Open Access Library Journal

Volume 8, Issue 9 (September 2021)

ISSN Print: 2333-9705   ISSN Online: 2333-9721

Google-based Impact Factor: 0.73  Citations  

Exploration of Core Technologies of Cyber Security

HTML  XML Download Download as PDF (Size: 275KB)  PP. 1-11  
DOI: 10.4236/oalib.1107795    109 Downloads   929 Views  Citations
Author(s)

ABSTRACT

In order to study the role of key technologies in information security, the main tasks and key technologies defined in different development stages were reviewed in this paper, focusing on exploring the main tasks and core technologies of cyber security. The proof logic of PKI certification system and the digital signature standard DSA were analyzed, subsequently the signature elements are clarified and found that CPK public key could satisfy all the elements, so the evidence-based truth logic of authentication was created, and the new concepts of “identity authentication” and “proof-before-event” were formed. Based on identity authentication technology, a CPK authentication system was established, an independent self-assured network was constructed, a general one-step protocol was formulated, and a feasible technical route for cyber security was formed, and the practical significance of identification was discussed.

Share and Cite:

Nan, X.H. (2021) Exploration of Core Technologies of Cyber Security. Open Access Library Journal, 8, 1-11. doi: 10.4236/oalib.1107795.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.