2023年全國碩士研究生考試考研英語一試題真題(含答案詳解+作文范文)_第1頁
已閱讀1頁,還剩12頁未讀 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

1、<p><b>  本科畢業(yè)論文</b></p><p><b>  外文文獻及譯文</b></p><p>  文獻、資料題目:Core Java? Volume II–Advanced Features</p><p>  文獻、資料來源:著作</p><p>  文獻、資料發(fā)表(出版

2、)日期:2008.12.1</p><p>  院 (部): 計算機科學與技術學院</p><p>  專 業(yè): 網(wǎng)絡工程</p><p>  班 級: 網(wǎng)絡082</p><p>  姓 名: 劉治華</p><p>  學 號: 2008111242</p><p>

3、<b>  指導教師: 許麗娜</b></p><p>  翻譯日期: 2012.5.10</p><p><b>  外文文獻: </b></p><p>  Core Java? Volume II–Advanced Features</p><p>  When Java technology

4、 first appeared on the scene, the excitement was not about a well-crafted programming language but about the possibility of safely executing applets that are delivered over the Internet (see Volume I, Chapter 10 for more

5、 information about applets). Obviously, delivering executable applets is practical only when the recipients are sure that the code can't wreak havoc on their machines. For this reason, security was and is a major con

6、cern of both the designers and the users of </p><p>  Three mechanisms help ensure safety:</p><p>  ?Language design features (bounds checking on arrays, no unchecked type conversions, no point

7、er arithmetic, and so on).</p><p>  ?An access control mechanism that controls what the code can do (such as file access, network access, and so on).</p><p>  ?Code signing, whereby code autho

8、rs can use standard cryptographic algorithms to authenticate Java code. Then, the users of the code can determine exactly who created the code and whether the code has been altered after it was signed.</p><p&g

9、t;  Below, you'll see the cryptographic algorithms supplied in the java.security package, which allow for code signing and user authentication.</p><p>  As we said earlier, applets were what started the

10、craze over the Java platform. In practice, people discovered that although they could write animated applets like the famous "nervous text" applet, applets could not do a whole lot of useful stuff in the JDK 1.

11、0 security model. For example, because applets under JDK 1.0 were so closely supervised, they couldn't do much good on a corporate intranet, even though relatively little risk attaches to executing an applet from you

12、r company's secure intra</p><p>  To give more trust to an applet, we need to know two things:</p><p>  ?Where did the applet come from?</p><p>  ?Was the code corrupted in tr

13、ansit?</p><p>  In the past 50 years, mathematicians and computer scientists have developed sophisticated algorithms for ensuring the integrity of data and for electronic signatures. The java.security packag

14、e contains implementations of many of these algorithms. Fortunately, you don't need to understand the underlying mathematics to use the algorithms in the java.security package. In the next sections, we show you how m

15、essage digests can detect changes in data files and how digital signatures can prove the iden</p><p>  A message digest is a digital fingerprint of a block of data. For example, the so-called SHA1 (secure ha

16、sh algorithm #1) condenses any data block, no matter how long, into a sequence of 160 bits (20 bytes). As with real fingerprints, one hopes that no two messages have the same SHA1 fingerprint. Of course, that cannot be t

17、rue—there are only 2160 SHA1 fingerprints, so there must be some messages with the same fingerprint. But 2160 is so large that the probability of duplication occurring is negli</p><p>  A message digest has

18、two essential properties:</p><p>  ?If one bit or several bits of the data are changed, then the message digest also changes.</p><p>  ?A forger who is in possession of a given message cannot

19、construct a fake message that has the same message digest as the original.</p><p>  The second property is again a matter of probabilities, of course. Consider the following message by the billionaire father

20、:"Upon my death, my property shall be divided equally among my children; however, my son George shall receive nothing."</p><p>  That message has an SHA1 fingerprint of</p><p>  2D 8B

21、35 F3 BF 49 CD B1 94 04 E0 66 21 2B 5E 57 70 49 E1 7E</p><p>  The distrustful father has deposited the message with one attorney and the fingerprint with another. Now, suppose George can bribe the lawyer ho

22、lding the message. He wants to change the message so that Bill gets nothing. Of course, that changes the fingerprint to a completely different bit pattern:</p><p>  2A 33 0B 4B B3 FE CC 1C 9D 5C 01 A7 09 51

