期刊文献+

加密技术下的信息安全 被引量:4

The information security in Encryption technology
原文传递
导出
摘要 计算机和通信网络的广泛应用,一方面为人们的生活和工作带来了极大的方便,另一方面也带来了许多亟待解决的问题,以"棱镜门"事件为例,信息的安全性就是其中的重中之重。信息安全性主要体现在两个方面:信息的保密性和认证性。保密性的目的是防止对手破译系统中的机密信息。认证的目的主要有两个,一个是验证信息发送者是真的而不是冒充的;另一个是验证信息的完整性,即信息在传输和处理的过程中没有被篡改。加密技术是保证信息安全的关键技术,常用的加密技术有:对称密钥加密、公开密钥加密、哈希函数加密等,其应用有:数字认证及授权,安全协议等。而一系列的加密技术都依赖于密码学技术。本文将主要通过对密码学及各种加密技术的研究与分析,来论述加密技术与信息安全之间的不可分割的关系及应用。 Computer and conmaunications networks widely used, on the one hand for the people' s life and work has brought great convenience, it also brought many problems to be solved, In "Prisms door" incident as an example, information security is one of the most important. Information security is mainly reflected in two aspects: confidentiality and authentication. Confidentiality is intended to prevent the opponent' s confidential information to decipher the system. Certification has two main purposes, one is to verify that the sender is really not bogus; another is to verify the integrity of the information, that information in the course of transmission and processing has not been tampered with. Encryption technology is a key technology to ensure information security, encryption techniques commonly used are: symmetric key encryption, public key encryption, cryptographic hash function, with its applications are: digital authentication and authorization, security protocols. The range ofencryption technologies rely on cryptography. This article will mainly through a variety of cryptography and encryption technology research and analysis to discuss encryption technology and information security and the inseparable relationship between the application.
作者 晏国勋
出处 《网络安全技术与应用》 2013年第8期100-104,共5页 Network Security Technology & Application
关键词 信息安全 加密技术 密码学技术 Information security Encryption techniques Cryptography
  • 相关文献

参考文献4

  • 1Brian Hatch, 2001, Linux Security Secrets & Solutions, The McGraw-Hill Companies.
  • 2IEEE, 2004, Functional [Zequirements for 802.20 Security, IEEE.org.
  • 3RSA, 2010, The Security Division of EMC, www.rsasecurity.
  • 4Stallings W,2006,密码学和网络安全,Prentice HALL.

同被引文献9

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部