safetyagain the mind that get to the internet,because probably the network can't have so on first,for the elephant"pike"and"shield's",the network and virus,black guests are a
5、rightness of coexistence bodies forever. the computer of the modern encrypt technique be adapted the network the demand of the safetybut should carrythe output, it carries on the general electronic commerce activity to provide the safety for us guarantee,such as carry on document's deliver in th
6、e network,the e-mail come-and-go and carryon the contracttext originally of sign etc.encryptthe technique in factalso isnotwhatnew-bornthing,onlyapplied in nowadayselectroniccommerce,thecomputernetwork still thehistory ofthe lastfew years.underneath wethe detailed introduction encryptthetechnique to
7、still have superficial knowledge offriend provide opportunities ofdetailed understanding! one,thecause ofencrypt encryptis a kind of methodthat usedto protect data, it exist fora long time,the history thatis producedisverylongago, it istooriginateandtracebackto in 2000b.c.(afewcentury),although it i
8、s not now we speak of encrypt the technique(even not call encrypt),be a kind concept for encrypt,define bore as early as and several centuries ago.at that time theegyptian usedthe special pictographto bethe information coding firstof,changing along with time,the babylon,mesopota-mia was second to st
9、art use some method with greece civilizations all to protect their written forminformation. encryptthetechniquetomainlybeapplied in themilitaryrealm in thenearfuture,suchasthe american independent war,american civil war and two world wars.the coding machine that behave to know most widely is the mac
10、hine of german enigma,the german makes use of in the worldwarii it establishestoencrypttheinformation.thus,becauseoftheeffortofthealanturing and ultra plan and others they carries on to breakthe solution to the german's password finally.at the beginning, the research of the calculator be for bre
11、aking the password of the solve the german,the people did not thought of that the calculator give information revolution bring today.along with the development of the calculator,which build up of the operation ability,past passwords allied become very simple ,hence the people studied constantly agai
12、n the new data encrypts the way,if make use of the output and private key and male keys of calculate way of rosas are outputon this foundation. two,thereasonwhyweuseencrypt nowadays the networksociety the choice to encrypt is already essential tous,one weknow is that going forward to communicate off
13、icially the piece to deliver in the internet ,the e-mail business come-and-go exist many in security factors,taking charge of to some archdukes especiallytodeliver withsomesecretdocumentsonthenetwork.andthiskindofinsecurityis the internet existence foundation-tcp/ip argument proper,include some acco
14、rding to tcp/ip of service;on the other hand ,the internet brought infinite business opportunities for numerous company's house,theinternet connectsthe whole world at together,headed forthe internet tomean toheadfortheworld,this goodmatterthataretolongfor in smallbusinessenterprise.forsolving th
15、is antinomies,for the sake of the ability is in the safety of foundation up greatly open this door that lead tothe world ,wehad to choose thedata to encryptand according toencryptthe technique numeralsignature. encrypt in the function on the network is to prevent from useful or the privatization inf
16、ormation be intercept on the network and steal.a simple example is a password to deliver,the calculator password is extremely important,many safe protection system is according to password of,thepasswordrevealoverallbreakupthatcomesuptospealtomeanitssafesystemin acertain meaning. whilecarryingonregi
17、sterthoughtanetwork,thepasswordkey-inis deliver withtheformof the clear statement server,but network ascend of eavesdrop is an extremely easy affair,so the customerofroot orcustomeroftheadministrators,thatresult will beextremely serious. return the like fruit your company at carry on a certain invit
18、ation to bid item's bid to work,thestaffmembergivesoutouttheinvitationtobidunittothemarkbookoftheir unit in the wayofe-mail,ifhavethis time,knowingtheobjectthatyourcompanybidfrom it ,thatresultwill how,believe need notsaycleverness moreofyou arealsounderstand. such example is really too many , t
19、he project that solves the above-mentioned hard to crack is to encrypt, encrypt behind of mark book have no private key of consignee and also can't untie ,mark disorderly code that book become a lot of to have no actual meaning .in fine regardless is unit or personal come up to say in a certain
20、meaning that ages that encrypt to also becomethenetworksociety tocarryonthedocumentorthemailsslsnowadayssymbolize! numerical signature be according to encrypt the technique ,its function be use whether certain customer is true or not .apply is still an e-mail at most,such as be customerto receive an
21、 e-mail,mail top the mark has the addressee's name and the mailbox addresses,the many people maythink in brief theaddresseris alatterupexplanatorythatperson,butforgeane-mailactually for an usually person to say that is an extremely easy matter .in this kind of case,will use the numeral signature
22、 of the encrypt the technique foundation,use it the confirmation sends letter the reliability ofthe human body. the similar numeral signature is technical to still have an attestation of a kind of body technique ,some stations orderto provide into the station ftpand thewww service,certainly this ser
