## 2019-2020-1 semester 20,192,420 "Introduction to cyberspace professional security" twelfth week study summary (Introduction to security in cyberspace)

2019-2020-1 semester 20,192,420 "Introduction to cyberspace professional security" twelfth week study summary (Introduction to security in cyberspace)


Harvest of learning

  • In Chapter 10 of cryptography and application of the learning process, first the concept and helped me understand the history of cryptography, let me have a preliminary understanding. Next, the book also introduces us to three common cryptographic algorithm, symmetric ciphers, public key cryptography and the Secure Hash Algorithm . Then, for us to introduce the most commonly used applications of cryptography, including PKI system, VPN system and PMI technology , so that we once again learned from the technical aspects of a wide range of cryptographic applications.

Learning problems and major settlement process

  • Public-key cryptographic algorithms in addition to providing digital signatures, which can also provide certification services?
  • AH provides integrity protection mechanism for the communications, but why AH does not provide confidentiality services?
  • In the application based on public key certificate, the public and private key pair is generated where it is safer?
  • Resolution process: mainly by our group to discuss and exchange, repeatedly try to figure out where a certain amount of sense, and really do not know to go to the teacher, and constantly improve their knowledge and understanding.

Guess you like

Origin www.cnblogs.com/rwl010306/p/12079351.html