23、0B 49 AC 8F 98 92</p><p>  Can George find some other wording that matches the fingerprint? If he had been the proud owner of a billion computers from the time the Earth was formed, each computing a million

24、messages a second, he would not yet have found a message he could substitute.</p><p>  A number of algorithms have been designed to compute these message digests. The two best-known are SHA1, the secure hash

25、 algorithm developed by the National Institute of Standards and Technology, and MD5, an algorithm invented by Ronald Rivest of MIT. Both algorithms scramble the bits of a message in ingenious ways. For details about thes

26、e algorithms, see, for example, Cryptography and Network Security, 4th ed., by William Stallings (Prentice Hall 2005). Note that recently, subtle regularities h</p><p>  The Java programming language impleme

27、nts both SHA1 and MD5. The MessageDigest class is a factory for creating objects that encapsulate the fingerprinting algorithms. It has a static method, called getInstance, that returns an object of a class that extends

28、the MessageDigest class. This means the MessageDigest class serves double duty:</p><p>  ?As a factory class</p><p>  ?As the superclass for all message digest algorithms</p><p> 

29、 For example, here is how you obtain an object that can compute SHA fingerprints:</p><p>  MessageDigest alg = MessageDigest.getInstance("SHA-1");</p><p>  (To get an object that can c

30、ompute MD5, use the string "MD5" as the argument to getInstance.)</p><p>  After you have obtained a MessageDigest object, you feed it all the bytes in the message by repeatedly calling the update

31、method. For example, the following code passes all bytes in a file to the alg object just created to do the fingerprinting:</p><p>  InputStream in = . . .</p><p><b>  int ch;</b><

32、;/p><p>  while ((ch = in.read()) != -1)</p><p>  alg.update((byte) ch);</p><p>  Alternatively, if you have the bytes in an array, you can update the entire array at once:</p>

33、<p>  byte[] bytes = . . .;</p><p>  alg.update(bytes);</p><p>  When you are done, call the digest method. This method pads the input—as required by the fingerprinting algorithm—does the c

34、omputation, and returns the digest as an array of bytes.</p><p>  byte[] hash = alg.digest();</p><p>  The program in Listing 9-15 computes a message digest, using either SHA or MD5. You can loa

35、d the data to be digested from a file, or you can type a message in the text area. </p><p>  Message Signing</p><p>  In the last section, you saw how to compute a message digest, a fingerprint

36、for the original message. If the message is altered, then the fingerprint of the altered message will not match the fingerprint of the original. If the message and its fingerprint are delivered separately, then the recip

37、ient can check whether the message has been tampered with. However, if both the message and the fingerprint were intercepted, it is an easy matter to modify the message and then recompute the fingerprint.</p><

38、p>  To help you understand how digital signatures work, we explain a few concepts from the field called public key cryptography. Public key cryptography is based on the notion of a public key and private key. The idea

39、 is that you tell everyone in the world your public key. However, only you hold the private key, and it is important that you safeguard it and don't release it to anyone else. The keys are matched by mathematical rel

40、ationships, but the exact nature of these relationships is not importan</p><p>  The keys are quite long and complex. For example, here is a matching pair of public and private Digital Signature Algorithm (D

41、SA) keys.</p><p>  Public key:</p><p>  Code View:</p><p><b>  p:</b></p><p>  fca682ce8e12caba26efccf7110e526db078b05edecbcd1eb4a208f3ae1617ae01f35b91a47e6

42、df63413c5e12ed0899bcd132acd50d99151bdc43ee737592e17</p><p>  q: 962eddcc369cba8ebb260ee6b6a126d9346e38c5</p><p>  g:678471b27a9cf44ee91a49c5147db1a9aaf244f05a434d6486931d2d14271b9e35030b71fd73da

43、179069b32e2935630e1c2062354d0da20a6c416e50be794ca4</p><p><b>  y:</b></p><p>  c0b6e67b4ac098eb1a32c5f8c4c1f0e7e6fb9d832532e27d0bdab9ca2d2a8123ce5a8018b8161a760480fadd040b927281ddb22

44、cb9bc4df596d7de4d1b977d50 </p><p>  Private key:</p><p>  Code View:</p><p><b>  p:</b></p><p>  fca682ce8e12caba26efccf7110e526db078b05edecbcd1eb4a208f3ae1

