explain
In PKCS#7, digital envelope is defined as a term, but in the text, it is explained as follows: digital envelope contains encrypted content and encryption key used to encrypt the content. Although the public key of the receiver is often used to encrypt the "encryption key", it is not necessary, and it can also be encrypted by using the symmetric key enjoyed by the sender and the receiver in advance. When the receiver receives the digital envelope, it decrypts it with the private key or pre-shared key to obtain an "encryption key", and then decrypts the ciphertext with this key to obtain the original text. Digital envelope technology uses a two-layer encryption system.
Digital envelope is a technology that uses the advantages of symmetric encryption technology and asymmetric encryption technology to transmit information safely. Digital envelope not only plays the advantages of fast speed and good security of symmetric encryption algorithm, but also plays the advantages of convenient key management of asymmetric encryption algorithm.
Question 2: What is a digital envelope? How does it work? Digital envelope is an application of public key cryptosystem in practice, which uses encryption technology to ensure that only the designated specific recipients can read the communication content.
In a digital envelope, the sender encrypts the information content with a symmetric key, and then encrypts the symmetric key with the receiver's public key (this part is called a digital envelope), and then sends it to the receiver together with the encrypted information. The receiver first opens the digital envelope with the corresponding private key to obtain the symmetric key, and then decrypts the encrypted information with the symmetric key. This technology is quite safe. Digital envelope mainly includes digital envelope packaging and digital envelope disassembly. Digital envelope encapsulation is the process of encrypting the encryption key with the other party's public key, and only the other party's private key can restore the encrypted data (communication key). Digital envelope unpacking is the process of decrypting encrypted data with private key.
The function of digital envelope is similar to that of ordinary envelope. Under the restriction of law, it is guaranteed that only the recipient can read the contents of the letter. Digital envelopes use encryption technology to ensure that only the designated recipients can read the information content. Digital envelope adopts symmetric cryptosystem and public key cryptosystem. The sender of the information encrypts the information with a randomly generated symmetric password, and then encrypts the symmetric password with the public key of the receiver. A symmetric password encrypted by a public key is called a digital envelope. When transmitting information, if the information receiver wants to decrypt the information, he must first decrypt the digital envelope with his own private key to obtain a symmetric password, and then he can decrypt the obtained information with the symmetric password. This ensures the authenticity and integrity of data transmission.
In some important e-commerce transactions, the key must be changed frequently. In order to solve the problem of changing the key every time, this paper combines the advantages of symmetric encryption technology and public key technology, overcomes the problems of difficult key distribution and long encryption time in public key encryption, and adopts two-level encryption to obtain the flexibility and efficiency of public key technology. The sender uses a password to encrypt the information, thus ensuring that only the designated recipients can read the contents of the letter. After adopting the digital envelope technology, even if the encrypted file is illegally intercepted by others, the interceptor can't get the sender's communication key and can't decrypt the file.
Question 3: What do digital envelopes mainly include? Digital envelope mainly includes digital envelope packaging and digital envelope disassembly.
Digital envelope encapsulation is the process of encrypting the encryption key with the other party's public key, and only the other party's private key can restore the encrypted data (communication key).
Digital envelope unpacking is the process of decrypting encrypted data with private key.
Question 4: What are the functions of digital signature and digital envelope? Digital signature is used to verify a person's identity, when every certificate issued by an accredited CA is unique and supported by law. Digital envelopes are used to convey confidential information.
Question 5: Which of the following statements about digital envelopes is the correct answer: C.
C is correct. Digital envelope uses symmetric key to encrypt messages, and uses symmetric encryption technology, and symmetric key is encrypted by the public key of the receiver to ensure security.
A is incorrect. The content of digital envelope consists of message ciphertext and key ciphertext, and does not contain digital signature.
B that's not correct. Digital envelopes are used to transmit confidential information. It cannot confirm the identity of the sender. It is the digital signature that can confirm the identity, not the digital envelope. The digital envelope does not contain the identity of the sender.
D is incorrect. How can the sender have the private key of the receiver?
Question 6: What is the concept of digital envelope technology? Digital envelope technology: the research and development direction of digital media, mainly studying the digital transformation and audio-visual technology for radio and television industry, and studying the further application in other industries.
