All Title Author
Keywords Abstract

Publish in OALib Journal
ISSN: 2333-9721
APC: Only $99


Exploration of Core Technologies of Cyber Security

DOI: 10.4236/oalib.1107795, PP. 1-11

Subject Areas: Information and Communication: Security, Privacy, and Trust

Keywords: Information Security, Authentication, Digital Signature

Full-Text   Cite this paper   Add to My Lib


In order to study the role of key technologies in information security, the main tasks and key technologies defined in different development stages were reviewed in this paper, focusing on exploring the main tasks and core technologies of cyber security. The proof logic of PKI certification system and the digital signature standard DSA were analyzed, subsequently the signature elements are clarified and found that CPK public key could satisfy all the elements, so the evidence-based truth logic of authentication was created, and the new concepts of “identity authentication” and “proof-before-event” were formed. Based on identity authentication technology, a CPK authentication system was established, an independent self-assured network was constructed, a general one-step protocol was formulated, and a feasible technical route for cyber security was formed, and the practical significance of identification was discussed.

Cite this paper

Nan, X. (2021). Exploration of Core Technologies of Cyber Security. Open Access Library Journal, 8, e7795. doi:


[1]  TCSEC U.S. DoD (1983) Orange Book, Rainbow Series Verified Protection Mandatory Protection Security Domains Superseded Common Criteria.
[2]  President’s Information Technology Advisory Committee (1997) Protecting America’s Critical Infrastructures (PDD 63). Presidential Decision Directive.
[3]  President’s Information Technology Advisory Committee (2005) Cyber Security, A Crisis of Prioritization. A Report to President.
[4]  Brurros, M., Abadi, M. and Needham, R. (1989) A Logic of Authentication. Proceedings of the 12th ACM Symposium on Operating Systems Principles, New York, 3-6 December, 1989, 1-13.
[5]  National Institute Standard and Technology (1994) Digital Signature Standards, U.S. Department of Commerce, NIST PUB 186.
[6]  南湘浩, 陈钟. 网络安全技术概论[M]. 北京: 国防工业出版社, 2003.
[7]  Wilson, C. (2004) Information Warfare and Cyber War: Capabilities and Related Policy Issues. CRS Report for Congress.
[8]  南湘浩. GAP一步协议[J]. 通信技术, 2020, 53(12): 3030.


comments powered by Disqus

Contact Us