本书讨论了未来“网际安全”的关键技术——基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向。
CPK Cryptosystem changes ordinary elliptic curve public key into an identity-based public key with self-assured property. Self-assured public key can advance the authentication logic from object-authenticating "belief logic" to entity-authenticating "trust logic". Self-assured public key system and trust logic of authentication composes the key technique of cyber security. The construction of trust connecting,computing,transaction,logistics,counter-forgery and network management will be the main contents of the next generation of information security.
Readers benefited from this book will be researchers and professors, experts and students, developers and policy makers, and all other who are interested in cyber security.
Part One Authentication Technique
Chapter 1 Basic Concepts
Chapter 2 Authentication Logic
Chapter 3 Identity Authentication
Part Two Crypto- systems
Chapter 4 Combined Public Key (CPK)
Chapter 5 Self-assured and 3rd Party Public Key
Ghapter 6 Bytes Encryption
Part Three CPK System
Chapter 7 CPK Key Management
Chapter 8 CPK-chip Design
Chapter 9 CPK ID-card
Part Four Trust Computing
Chapter 10 SoftwarelD Authentication
Chapter 11 Code Signing of Windows
Chapter 12 Code Signing of Linux
Part Five Trust Connecting
Chapter 13 Phone Trust Connecting
Chapter 14 Socket Layer Trust Connecting
Chapter 15 Router Trust Connecting
Part Six Trust e-Commerce
Chapter 17 e-Bill Authentication
Part Seven Trust Logistics
Chapter 18 e-Tag Authentication
Chapter 19 The Design of Mywallet
Part Eight File & Network Management
Chapter 20 e-Mail Authentication
Chapter 21 Data Storage Authentication
Chapter 22 Secure File Box
Chapter 23 e-Seal of Classification
Chapter 24 Water-wall for Intranet
Chapter 25 Digital Right Authentication
Postscript New Trend of Information Security
Appendices
Appendix A
Walk Out of Mysterious "Black Chamber"
Appendix B
Identity Authentication Opening a New Land for Information Security
Appendix C
Searching for Safe "Silver Bullet"
Appendix D
"Electronic-ID Card" Attracts International Attention
Appendix E
CPK System Goes to the World
Appendix F
Identity Authentication Based on CPK System
Appendix G
CPK Cpyptosystem
References