Password concept and function

  1. password concept

Cryptography : Technologies , products and services that use specific transformation methods to encrypt , protect and authenticate information , etc.

Specific transformations : specify various mathematical methods and implementation mechanisms for mutual conversion between text and ciphertext. Convert plaintext to ciphertext to ensure the confidentiality of information.

Security authentication : Use specific transformations to confirm whether the information has been tampered with, whether the source is reliable, and whether the information sending behavior really exists, that is, to confirm the authenticity and reliability of the subject and information, and to ensure the authenticity of the information source, the integrity of the data and the undeniability of the behavior sex .

Technology : the method or means of using items to achieve encryption protection or security authentication.

Products : Devices and systems whose core functions are encryption protection or security authentication.

Services : Based on cryptographic expertise, skills, and facilities, activities that provide cryptographic support and guarantees for others, such as integration, operation, and supervision, are behaviors that implement cryptographic functions based on cryptographic technologies and products.

According to the classification of national encryption uses in the "Encryption Law", the types of encryption are divided into: core encryption , ordinary encryption and commercial encryption .

Among them: ordinary secret and nuclear secret, the information used to protect state secrets belongs to state secrets , the highest secret level of core password- protected information is top -secret level , the highest secret level of ordinary password -protected information is confidential level , and both passwords are implemented by the password management department according to law Strict and unified management.

Commercial cryptography is used to protect information that is not a state secret, and citizens, legal persons, and other organizations may use commercial cryptography to protect network and information security in accordance with the law. It can be used to protect work secrets, business secrets, personal information, etc., and is widely used in networks and information systems of key information infrastructures such as finance, e-government, communications, energy, and transportation.

Generally speaking, the national secret refers to the commercial encryption, and the national secret algorithm is the national commercial encryption algorithm.

Cryptography technology : including cryptographic coding, implementation, protocol, security protection, analysis and deciphering, key generation, distribution, delivery, use, destruction and other technologies. Typical cryptographic techniques include: cryptographic algorithms, key management, and cryptographic protocols.

Guess you like

Origin blog.csdn.net/yeyuningzi/article/details/129258383