
CPK 通向赛博安全之路:理论与实践
CPK Solution to Cyber Security: Theory and Practice
¥89.60
作品简介
本书以公众网的新视野分析信息安全、网络安全、系统安全、交易安全、安全管理,并探索网信安全的实质。网信空间由实体空间和事件空间构成,鉴别技术是安全的核心技术。由此形成了基于实体鉴别的物联网和基于事件鉴别的事联网的新概念。 新概念必须用新技术才能解决。所用新技术是CPK组合公钥、标识鉴别、虚拟网络、数字印章等。CPK是基于标识的公钥,直到目前唯一兼有数字签名和密钥加密功能的体制,其签名码最短,可实现标识鉴别。标识鉴别是信息安全的核心技术,也是难点,唯独CPK才能解决。在解决标识鉴别的基础上就可以构建基于证据的虚拟网络。虚拟网络是从任何标识到任何标识的(I to I)的可证网络,是物联网和是联网的基本型。数字印章提供了是实现可证互联、可证交易的实现方法,并统一了现实世界和网络是世界的印章。 新概念的实现需要将研究思路从形象思维提高到抽象思维;将安全战略从被动防护提高到主动管理;将鉴别逻辑从基于模型的可信逻辑提高到基于证据的真值逻辑,将网信安全的总体构架建立在安全理论的基础之上。
作者:南湘浩
作品目录
内容简介
序言
前言
Part One Basic Theory
CHAPTER ONE CPK Public Key
CHAPTER TWO CPK Key Management
CHAPTER THREE CPK Truth Logic
CHAPTER FOUR CPK Identity Authentication
CHAPTER FIVE CPK Self-Assured Security
CHAPTER SIX CPK Virtual Network
CHAPTER SEVEN CPK Virtual Kernel
CHAPTER EIGHT CPK Digital Seal
CHAPTER NINE CPK Account Money
CHAPTER TEN CPK Systematic Security
Part Two Mair Practice
CHAPTER ELEVEN Virtual Internet
CHAPTER TWELVE Virtual Mob-Net
CHAPTER THIRTEEN RFID Anti-Fake Label
CHAPTER FOURTEEN Paper Anti-Fake Label
CHAPTER FIFTEEN File Classification
CHAPTER SIXTEEN CPK Video Monitoring
CHAPTER SEVENTEEN CPK Cloud Storage
CHAPTER EIGHTEEN Byte Encryption
CHAPTER NINETEEN Cyber Attack
CHAPTER TWENTY Situational Awareness
COMMENTS
COMMENT 1 The CPK Algorithm for Key Management
COMMENT 2 Identity Authentication Opening a New Land for Information Security
COMMENT 3 “Electronic ID Card” Attracts International Attention
COMMENT 4 CPK Goes to the World
COMMENT 5 Identity Authentication Based on CPK
COMMENT 6 To Construct Self-Assured Network System with CPK Technology
INTERVIEWS
Interview 1 Don't Lock Enthusiasm
Interview 2 Walk out of Mysterious “Black Chamber”
Interview 3 Searching for Safe “Silver Bullet”
NOTES
About the Author