当前位置:网站首页>Chapter 4 - key management and distribution
Chapter 4 - key management and distribution
2022-06-12 07:34:00 【bugmaker.】
- Key lifetime : produce 、 Storage 、 Distribute 、 Use 、 to update 、 revoke 、 The destruction
- Secret key classification
Primary secret key : Encryption and decryption data .
Second level secret key : Secret key encryption secret key , Protect the primary secret key .
Master key : Protect the secondary secret key . - Secret key distribution technology : Direct distribution 、 Key distribution center mode 、Diffie-Hellman Method 、 Hierarchical secret key assignment
- Key distribution center mode
technological process :KDC( Key distribution center ) Share a second level with each user ( Secret key encryption ) Secret key , The user to KDC Request session key ,KDC Generate session key ,KDC Use the secret key to encrypt the session secret key and distribute it to the user
advantage : The user does not save the work key , One report and one secret can be realized
shortcoming : Large traffic , Better identification function is required , To identify KDC And the user - Public key cryptosystem allocates secret keys
(1) towards B Send the generated public key and A The identity of the
(2)B After receiving the message , Generate session key Ks, Add... With public key Pass the secret to A
(3)A Decrypt with the private key to get Ks problem : May be passed off as - Public key management solution
Public key disclosure : No need for confidentiality , The list must be complete
Bind the public key to the identity
Guaranteed by a trusted third party
Other user authentication certificates - Public key certificate : Users exchange their public keys through public key certificates
data structure : User ID 、 Public key 、CA Signature
Certificate type : In terms of use : Signing certificate and encryption certificate
From the perspective of end users : System certificate and user certificate - PKI— Public key infrastructure : An infrastructure established to manage public keys and certificates .
PKI Logical structure of
- Certification body (CA): Be responsible for issuing user secret keys or certificates 、 to update 、 abolish 、 Certification and other management work , Divided into public CA And private CA
- CA function : Issue certificate 、 Annulment certificate 、 Certificate update 、 Certificate authentication and secret key management .
- PKI Architecture of : single CA structure 、 level CA structure 、 cross CA structure
边栏推荐
- paddlepaddl 28 支持任意维度数据的梯度平衡机制GHM Loss的实现(支持ignore_index、class_weight,支持反向传播训练,支持多分类)
- @Datetimeformat @jsonformat differences
- Pyhon的第六天
- sql——课程实验考查
- Arrangement of statistical learning knowledge points gradient descent, least square method, Newton method
- RT thread studio learning (I) new project
- SQL -- course experiment examination
- TypeScript基础知识全集
- Detailed explanation of TF2 command line debugging tool in ROS (parsing + code example + execution logic)
- MySQL index (easy to handle in one article)
猜你喜欢

Design an open source continuous deployment pipeline based on requirements

Explain in detail the use of dynamic parameter adjustment and topic communication in ROS (principle + code + example)

Fcpx plug-in: simple line outgoing text title introduction animation call outs with photo placeholders for fcpx

Detailed principle of 4.3-inch TFTLCD based on warship V3

RT thread studio learning (VIII) connecting Alibaba cloud IOT with esp8266

Detailed explanation of addressing mode in 8086

Detailed explanation of TF2 command line debugging tool in ROS (parsing + code example + execution logic)

Demonstrate "topic communication, action communication, service communication and parameter server" with a small turtle case

Explain ADC in stm32

Learning to continuously learn paper notes + code interpretation
随机推荐
右击文件转圈卡住、刷新、白屏、闪退、桌面崩溃的通用解决方法
RT thread studio learning (I) new project
Thyristor, it is a very important AC control device
The first demand in my life - batch uploading of Excel data to the database
Installation and use of eigen under vs2017
Velocity autocorrelation function lammps v.s MATALB
Summary of machine learning + pattern recognition learning (VI) -- feature selection and feature extraction
ROS dynamic parameter configuration: use of dynparam command line tool (example + code)
R语言使用RStudio将可视化结果保存为pdf文件(export--Save as PDF)
‘CMRESHandler‘ object has no attribute ‘_ timer‘,socket. gaierror: [Errno 8] nodename nor servname pro
knife4j 初次使用
sql——课程实验考查
Thoroughly understand the "rotation matrix / Euler angle / quaternion" and let you experience the beauty of three-dimensional rotation
AI狂想|来这场大会,一起盘盘 AI 的新工具!
R语言使用epiDisplay包的summ函数计算dataframe中指定变量在不同分组变量下的描述性统计汇总信息并可视化有序点图、使用dot.col参数设置不同分组数据点的颜色
Unity用Shader实现UGU i图片边缘选中高亮
Missing getting in online continuous learning with neuron calibration thesis analysis + code reading
Vs2019 MFC IP address control control inherits cipaddressctrl class redrawing
RT thread studio learning (VIII) connecting Alibaba cloud IOT with esp8266
Modelants II