23、vicethatusuallyget in touchwithisananonymousservice,thepowerofthecustomerwantsto be subjected to the restrict ,but this service that also have is not anonymous ,such as the some companyprovidethecustomertocooperatethenotanonymousftpofcolleague forthesakeof the information exchanges service,or develo
24、p the group their web carries the customer up of server of www up,the problem of now be ,customer be the customer think of that person,an attestation ofbody thetechnique is a goodsolution. need to be emphasize here that 1:00be,the document encrypt in fact no t used for e-mail or the document on the
25、networks' deliver only,also can apply the document protective of the static statein fact,cancliptocarryonencrypttothedisk,thedocumentprthedocument in theharddrive suchas the software ofpip,inorderto preventthe others steal amongthem ofinformation. three,twokinds of encryptmethod the encrypt tech
26、nique is usually divided into the two major types:"symmetry type"and"not symmetrytype". the symmetry type encrypt is to encrypt and decrypt to use the same name of key of encrypt,usually call it as"the session key"this kind of encrypt the technique currently drive exten
27、sive adoption,encrypt such as the des that american government adopt the standard is a kindof "symmetrytype"of typicalmodeltoencryptthemethod,itsthelengthofsessionkeyis a 56bites. the not symmetry type encrypt is to and decrypt use of is not the same of key of encrypt,usually havetwoencryp
28、tkeys,becalled "male key"and"privatekey",theytwomustform couples the usage,otherwise can't open to encrypt the document."male key"here means and can announce outward of,"private key" then can't ,only the ability is know by a person of holder.its superi
29、or sex right here,because the symmetry type encrypts the method if deliver to encrypt the document on the network very difficult tell the other party the key of the encrypt,use in spite of what method all was probably do not eavesdrop.rather than the symmetry type encrypt the methodcontaintwoencrypt
30、keys,and "malekey"inwhichis canpubliclyof,alsoknowforthenot afraid other people,the consignee decrypt as long as use own private key then with,thus nicely avoided thekey ofencryptdeliver the safetyproblem . four,themanagement ofthe keyof encrypt the key of encrypt requests to keep secret s
31、ince this involve the key of encrypt of the management problem ,if don't manage well,the key is possible revealed unconsciously,is not to have the key of encrypt, any keep also just opposite ,sometimes effect.to manage the good key ,westill needto notice following few aspect: 1,theusageof thekey
32、 wantstonotice the time limited efficacy andnumber oftimeless ifthe customercan use the same key and other people to exchange the information once and with a run, sokey alsotogether other any passwords are similar to existthe certain safety.although say that the private key of the customer is wrong
33、the outside is is public of,also can hardly guarantee the confidentiality of the private key long-term, the very difficult assurance was not reveal for long time.if someone knew the key of the customer accidentally,so customer ever and each news that another person exchange no longer are to keep sec
34、ret of.use another information that particular key encrypt more many,provide to eavesdrop of material also more many,come up tospeak froma certain meaning meaning alsomoreinsecurity. therefore ,emphasize generally only used for a dialogue key an information in or have a conversation once medium, or
35、build up a kind of replace the mechanism of the key to let up the possibility ofthe revelation on time. 2.the management ofencrypt suppose to have 100 persons in some organization,if they arbitrarily two people's can carry on the secret dialogue, need so and altogether how many keys?everybody ne
36、ed know how many keys?perhaps veryeasy get an answer, if of any twopersonwants thedifferent key,then need 4952 altogether ,andeverybody should remember99 keys.ifthe number of the organization is 1000 and 10000 people or more , this kind of way obviously and too stupid,the management key will be a te
37、rrible affair. the kerberos provided a kind of solve this better project,it is to be invent by the mit of,make management of keep secret the key and distribute to become very easy ,but this kind of method still exist the certain weakness.in order to can provide a practical solution on internet,the k
38、erberos built up a safety of,the key of the dependability distributes the center(the key distribution center ,kdc),each customer as long as know a different from kdc carry on the key ofthe conversation all rightly,but donotneed to know100 upto thousandthkey. suppose the customer a wants to carry on
39、the secret correspondence with the customer b,then the customer a first and kdc correspondence,use to only have the customer a and kdcs to know of the key of the carry on encrypt,the customer a tell the kdc that he thinks to carry on thecorrespondencewiththecustomerb,andbornlabel,this labeliscarryon
40、bythekdcandkey of between the customerb to encrypt,and at the customer a start and the customerb dialogue,the customer a will hand over to the customer b this label.the function of this label is to let the customer a make sure is the customer b with his confabulation, not the one who pretend to be .
