Current location - Quotes Website - Signature design - Directory of basic knowledge of information security
Directory of basic knowledge of information security
Chapter 65438 +0 Basic Concepts

1 Internet and information security under network environment

1. 1. 1 Basic categories of security attacks

1. 1.2 Common information security protection technologies and products

1. 1.3 Basic contents of information security research

2 security services

1.2. 1 confidentiality

1.2.2 Integrity

1.2.3 identification

1.2.4 access control

1.2.5 Denial of defense

1.2.6 Rights protection

3 Introduction of security mechanism

1.3. 1 encryption

1.3.2 digital signature

1.3.3 message authentication

1.3.4 identification

1.3.5 access control

1.3.6 notarization and trusted third party

1.3.7 traffic filling, information hiding and routing control

1.3.8 data backup

1.3.9 recovery rate

1.3. 10 event detection and security audit

1.3. 1 1 Kill malicious programs

Exercise 1

Chapter II Basic Algorithms

1 Introduction to Cryptography

2. 1. 1 Traditional Cryptosystem

2. 1.2 public key cryptosystem

2 traditional cryptographic algorithm

2.2. 1 DES encryption algorithm

2.2.2 A5 encryption algorithm

Other encryption algorithms

2.2.4 Encryption algorithm and data confidentiality

3 traditional cryptographic technology

2.3. 1 block cipher usage mode

Communication encryption

Storage encryption

4 public key encryption algorithm

2.4. 1 public key cryptography idea

rsa algorithm

2.4.3 Diffie。 Herman key exchange algorithm

EIGamal encryption algorithm

5 digital signature algorithm

2.5. 1 RSA digital signature

E 1Gamal digital signature

6 hash function

Hash function SHA. 1

2.6.2 Data integrity and hash function

Exercise 2

Chapter III Basic Cryptographic Protocol

1 Overview of security protocols

2 key distribution and authentication protocol

3.2. 1 key exchange

Authentication protocol

3 blind digital signature protocol

Four promises

Application of 5 cryptographic protocol

3.5. 1 electronic coin

Electronic voting

6 secure multiparty computing

Multi-party computing protocol for millionaire problem

3.6.2 Multi-party Calculation Agreement for Balanced Wages

Exercise 3

Chapter 4 Security Model

Chapter V Applied Technology

Chapter VI Infrastructure

refer to