The main research contents of digital media technology are:
1, broadband media technology
2. Video and audio editing technology based on MPEG-II.
3. TV/radio news production management technology.
4. Research on key technologies of digital broadcasting control.
Question 7: Briefly describe the operation process of digital envelopes-describe the process of online shopping 1. Consumers browse goods. 2. Consumers choose goods. 3. The consumer receives the order. 4. Consumers choose the settlement method. 5. After the consumer fills in the order, he will submit the order to the seller and inform him of the selected settlement method. 6. The seller asks the consumer's bank to provide settlement authorization. 7. The seller still sends the confirmation of shipment and settlement to the consumer. 8. The seller asks the consumer for bank settlement. 2. What are the advantages of the integration of online marketing and traditional marketing? Advantages: cost saving. 3. How to rationalize the distribution? 1. What are the hidden dangers of e-commerce? 1. Internet problem 2. Security issues of operating system. Security problems of application software. Security problems of communication transmission protocols. Security management of network. This paper briefly describes the characteristics of e-commerce system supporting pre-transaction system in different stages of business processing, mainly to query business information and organization. At present, most of all kinds of e-commerce systems on the Internet belong to this category. Support trading system, mainly the exchange of various business documents and documents between buyers and sellers in business activities; Support post-transaction system, mainly post-transaction system, mainly involving banks, financial institutions and uniforms. The system is required to complete the functions of fund payment, accounting and cargo transportation. What are the advantages of e-commerce? 1. High speed and high efficiency, 2. Wide coverage, 3. Low cost, 4. More comprehensive functions, 5. More effective service, 6. More flexible use, 7. Enhance the competitiveness of enterprises. 7. Please illustrate several security authentication technologies related to e-commerce. 1. Authentication 2. Digital summary 3. Digital signature 4. Digital time cutting 5. Digital voucher 8. In the e-commerce system, in order to complete business operations, to sum up, there are five processes ... 1. information * * * 2. Order online. Transaction execution 4. Service and support. Online payment. E-commerce is classified by transaction object 1 .b2b2.b2c3.b2a4.b2ax. What kinds of common digital certificates are there1? Secure e-mail certificate 2. What is a payment gateway? 1. It is a set of servers connecting the bank network and the Internet. Its main function is to complete the communication, protocol conversion and data encryption and decryption between them, thus protecting the security of the bank's internal network. Twelve. What is customer relationship management? It is a kind of management thought and method that advocates the enterprise to take the customer as the center. The difference between narrow sense and broad sense? Narrow e-commerce, also known as electronic transactions, mainly refers to online sales; Generalized e-commerce mainly refers to the application of network management in enterprise internal e-commerce. What is the function of e-commerce? 1. Advertising. 2. Consultation and negotiation. Order online. Online payment. Electronic account. Service delivery. Consultation 8. Transaction management. Five processes of electronic commerce 1. Enjoy the information * * * 2. Order online. Online payment. Execute transaction 5. Service and support. What problems should be paid attention to in the implementation of e-commerce? 1. Show a distinctive shopping interface. 2. Ensure the security of the transaction. 3. Consider the compatibility of the system. 4. Fully develop data mining. 5. Provide high-performance servers. List the encryption technologies used in the SET protocol. 1. Critical system 2. Public key system 3. Digital envelope 4. Digital signature 5. Message summary 6. Double signature noun explanation 1. EDI is an electronic transmission method, which is used to transmit business documents from one computer to another technology according to recognized standards. Symmetric key encryption algorithm refers to the use of the same key to encrypt and decrypt files. E-commerce in a narrow sense is also called electronic transaction, which mainly refers to online sales. Generalized. 5. E-government means that * * * organizations use information technology to realize various functions of * * *. 6. E-commerce system: It is a comprehensive business information processing system integrating ordering, transportation, warehousing, insurance, commodity inspection and bank settlement based on electronic data processing, global network, data exchange and capital exchange. 7. Third-party logistics: refers to an external organization that provides services for users, enterprises or final consumption by using modern technology ..... >>
Question 8: What are the urgent functions of digital signature and digital envelope in the final exam of e-commerce? ! ! Digital signature technology has been widely used in the field of e-commerce, but most of our daily signatures are not in the business field, but in the organization.
In large organizations with complex business, the traditional paper document signing method will consume a lot of time, mainly the delivery of documents and waiting for the signer. Although there are electronic documents, they have to be printed, copied and signed.
In order to save the signed complete document, only paper documents can be archived. At the same time, in order to facilitate future changes, electronic documents are often saved at the same time, and the consistency between paper documents and electronic documents is also maintained. This brings a lot of inconvenience to organizations and enterprises with many documents.
Many formats of electronic documents can't or can't be output in paper form, and the traditional paper signature can't realize the confirmation and consistency guarantee of such documents.
In addition, working in different places has become very common. Although electronic documents can be delivered quickly and conveniently by e-mail, it really can't solve the problem of consistency and non-repudiation of documents.
If electronic signature can be realized conveniently and quickly, all the above problems can be solved easily. Digital signatures can play the following roles:
Ensure the integrity and consistency of content: once some electronic data are digitally signed, as long as there are any minor changes in these data, the signature can no longer be verified.
Ensure the non-repudiation of the signature: no one can impersonate other users for digital signature, that is, a user cannot deny his valid signature.
Based on the basic digital signature technology and algorithm, MDSS has expanded rich and practical functions, and is the most comprehensive and professional enterprise-level electronic document digital signature software at present.
I typed them one by one, remember to adopt them!