期刊文献+

大数据时代信息安全保障算法和法律的融合 被引量:1

The Integration of Information Security Guarantee Algorithms and Laws in Big Data Era
下载PDF
导出
摘要 在大数据的时代背景下,用户的信息安全至关重要。信息的传输过程通常不以明文直接传输,而是在密码学的基础上通过加密算法实现密文传输,最大程度减少信息被窃听的风险。同时为了保证信息发送者的真实性以及传送途中不被窃听者篡改,引用了数字签名技术。通过常用的SHA-1算法等技术对信息进行了安全与认证,在技术上对大数据信息进行了保护;同时又与网络安全法等法律进行了融合,在理论基础和法律上对信息安全实现了双重保护。 In the era of big data, the user's information security is crucial. The transmission of information is usually not transmitteddirectly in plain text. Instead, the transmission of ciphertext is implemented based on cryptography using an encryption algorithmto minimize the risk of eavesdropping of information. At the same time, in order to ensure the authenticity of the sender of the mes-sage and not to be tampered with by eavesdroppers on the way, the digital signature technology is used. Through the commonlyused technologies such as SHA-1, the security and authentication of information is carried out, and the big data information is tech-nically protected. At the same time, it is merged with laws such as cybersecurity law, and the information security is realized theo-retically and legally Double protection.
出处 《电脑知识与技术》 2018年第2Z期30-32,共3页 Computer Knowledge and Technology
关键词 密码学 数字签名 安全与认证 SHA-1算法 网络安全法 Cryptography Digital Signature Security and Authentication SHA-1 Algorithm Network Security Law
  • 相关文献

参考文献9

二级参考文献69

  • 1白廷国.古典密码学初探[J].齐齐哈尔师范高等专科学校学报,2005(1):114-116. 被引量:1
  • 2盛利元,李更强,李志炜.基于切延迟椭圆反射腔映射系统的单向Hash函数构造[J].物理学报,2006,55(11):5700-5706. 被引量:19
  • 3Diffle W, Hellman M. New direction in cryptography[C]. IEEE Tran Inform Theory IT-22, 1976,664-654.
  • 4Shaft Goldwasser, Silvio Micali,Ronald L.A digital signature secure against adaptive chosen-message attacks[J].SIAM J Computing, 1988,(17):281-308.
  • 5Alfred Menezes, Nigel Smart. Security of signature schemes in a multi-user setting[DB/OL], http://citeseer.ist.psu.edu/menezes 01 security.html.
  • 6Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems[C].Com of the ACM,1978.120-126.
  • 7NIST. Digital signature standard(DSS)[S].Publication 196,Federal Information Processing Standards, 1994-11.
  • 8Hellman M E,An extension of the Shannon theory approach to ctytography[J].IEEE Trans Inform Theory, 1975,10(4): 334-336.
  • 9Diffie W, Ehellman M. Multiuser cryptographic techniques[C].Presented at National Computer Conference,New York, 1976.
  • 10NIST. Secure hash standard[S]. Federal Information Processing Standards, FIPS-180-1 ,April 1995.

共引文献66

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部