%0 Journal Article %T Exploration of Core Technologies of Cyber Security %A Xianghao Nan %J Open Access Library Journal %V 8 %N 9 %P 1-11 %@ 2333-9721 %D 2021 %I Open Access Library %R 10.4236/oalib.1107795 %X In order to study the role of key technologies in information security, the main tasks and key technologies defined in different development stages were reviewed in this paper, focusing on exploring the main tasks and core technologies of cyber security. The proof logic of PKI certification system and the digital signature standard DSA were analyzed, subsequently the signature elements are clarified and found that CPK public key could satisfy all the elements, so the evidence-based truth logic of authentication was created, and the new concepts of ˇ°identity authenticationˇ± and ˇ°proof-before-eventˇ± were formed. Based on identity authentication technology, a CPK authentication system was established, an independent self-assured network was constructed, a general one-step protocol was formulated, and a feasible technical route for cyber security was formed, and the practical significance of identification was discussed. %K Information Security %K Authentication %K Digital Signature %U http://www.oalib.com/paper/6760863