当前位置:网站首页>Basic knowledge of network security - password (I)
Basic knowledge of network security - password (I)
2022-07-28 04:38:00 【oceanL01】
Properties of information
Usability 、 Authenticity 、 Confidentiality
Usability : The ability of information system to provide services , Information can be served normally or obtained
Confidentiality : A secret
Authenticity : Distinguishable ( Who sent the message )、 integrity ( Are the files before and after sending the same )、 Non-Repudiation ( If you really sent this message , Can't deny )
Information security means that the owner can understand and control information in three states ( transmission 、 Storage 、 Handle ) Security properties under (CIA).
Information and data
Data is the symbolic representation of objective things .
Data is the carrier of information , But information is not equal to data .
The value of information ———— Digital survival .
The weakness of information system
Internal cause :
(1) Design problems : From the beginning, the establishment of the system lacks the overall concept and design of security .
(2) Implementation problems : There is a backdoor or unintentional bug.
(3) Configuration problems : The default service .
(4) Management problems : Insiders operate unintentionally or maliciously .
The carrier of information security is data security .
We should ensure the security of information in the information system represented by computer system and network system , Provide information security services .
Cryptography classification
Password credits for coding 、 Decipherment
Code credits for modern passwords 、 Classical code
Classical passwords are divided into substitution 、 Transposition method
Modern passwords are divided into symmetric encryption 、 Asymmetric encryption 、Hash
Symmetric encryption is divided into stream ciphers 、 Block code
According to the country, it is divided into national secret algorithm 、 International algorithm
Four key points in cryptography are data encryption 、 digital signature 、 A summary of the news 、 Key management
Use cryptography to protect the confidentiality and authenticity of information .
encryption and decryption
Ciphertext = encryption algorithm ( Plaintext + Encryption key )
Plaintext = Decryption algorithm ( Ciphertext + decryption key )
Two cryptosystems
Symmetric cryptography 、 Asymmetric cryptography
Symmetric cipher algorithm : The encryption key is the same as the decryption key , Or they can deduce from each other ( For example, replace the password ), They pass keys over secure channels
Asymmetric cipher algorithm : The encryption key and decryption key are different , And cannot be deduced from each other ( Pairs of , One-to-one correspondence ), for example RSA Algorithm . The encryption key transmission channel of asymmetric cryptosystem is not afraid of eavesdropping . The decryption key is confidential , such , People who don't know each other can also encrypt communication . Can guarantee integrity 、 Confidentiality , But there is no guarantee of identifiability and non repudiation .
Double key encryption decryption key public application —— digital signature 、 digital certificate
digital signature : Based on the data content cannot be forged .
One way hash function
One way hash function is also called message digest function , One way hash function or hash function , It is a function that changes the input message string of any length into a fixed output string, and it is difficult to get the input string from the output string . This output string is called the hash value of the message . Generally used to generate message summaries , Key encryption, etc
Classical algorithms include :MD4\MD5\SHA1\SHA256\SHA512 etc.
Be careful : Hash is neither encryption nor encoding
National secret algorithm
In order to ensure the security of commercial passwords , The State Password Bureau has formulated a series of password Standards , Include :SM1、SM2、SM3、SM4、SM7、SM9、 Zu Chongzhi's cryptographic algorithm (ZUC) etc. .
among SM1、SM4、SM7、 Zu Chongzhi password (ZUC) It's a symmetric algorithm .
SM2、SM9 It's an asymmetric algorithm .
SM3 It's a hash algorithm .
among SM1、SM7 The algorithm is not public , When the algorithm is called , It needs to be called through the interface of the encryption chip .
边栏推荐
- 10 more advanced open source command line tools
- How much does it cost to build a self built server for ark survival evolution?
- 重要的 SQL Server 函数 - 日期函数
- Ma Yi, Shen Xiangyang, Cao Ying's latest AI overview is hot! It took 3 months to build, netizens: required papers
- Jupyter Notebook安装代码提示功能
- pytorch_ Lightning in lightning_ The output of hparams.yaml in logs is null
- 23 openwrt switch VLAN configuration
- Advanced architects, 16 common principles of microservice design and Governance
- [Sylar] framework -chapter12 bytearray module
- 【sylar】框架篇-Chapter20-守护进程模块
猜你喜欢

Jupyter notebook installation code prompt function

Full resolution of the use of go native plug-ins
![[kinematics] simulation of orbital angular momentum based on MATLAB [including Matlab source code 1971]](/img/5e/dfe029490183ee74687606941ce98e.jpg)
[kinematics] simulation of orbital angular momentum based on MATLAB [including Matlab source code 1971]

How to select reliable securities analysts?

Important SQL server functions - other functions

Space complexity calculation super full sorting!! (calculation of hand tearing complexity

pytorch_ Lightning in lightning_ The output of hparams.yaml in logs is null

Idea start project MVN command terminal cannot recognize "MVN" item as cmdlet

将数据库拿到的数据渲染到elementUI 中的table中去

Efficient practice intelligent analysis of massive log data in aviation industry
随机推荐
高数_第4章__曲线积分_习题解法
pytorch打包exe出现WARNING: file already exists but should not: C:\Users\workAI\AppData\Local\Temp\_MEI13
[Niuke] find 1+2+3+... +n
21 openwrt kernel module changed to.Ko automatic loading
【sylar】框架篇-Chapter8-定时器模块
【二、移动web网页开发】2D&3D转换与动画、移动端布局、响应式布局
Information system project manager (2022) - key content: Information System Security Management (20)
NAT基本原理与私有IP
20-Openwrt crond crontab
MySQL: data types and operators
Reading the paper "learning span level interactions for aspect sentimental triple extraction"
printf()打印char* str
Work fishing clock simulator wechat applet source code
Docking with Hang Seng express ― dolphin DB NSQ plug-in tutorial
Information system project manager (2022) - key content: information system integrated testing and management, project management maturity model, quantitative project management (21)
[blood vessel detection] Based on MATLAB mom method, combined with Hessian and curve fitting, blood vessel diameter measurement [including Matlab source code, 1970]
X Book Keyword Search
《KG-BERT: BERT for Knowledge Graph Completion》
【Oracle】083错题集
Simple summary of Modbus Protocol