Information security basics-technical system-encryption technology

Analysis of test points

Insert image description here

Generally not beyond the scope

Basic knowledge of information security (key)

(

Five basic elements are often examined
: Confidentiality: Encrypted messages
Integrity: The combination of message digest and digital signature technology, checksum technology
Availability: Use of denial-of-service attacks to disrupt availability
Controllability
: Use of logs

Insert image description here

Information storage security

cyber security

The composition framework of information security system

Insert image description here

Technology System

Insert image description here

d
d

Insert image description here

b
Insert image description here
c

Information security technology

Not much investigation, just understanding

Insert image description here
Insert image description here

Symmetric encryption technology

Insert image description here

inspection

Encryption algorithms are:
DES
3DES
AES
RC-5
IDEA

asymmetric encryption

Insert image description here

Public key-private key (public key encryption algorithm)

Only you have the private key, the public key is public

Encrypt using the recipient's public key

Common public key encryption algorithms include; RSA, ECC

Comparison of symmetric keys and asymmetric keys

Insert image description here

Digital envelope: combines symmetric encryption and asymmetric encryption
1 uses an asymmetric encryption algorithm to transfer the key (the key of symmetric encryption)
2 uses a symmetric encryption algorithm to transfer data

Guess you like

Origin blog.csdn.net/qq_41701723/article/details/132719181