41、because this label is from only the key that the customer b and kdcs know carry on encrypt of,so the one who even pretends to be gets the label customer a send out to also impossibly carry on decrypt,only the customer b can carry on decrypt enough after receive, the person who thus made sure tohave
42、a conversation with the customera is customerb. when born label and random conversation passwords of kdc,would they use only have the customer a and kdcs know of the carries on encrypt ,then pass the customer a to the label and the conversation key ,theresult forencryptcaninsure to only have the cus
43、tomera andcan getthis information ,only have the customer a and can make use of this conversation key and the customer b to carry on converse.manage together ,the kdc will encrypt the key that the conversation password use to have kdc and the customer b to know , and give the customer b the conversa
44、tion key. the customer a will startan and the conversation of the customer b,counteract to get of the conversation key encryptthe oneself and the body ofthe assurancecustomer b,still wantthe kdc passes it of the label passes the customerb with the body ofthe assurance customerb, then of the customer
45、 a and the customer b can use the conversation key carries on the safety of the conversation ,and for the sake of the assurance safety,this conversation key is a time ,the thus blackguestismoredifficulttocarriedontobreaktosolve.atthesametimebecausethekeyis a sex to be is automatic by the system to p
46、roduce of ,then the customer need not record so many keys,conversation the people's correspondence. five,encryptthetechnicalapplication theapplicationoftheencrypttechnicalis various,butthemostextensiveis in theelectronic commerceandthe application onthe vpns,wewill distinguish it simple as follo
47、w: 1,theapplication in electronic commerce the electronic commerce(e-business)request the customer and can go forward to go various business activity in the net,need not worry that own credit card would be appropriate by the person.at past,customer for keeping the number fo the credit card from burg
48、larize to take ,order through a telephone generally ,then use the credit card ofthe customer to carry the payment .now the people start to encrypt the technique with the rsa(a kind of public/ privately owned key),the safety that the exaltation credit card trade.thus make the electronic commerce alig
49、nment practical tomake possible. many persons all know that the company of netscape leads the technical promoter in the business of internet,that companyprovided a kind of according to rsaand keep secret the key of application in the technique of internet,is be called safe electric outlet layer.(the
50、 secure sockets layer,ssl)perhapsthe many people knows the socket ,it is a plait distanceinterface,don't provide any safe measure ,but the sslnot only provide to weave the distance interface ,but also heading up to provide a kind of service of safety,the ssl3.0 have already applied to the server
51、 and browsersnow up,the ssl2.0thencanbe apply in the servercarry only. after ssl3.0 practive the body to carry on the verification with a kind of digital certificate(the electric certificate),the both parties can use to keep secret the conversation that the key carries on the safety .it uses ai the
52、same time"symmetry" encrypt the method with"not symmetry's ,in the process of the server of the customer and electronic commerce carry on communicate,the customer will produce a session key,then the customer carries on the session key to encrypt with the male key that the server c
