njaxdnjaxd 发表于 2011-12-23 02:53

 3 信息加密技术

<DIV>
<P style="LINE-HEIGHT: 17.25pt; TEXT-INDENT: 24pt; MARGIN: 0cm 0cm 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-pagination: widow-orphan" class=MsoNormal><B><SPAN style="FONT-FAMILY: 宋体; COLOR: #2b2b2b; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt"> </SPAN></B><B><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt" lang=EN-US><FONT face="Times New Roman">3 </FONT></SPAN></B><B><SPAN style="FONT-FAMILY: 宋体; COLOR: #2b2b2b; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt">信息加密技术</SPAN></B><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt" lang=EN-US></SPAN></P>
<P style="LINE-HEIGHT: 17.25pt; TEXT-INDENT: 24pt; MARGIN: 0cm 0cm 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-pagination: widow-orphan" class=MsoNormal><SPAN style="FONT-FAMILY: 宋体; COLOR: #2b2b2b; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt">在保障信息安全各种功能特性的诸多技术中,密码技术是信息安全的核心和关键技术,通过</SPAN><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt" lang=EN-US><a href="http://www.njaxd.com/" target="_blank"><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'" lang=EN-US><SPAN lang=EN-US><FONT color=#800080>数据加密</FONT></SPAN></SPAN></A></SPAN><SPAN style="FONT-FAMILY: 宋体; COLOR: #2b2b2b; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt">技术,可以在一定程度上提高数据传输的安全性,保证传输数据的完整性。一个数据加密系统包括加密算法、明文、密文以及密钥,密钥控制加密和解密过程,一个加密系统的全部安全性是基于密钥的,而不是基于算法,所以加密系统的密钥管理是一个非常重要的问题。</SPAN><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt" lang=EN-US></SPAN></P>
<P style="LINE-HEIGHT: 17.25pt; TEXT-INDENT: 24pt; MARGIN: 0cm 0cm 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-pagination: widow-orphan" class=MsoNormal><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt" lang=EN-US><FONT face="Times New Roman">3.1 </FONT></SPAN><SPAN style="FONT-FAMILY: 宋体; COLOR: #2b2b2b; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt">数据加密技术</SPAN><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt" lang=EN-US></SPAN></P>
<P style="LINE-HEIGHT: 17.25pt; TEXT-INDENT: 24pt; MARGIN: 0cm 0cm 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-pagination: widow-orphan" class=MsoNormal><SPAN style="FONT-FAMILY: 宋体; COLOR: #2b2b2b; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt">数据加密技术主要分为数据传输加密和数据存储加密。数据传输加密技术主要是对传输中的数据流进行加密,常用的有链路加密、节点加密和端到端加密三种方式。</SPAN><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt" lang=EN-US></SPAN></P>
<P style="LINE-HEIGHT: 17.25pt; TEXT-INDENT: 24pt; MARGIN: 0cm 0cm 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-pagination: widow-orphan" class=MsoNormal><SPAN style="FONT-FAMILY: 宋体; COLOR: #2b2b2b; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt">链路加密是传输数据仅在物理层前的数据链路层进行加密,不考虑信源和信宿,它用于保护通信节点间的数据,接收方是传送路径上的各台节点机,信息在每台节点机内都要被解密和再加密,依次进行,直至到达目的地。</SPAN><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt" lang=EN-US></SPAN></P>
<P style="LINE-HEIGHT: 17.25pt; TEXT-INDENT: 24pt; MARGIN: 0cm 0cm 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-pagination: widow-orphan" class=MsoNormal><SPAN style="FONT-FAMILY: 宋体; COLOR: #2b2b2b; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt">与链路加密类似的节点加密方法,是在节点处采用一个与节点机相连的密码装置,密文在该装置中被解密并被重新加密,明文不通过节点机,避免了链路加密节点处易受攻击的缺点。</SPAN><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt" lang=EN-US></SPAN></P>
<P style="LINE-HEIGHT: 17.25pt; TEXT-INDENT: 24pt; MARGIN: 0cm 0cm 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-pagination: widow-orphan" class=MsoNormal><SPAN style="FONT-FAMILY: 宋体; COLOR: #2b2b2b; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt">端到端加密是为数据从一端到另一端提供的加密方式。数据在发送端被加密,在接收端解密,中间节点处不以明文的形式出现。端到端加密是在应用层完成的。在端到端加密中,除报头外的的报文均以密文的形式贯穿于全部传输过程,只是在发送端和接收端才有加、解密设备,而在中间任何节点报文均不解密,因此,不需要有密码设备,同链路加密相比,可减少密码设备的数量。另一方面,信息是由报头和报文组成的,报文为要传送的信息,报头为路由选择信息,由于网络传输中要涉及到路由选择,在链路加密时,报文和报头两者均须加密。而在端到端加密时,由于通道上的每一个中间节点虽不对报文解密,但为将报文传送到目的地,必须检查路由选择信息,因此,只能加密报文,而不能对报头加密。这样就容易被某些通信分析发觉,而从中获取某些敏感信息。</SPAN><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt" lang=EN-US></SPAN></P>
<P style="LINE-HEIGHT: 17.25pt; TEXT-INDENT: 24pt; MARGIN: 0cm 0cm 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-pagination: widow-orphan" class=MsoNormal><SPAN style="FONT-FAMILY: 宋体; COLOR: #2b2b2b; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt">链路</SPAN><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt" lang=EN-US><a href="http://www.njaxd.com/" target="_blank"><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'" lang=EN-US><SPAN lang=EN-US><FONT color=#800080>加密</FONT></SPAN></SPAN></A></SPAN><SPAN style="FONT-FAMILY: 宋体; COLOR: #2b2b2b; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt">对用户来说比较容易,使用的密钥较少,而端到端加密比较灵活,对用户可见。在对链路加密中各节点安全状况不放心的情况下也可使用端到端加密方式</SPAN><SPAN style="COLOR: #2b2b2b; mso-font-kerning: 0pt; mso-bidi-font-size: 10.5pt" lang=EN-US></SPAN></P>
<P style="MARGIN: 0cm 0cm 0pt" class=MsoNormal><SPAN lang=EN-US><FONT face="Times New Roman">&nbsp;</FONT></SPAN></P></DIV>
页: [1]
查看完整版本:  3 信息加密技术