PKI培训海外(英文版)(共37张).pptx
《PKI培训海外(英文版)(共37张).pptx》由会员分享,可在线阅读,更多相关《PKI培训海外(英文版)(共37张).pptx(37页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、1 1为了安全为了安全 总是握奇总是握奇2009年1月14日Security payment and trusted Security payment and trusted compute productions linecompute productions linePKI introduction2 2为了安全为了安全 总是握奇总是握奇Content Information Security Background PKI Foundation A Whole PKI System Standards and reference3 3为了安全为了安全 总是握奇总是握奇the primary
2、 target of the information security assure the sender is himself defend the document be readed/writed without the authentication defend the amend for document without the authentication sender dont denied the documents the arbitration authority4 4为了安全为了安全 总是握奇总是握奇the essence and countermeasure of th
3、e security threatssecurity threatscountermeasuresLawlessly access system for operating documentsAccess control/operation controlWiretap the information or leakdocument encryptForgery transaction or deliver documentauthentication the documents sourcedocuments be sophisticated or deleteddocument integ
4、ralitySender or receiver deny the documentsundeniable5 5为了安全为了安全 总是握奇总是握奇PKI (Public Key infrastructure) Public Key Infrastructure (PKI) Supply the solutions for the security of electronic world6 6为了安全为了安全 总是握奇总是握奇Content Information Security Background PKI Foundation A Whole PKI System Standards an
5、d reference7 7为了安全为了安全 总是握奇总是握奇PKI? Infrastructure Infrastructure based on Public Key Supply security basic architecture by public key principle and technology8 8为了安全为了安全 总是握奇总是握奇symmetrical Key encrypt/decrypt processtwo parts use the same key9 9为了安全为了安全 总是握奇总是握奇problems about the symmetrical Key m
6、anage the keys and assure confidentiality are the important problems1010为了安全为了安全 总是握奇总是握奇public Key encrypt principle public Key encrypt(asymmetrical Key) a pair of keys(private Key and public key) instead of the symmetrical key sended information is encrypted by public key, receive part use the pri
7、vate key decrypt information public key may spread freely private and public key do the digital signature and validate the signature Assure the integrality and authentication sender1111为了安全为了安全 总是握奇总是握奇asymmetrical key encrypt process one public key and one private key 1212为了安全为了安全 总是握奇总是握奇compare a
8、bout two encrypt typessymmetrical keyasymmetrical keykey countsSingle key A pair of keys(private and public Keys)statementKey must secrecyA public key and a private keymanagementsimple and difficulty for management need digital certification and trusted third partencrypt velocityquicklyslowlyapplica
9、tionmass data informationsmall data information1313为了安全为了安全 总是握奇总是握奇Digest arithmeticverify the information be not sophisticated output result is computed by the digest arithmetic The result have the same length, usually is 128 bits or 160 bits, now we have the 32*8 bits-different input, the same ou
10、tput-every bit does hash the files with same hash results is impossible Any change will have the different hash result1414为了安全为了安全 总是握奇总是握奇Digital Signature OperationDataMD5SHA1SHA2561515为了安全为了安全 总是握奇总是握奇Terms signature private key encrypt validate signature public key decrypt asymmetrical encrypt p
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- PKI 培训 海外 英文 37
限制150内