Network information security knowledge

1. Information Security

(1) Confidentiality - Encryption Algorithm

(2) Integrity - hash functions and digital signature

(3) identification - cryptographic protocol or network protocol

(4) Non-repudiation - cryptographic protocol or network protocol

 

2. Cryptography

(1) symmetric encryption algorithm

DES, 3DES, AES

(2) the public encryption algorithm

RSA, DH

(3) hash function, and digital signature algorithm

MD5, SHA, SHA1

(4) cryptographic protocol and network protocol

Merberos、SKID,SSL、SET

(5) Public Key Infrastructure (PKI)

The main purpose is to build a trusted digital identity (digital certificates issued by trusted), and a specific key for a particular person or entity linked.

① certification authority (CA) ② Registration Authority (RA) ③ ④ Certificate Server certificate validation certificate store ⑤ ⑥ ⑦ key recovery service time server ⑧ signature server

(6) security protocol

① application layer security protocol PGP ② Transport Layer Security SSL ③ VPN network layer security protocols

(7) SSL protocol

SSL protocol stack model:

SSL handshake protocol of four stages:

① ② ability to establish a secure key exchange server authentication and client authentication and key exchange ③ ④ complete the handshake stage

 

 

Guess you like

Origin blog.csdn.net/llkkcc13/article/details/90370414