信息安全系统中用户身份认证技术的研究(75页).rar
信息安全系统中用户身份认证技术的研究(75页),目录述综研究背景.1.1网络环境下信息安全研究意义.1.2身份认证技术发展与现状1.2认证技术概述2,1基于网络的身份认证.2.2信息安全系统中身份认证面临的危机...............................................................6.2.3信息安全系统中对身份认...
该文档为压缩文件,包含的文件列表如下:
内容介绍
原文档由会员 白痴学东西 发布
目录
述综
研究背景
.1.1网络环境下信息安全研究意义
.1.2身份认证技术发展与现状
1.2认证技术概述
2,1基于网络的身份认证
.2.2信息安全系统中身份认证面临的危机...............................................................……6
.2.3信息安全系统中对身份认证系统的需求...........................................................……7
.2信息安全系统中组建的身份认证系统的概述及意义...............................................……9
.3论文的主要结构...........................................................................................................……9
2网络安全技术的发展与现状.....................……11
2.1网络安全策略.............................................................................................................……11
2.1,1网络安全存在的隐患,.....................................··....·····················,······················……11
2.1.2网络安全策略..............................................……,................................................……13
2.2网络安全技术概述........................................................··.·········································……14
2.2.1数据加密技术.............……,...........................................··..··································……14
2.2.2身份认证技术...................................................................................··....··.·········……14
2.2.3防火墙技术..........................................................................··....·.······················一15
3身份认证中密码学概述....................……,.…17
3.、认证信息的安全传输..................……,......……,·,·······,········································……17
3.1.1密码学概念..................................................................................·······················……17
3.1.2密码体制…,..................................................................................……,...........·...·……18
3.2身份认证的完整性..............................................······················································……20
3.3保证身份认证的不可否认性...................................……,..........................................……20
3.3.1不可否认机制...................................................................····.············,················……21
3.3.2不可否认认证协议.…,...............……,,......................·...·································……21
3.4信息认证..............................................................……,..............................................……22
3.4.1基于私钥体制的信息认证.................................................................................……22
3.4.2基于公钥体制的信息认证.................................................................................……24
3.5数字签名....................................................................................................................……25
3.6数字证书............................................................……,.................................................……26
3.6.1数字证书的必要性..........................................·....············································……26
3.6.2数字证书原理..........................................................................···························……27
3.6.3数字证书的应用..................................................············································一28
4信息安全系统中认证协议和认证机制分析.……,...……29
4.1认证方式分析.,.…,.............................................................................................···.····一
4.1.1基于口令的传统认证方式................................................·····················‘···········……
4.1.2基于物理证件的认证方式.....................................................··················,·······一
4.1.3基于生物特征的认证方式....................................................……,.‘.……,............……
4.1.4基于硬件信息的认证方式..........................................··········,·························一
4.2认证协议分析..................................……,.............................................................·.·……
4.2.1认证协议分类..……,........……,......................................................................···.·……
4.2.2认证协议的安全性........................
述综
研究背景
.1.1网络环境下信息安全研究意义
.1.2身份认证技术发展与现状
1.2认证技术概述
2,1基于网络的身份认证
.2.2信息安全系统中身份认证面临的危机...............................................................……6
.2.3信息安全系统中对身份认证系统的需求...........................................................……7
.2信息安全系统中组建的身份认证系统的概述及意义...............................................……9
.3论文的主要结构...........................................................................................................……9
2网络安全技术的发展与现状.....................……11
2.1网络安全策略.............................................................................................................……11
2.1,1网络安全存在的隐患,.....................................··....·····················,······················……11
2.1.2网络安全策略..............................................……,................................................……13
2.2网络安全技术概述........................................................··.·········································……14
2.2.1数据加密技术.............……,...........................................··..··································……14
2.2.2身份认证技术...................................................................................··....··.·········……14
2.2.3防火墙技术..........................................................................··....·.······················一15
3身份认证中密码学概述....................……,.…17
3.、认证信息的安全传输..................……,......……,·,·······,········································……17
3.1.1密码学概念..................................................................................·······················……17
3.1.2密码体制…,..................................................................................……,...........·...·……18
3.2身份认证的完整性..............................................······················································……20
3.3保证身份认证的不可否认性...................................……,..........................................……20
3.3.1不可否认机制...................................................................····.············,················……21
3.3.2不可否认认证协议.…,...............……,,......................·...·································……21
3.4信息认证..............................................................……,..............................................……22
3.4.1基于私钥体制的信息认证.................................................................................……22
3.4.2基于公钥体制的信息认证.................................................................................……24
3.5数字签名....................................................................................................................……25
3.6数字证书............................................................……,.................................................……26
3.6.1数字证书的必要性..........................................·....············································……26
3.6.2数字证书原理..........................................................................···························……27
3.6.3数字证书的应用..................................................············································一28
4信息安全系统中认证协议和认证机制分析.……,...……29
4.1认证方式分析.,.…,.............................................................................................···.····一
4.1.1基于口令的传统认证方式................................................·····················‘···········……
4.1.2基于物理证件的认证方式.....................................................··················,·······一
4.1.3基于生物特征的认证方式....................................................……,.‘.……,............……
4.1.4基于硬件信息的认证方式..........................................··········,·························一
4.2认证协议分析..................................……,.............................................................·.·……
4.2.1认证协议分类..……,........……,......................................................................···.·……
4.2.2认证协议的安全性........................