文件名称:pik
介绍说明--下载内容均来自于网络,请自行研究使用
由于电子商务广泛采用公开密钥技术,职能部门有必要对公钥加以管理。本文简要介绍了基于PKI的密钥托管技术及密钥托管代理的概念,分析了密钥托管的步骤,以及政府部门在密钥托管代理的帮助下强制访问信息的过程。
关键词:密钥托管 证书授权认证 公开密钥 公钥基础设施 托管证书
网络的安全问题得到人们的日益重视。网络面临的威胁五花八门:内部窃密和破坏,截收,非法访问,破坏信息的完整性,冒充,破坏系统的可用性,重演,抵赖等。于是公钥基础设施(Public Key Infrastructure,PKI)应运而生。PKI是电子商务和其它信息系统的安全基础,用来建立不同实体间的"信任"关系。它的基础是加密技术,核心是证书服务。用户使用由证书授权认证中心(Certificate Authority,CA)签发的数字证书,结合加密技术,可以保证通信内-widespread adoption of e-commerce as public-key technology, the functional departments need to be a public key management. This paper describes the PKI-based technology and key escrow key escrow agent concept, the key escrow analysis of the steps, as well as government departments in key escrow agent with the help of compulsory process for accessing information. Key words : key escrow certificates accredited public key public key infrastructure certificates care network security issues to receive increased attention. Faced with the threat of network variety : internal theft and destruction, interception, and illegal visit to undermine the integrity of the information, faked, breaking the system availability, repetition and denial, etc.. So the public key infrastructure (Public Key Infrastr
关键词:密钥托管 证书授权认证 公开密钥 公钥基础设施 托管证书
网络的安全问题得到人们的日益重视。网络面临的威胁五花八门:内部窃密和破坏,截收,非法访问,破坏信息的完整性,冒充,破坏系统的可用性,重演,抵赖等。于是公钥基础设施(Public Key Infrastructure,PKI)应运而生。PKI是电子商务和其它信息系统的安全基础,用来建立不同实体间的"信任"关系。它的基础是加密技术,核心是证书服务。用户使用由证书授权认证中心(Certificate Authority,CA)签发的数字证书,结合加密技术,可以保证通信内-widespread adoption of e-commerce as public-key technology, the functional departments need to be a public key management. This paper describes the PKI-based technology and key escrow key escrow agent concept, the key escrow analysis of the steps, as well as government departments in key escrow agent with the help of compulsory process for accessing information. Key words : key escrow certificates accredited public key public key infrastructure certificates care network security issues to receive increased attention. Faced with the threat of network variety : internal theft and destruction, interception, and illegal visit to undermine the integrity of the information, faked, breaking the system availability, repetition and denial, etc.. So the public key infrastructure (Public Key Infrastr
(系统自动生成,下载前可以参看下载内容)
下载文件列表
基于DSA及RSA的证实数字签名方案.pdf
基于椭圆曲线的代理数字签名.pdf
收方不可否认签名技术的研究.pdf
收方不可否认签名技术的研究1.pdf
结合数字签名和数字水印的多媒体认证系统.pdf
基于椭圆曲线的代理数字签名.pdf
收方不可否认签名技术的研究.pdf
收方不可否认签名技术的研究1.pdf
结合数字签名和数字水印的多媒体认证系统.pdf