当前位置:网站首页>Basic knowledge of network security - password (I)
Basic knowledge of network security - password (I)
2022-07-28 04:38:00 【oceanL01】
Properties of information
Usability 、 Authenticity 、 Confidentiality
Usability : The ability of information system to provide services , Information can be served normally or obtained
Confidentiality : A secret
Authenticity : Distinguishable ( Who sent the message )、 integrity ( Are the files before and after sending the same )、 Non-Repudiation ( If you really sent this message , Can't deny )
Information security means that the owner can understand and control information in three states ( transmission 、 Storage 、 Handle ) Security properties under (CIA).
Information and data
Data is the symbolic representation of objective things .
Data is the carrier of information , But information is not equal to data .
The value of information ———— Digital survival .
The weakness of information system
Internal cause :
(1) Design problems : From the beginning, the establishment of the system lacks the overall concept and design of security .
(2) Implementation problems : There is a backdoor or unintentional bug.
(3) Configuration problems : The default service .
(4) Management problems : Insiders operate unintentionally or maliciously .
The carrier of information security is data security .
We should ensure the security of information in the information system represented by computer system and network system , Provide information security services .
Cryptography classification
Password credits for coding 、 Decipherment
Code credits for modern passwords 、 Classical code
Classical passwords are divided into substitution 、 Transposition method
Modern passwords are divided into symmetric encryption 、 Asymmetric encryption 、Hash
Symmetric encryption is divided into stream ciphers 、 Block code
According to the country, it is divided into national secret algorithm 、 International algorithm
Four key points in cryptography are data encryption 、 digital signature 、 A summary of the news 、 Key management
Use cryptography to protect the confidentiality and authenticity of information .
encryption and decryption
Ciphertext = encryption algorithm ( Plaintext + Encryption key )
Plaintext = Decryption algorithm ( Ciphertext + decryption key )
Two cryptosystems
Symmetric cryptography 、 Asymmetric cryptography
Symmetric cipher algorithm : The encryption key is the same as the decryption key , Or they can deduce from each other ( For example, replace the password ), They pass keys over secure channels
Asymmetric cipher algorithm : The encryption key and decryption key are different , And cannot be deduced from each other ( Pairs of , One-to-one correspondence ), for example RSA Algorithm . The encryption key transmission channel of asymmetric cryptosystem is not afraid of eavesdropping . The decryption key is confidential , such , People who don't know each other can also encrypt communication . Can guarantee integrity 、 Confidentiality , But there is no guarantee of identifiability and non repudiation .
Double key encryption decryption key public application —— digital signature 、 digital certificate
digital signature : Based on the data content cannot be forged .
One way hash function
One way hash function is also called message digest function , One way hash function or hash function , It is a function that changes the input message string of any length into a fixed output string, and it is difficult to get the input string from the output string . This output string is called the hash value of the message . Generally used to generate message summaries , Key encryption, etc
Classical algorithms include :MD4\MD5\SHA1\SHA256\SHA512 etc.
Be careful : Hash is neither encryption nor encoding
National secret algorithm
In order to ensure the security of commercial passwords , The State Password Bureau has formulated a series of password Standards , Include :SM1、SM2、SM3、SM4、SM7、SM9、 Zu Chongzhi's cryptographic algorithm (ZUC) etc. .
among SM1、SM4、SM7、 Zu Chongzhi password (ZUC) It's a symmetric algorithm .
SM2、SM9 It's an asymmetric algorithm .
SM3 It's a hash algorithm .
among SM1、SM7 The algorithm is not public , When the algorithm is called , It needs to be called through the interface of the encryption chip .
边栏推荐
- [record of question brushing] 9. Number of palindromes
- Solana's "deceptive behavior": making mobile phones and opening stores
- printf()打印char* str
- 重要的 SQL Server 函数 - 数字函数
- 【sylar】框架篇-Chapter21-环境变量模块
- Simple summary of Modbus Protocol
- 重要的 SQL Server 函数 - 日期函数
- [Sylar] framework Chapter 23 summary of module chapter
- Zhejiang University and other recent review papers on deep learning new drug design
- Constructor of member function
猜你喜欢

上班摸鱼打卡模拟器微信小程序源码
![[yolov5 practice 5] traffic sign recognition system based on yolov5 -yolov5 integration pyqt5](/img/81/89b8e38801f706ef396943a79ef4c5.png)
[yolov5 practice 5] traffic sign recognition system based on yolov5 -yolov5 integration pyqt5

Constructor of member function

Harmony's Application on the shelves reported an error. The solution of "please use the API of the released version to develop the application and apply for listing"

Information system project manager (2022) - key content: information system integrated testing and management, project management maturity model, quantitative project management (21)

MySQL: data types and operators

Bio annotation of emotion analysis aste triples extraction

Internet of things industrial serial port to WiFi module wireless routing WiFi module selection
![[II. Mobile web page development] 2D & 3D conversion and animation, mobile terminal layout, responsive layout](/img/9a/a3b36aa2e5bf53d9f8355ea3c18f1e.png)
[II. Mobile web page development] 2D & 3D conversion and animation, mobile terminal layout, responsive layout

Efficient practice intelligent analysis of massive log data in aviation industry
随机推荐
[Sylar] framework Chapter 8 timer module
MySQL:数据类型和运算符
Information system project manager (2022) - key content: Information System Security Management (20)
After login, the upper right corner changes to enter the login status
[record of question brushing] 9. Number of palindromes
[Sylar] practical part - redis based parameter query service
Warning: file already exists but should not: c:\users\workmai\appdata\local\temp appears when Python packages exe\_ MEI13
Transformer landing | next vit realizes the real-time landing of industrial tensorrt, surpassing RESNET and cswin
登录之后右上角改变 进入登录状态
could only be written to 0 of the 1 minReplication nodes. There are 0 datanode(s) running and 0 node
Introduction to this pointer
【sylar】框架篇-Chapter6-协程调度模块
Bio annotation of emotion analysis aste triples extraction
pytorch打包exe出现WARNING: file already exists but should not: C:\Users\workAI\AppData\Local\Temp\_MEI13
RuntimeError: stack expects each tensor to be equal size, but got [8] at entry 0 and [2] at entry 2
【sylar】框架篇-Chapter24-支持业务模块化
Shanghai Telecom released public computing services and signed the action plan of "Joint Innovation Center for intelligent computing applications" with Huawei and other partners
25 openwrt guest network add
[blood vessel detection] Based on MATLAB mom method, combined with Hessian and curve fitting, blood vessel diameter measurement [including Matlab source code, 1970]
[Sylar] framework Chapter 23 summary of module chapter