53、arry,then pass the server to carry ,after both parties all know the session key ,the data that deliver are all with the session key to carry encryptinganddecryptingof,buttheservercarrythemale keyofgiveoutthecustomeressential firsttothe relevant hair certificateorganization application ,tobe notarize
54、. according to the safety guarantee that ssl3.0 provide ,customer can freely order the merchandise an give a credit card number ,also can on the net and cooperate the colleague the exchanges business information and let supplier come over from the net hair the order and mate's receipt,can save a
55、 great deal of paper thus ,save a great deal of telephone for the company ,fax expenses.at past ,the electronics information exchange(the electric data interchange ,edi),the information trade (the information transaction)totrade (the financial transaction)with finance is all ontheappropriationnetisc
56、onsumedlyhigh in internet.hugecome -onexactlyandthus,justmake the people start develop the electronic commerce on internet ,but do not forget that the data encrypt. 2,theapplication ofthe technique of encrypt in the vpn now,more many more many companies alignment internationalization,a company possi
57、bility all has the administrative body or the sale centers at several nations,eachorganizations contain the area net lan(the local area network)in own bureau ,but nowadays of the network social people's request not only such ,the customer hope the wide area network social people's request no
58、t only such,the customer hope the wide area network that these lans link constitutes a companytogether,this now already is notwhatdifficult matter. in fact,a lot of companies all have already done like this,but their general usage rent the appropriation circuit to link the area net of these bureaus
59、,what they consider is safe problem of the network .have to encrypt now decrypt the router of the function already everywhere are all.this make people make possible throughthe area net thatthe internetlinks these bureaus,this be we usually say of virtual appropriation net.(the virtual private networ
60、k,vpn)when the data leaves the area net of the bureau of the dispatcher place,that data was linked the router on the internet to carry on hardware's encrypt by the customer first,the data is on the internet is with the from transmission that encrypt of,be the router of attain the purpose lan,that router the meeting logarithms according to carry decrypt,thus
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 四川幼兒師范高等??茖W(xué)校《大地測(cè)量學(xué)實(shí)驗(yàn)》2023-2024學(xué)年第二學(xué)期期末試卷
- 晉中師范高等??茖W(xué)?!毒W(wǎng)絡(luò)及其計(jì)算》2023-2024學(xué)年第二學(xué)期期末試卷
- 福建對(duì)外經(jīng)濟(jì)貿(mào)易職業(yè)技術(shù)學(xué)院《大學(xué)生勞動(dòng)教育》2023-2024學(xué)年第二學(xué)期期末試卷
- 天津藝術(shù)職業(yè)學(xué)院《文獻(xiàn)目錄與信息檢索》2023-2024學(xué)年第二學(xué)期期末試卷
- 2025海南省安全員A證考試題庫及答案
- 貴州中醫(yī)藥大學(xué)時(shí)珍學(xué)院《安全經(jīng)濟(jì)學(xué)》2023-2024學(xué)年第二學(xué)期期末試卷
- 2024-2025學(xué)年遼寧省七校協(xié)作體高一上學(xué)期12月月考?xì)v史試卷
- 2025江西省建筑安全員-A證考試題庫及答案
- 漯河醫(yī)學(xué)高等??茖W(xué)校《奧林匹克文化》2023-2024學(xué)年第二學(xué)期期末試卷
- 遼寧輕工職業(yè)學(xué)院《阿拉伯文學(xué)選讀》2023-2024學(xué)年第二學(xué)期期末試卷
- 教科版 二年級(jí)下冊(cè)科學(xué)教學(xué)計(jì)劃
- 中國(guó)膿毒癥及膿毒性休克急診治療指南
- 部編版六年級(jí)道德與法治下冊(cè)《學(xué)會(huì)反思》教案
- 人教版體育與健康四年級(jí)-《障礙跑》教學(xué)設(shè)計(jì)
- DB32-T 2860-2015散裝液體化學(xué)品槽車裝卸安全作業(yè)規(guī)范-(高清現(xiàn)行)
- 部編版四年級(jí)下冊(cè)語文教案(完整)
- T∕CIS 71001-2021 化工安全儀表系統(tǒng)安全要求規(guī)格書編制導(dǎo)則
- 福利院裝修改造工程施工組織設(shè)計(jì)(225頁)
- 環(huán)境空氣中臭氧的測(cè)定
- 第七章 化學(xué)物質(zhì)與酶的相互作用
- 機(jī)械畢業(yè)設(shè)計(jì)論文鋼筋自動(dòng)折彎?rùn)C(jī)的結(jié)構(gòu)設(shè)計(jì)全套圖紙
評(píng)論
0/150
提交評(píng)論