1 Internet and information security under network environment
1. 1. 1 Basic categories of security attacks
1. 1.2 Common information security protection technologies and products
1. 1.3 Basic contents of information security research
2 security services
1.2. 1 confidentiality
1.2.2 Integrity
1.2.3 identification
1.2.4 access control
1.2.5 Denial of defense
1.2.6 Rights protection
3 Introduction of security mechanism
1.3. 1 encryption
1.3.2 digital signature
1.3.3 message authentication
1.3.4 identification
1.3.5 access control
1.3.6 notarization and trusted third party
1.3.7 traffic filling, information hiding and routing control
1.3.8 data backup
1.3.9 recovery rate
1.3. 10 event detection and security audit
1.3. 1 1 Kill malicious programs
Exercise 1
Chapter II Basic Algorithms
1 Introduction to Cryptography
2. 1. 1 Traditional Cryptosystem
2. 1.2 public key cryptosystem
2 traditional cryptographic algorithm
2.2. 1 DES encryption algorithm
2.2.2 A5 encryption algorithm
Other encryption algorithms
2.2.4 Encryption algorithm and data confidentiality
3 traditional cryptographic technology
2.3. 1 block cipher usage mode
Communication encryption
Storage encryption
4 public key encryption algorithm
2.4. 1 public key cryptography idea
rsa algorithm
2.4.3 Diffie。 Herman key exchange algorithm
EIGamal encryption algorithm
5 digital signature algorithm
2.5. 1 RSA digital signature
E 1Gamal digital signature
6 hash function
Hash function SHA. 1
2.6.2 Data integrity and hash function
Exercise 2
Chapter III Basic Cryptographic Protocol
1 Overview of security protocols
2 key distribution and authentication protocol
3.2. 1 key exchange
Authentication protocol
3 blind digital signature protocol
Four promises
Application of 5 cryptographic protocol
3.5. 1 electronic coin
Electronic voting
6 secure multiparty computing
Multi-party computing protocol for millionaire problem
3.6.2 Multi-party Calculation Agreement for Balanced Wages
Exercise 3
Chapter 4 Security Model
Chapter V Applied Technology
Chapter VI Infrastructure
refer to