45、617ae01f35b91a47e6df63413c5e12ed0899bcd132acd50d99151bdc43ee737592e17</p><p>  q: 962eddcc369cba8ebb260ee6b6a126d9346e38c5</p><p><b>  g:</b></p><p>  678471b27a9cf44ee9

46、1a49c5147db1a9aaf244f05a434d6486931d2d14271b9e35030b71fd73da179069b32e2935630e1c2062354d0da20a6c416e50be794ca4</p><p>  x: 146c09f881656cc6c51f27ea6c3a91b85ed1d70a</p><p>  It is believed to be

47、practically impossible to compute one key from the other. That is, even though everyone knows your public key, they can't compute your private key in your lifetime, no matter how many computing resources they have av

48、ailable.</p><p>  It might seem difficult to believe that nobody can compute the private key from the public keys, but nobody has ever found an algorithm to do this for the encryption algorithms that are in

49、common use today. If the keys are sufficiently long, brute force—simply trying all possible keys—would require more computers than can be built from all the atoms in the solar system, crunching away for thousands of year

50、s. Of course, it is possible that someone could come up with algorithms for computing keys </p><p>  Figure 9-12 illustrates how the process works in practice.</p><p>  Suppose Alice wants to se

51、nd Bob a message, and Bob wants to know this message came from Alice and not an impostor. Alice writes the message and then signs the message digest with her private key. Bob gets a copy of her public key. Bob then appli

52、es the public key to verify the signature. If the verification passes, then Bob can be assured of two facts:</p><p>  ?The original message has not been altered.</p><p>  ?The message was sign

53、ed by Alice, the holder of the private key that matches the public key that Bob used for verification.</p><p>  You can see why security for private keys is all-important. If someone steals Alice's priva

54、te key or if a government can require her to turn it over, then she is in trouble. The thief or a government agent can impersonate her by sending messages, money transfer instructions, and so on, that others will believe

55、 came from Alice.</p><p>  The X.509 Certificate Format</p><p>  To take advantage of public key cryptography, the public keys must be distributed. One of the most common distribution formats is

56、 called X.509. Certificates in the X.509 format are widely used by VeriSign, Microsoft, Netscape, and many other companies, for signing e-mail messages, authenticating program code, and certifying many other kinds of dat

57、a. The X.509 standard is part of the X.500 series of recommendations for a directory service by the international telephone standards body, the CCITT.</p><p>  The precise structure of X.509 certificates is

58、described in a formal notation, called "abstract syntax notation #1" or ASN.1. Figure 9-13 shows the ASN.1 definition of version 3 of the X.509 format. The exact syntax is not important for us, but, as you can

59、see, ASN.1 gives a precise definition of the structure of a certificate file. The basic encoding rules, or BER, and a variation, called distinguished encoding rules (DER) describe precisely how to save this structure in

60、a binary file. That is,</p><p><b>  中文譯文:</b></p><p>  Java核心技術 卷Ⅱ高級特性</p><p>  當Java技術剛剛問世時,令人激動的并不是因為它是一個設計完美的編程語言,而是因為它能夠安全地運行通過因特網(wǎng)傳播的各種applet。很顯然,只有當用戶確信applet的代碼不會破

61、壞他的計算機時,用戶才會接受在網(wǎng)上傳播的可執(zhí)行的applet。正因為如此,無論過去還是現(xiàn)在,安全都是設計人員和Java技術使用者所關心的一個重大問題。這就意味著,Java技術與其他的語言和系統(tǒng)有所不同,在那些語言和系統(tǒng)中安全是事后才想到要去實現(xiàn)的,或者僅僅是對破壞的一種應對措施,而對Java技術來說,安全機制是一個不可分割的組成部分。</p><p>  Java技術提供了以下三種確保安全的機制:</p&g

62、t;<p>  (1)語言設計特性(對數(shù)組的邊界進行檢查,無不檢查類型的轉換,無指針算法等)。</p><p>  (2)訪問控制機制,用于控制代碼能夠執(zhí)行的功能(比如文件訪問,網(wǎng)絡訪問等)。</p><p>  (3) 代碼簽名,利用該特性,代碼的作者就能夠用標準的加密算法來表明Java代碼的身份。這樣,該代碼的使用者就能夠準確地知道誰創(chuàng)建了該代碼,以及代碼被標識后是否被修

63、改過。</p><p>  下面,我們要介紹java.security包提供的加密算法,用來進行代碼的標識和用戶身份認證。</p><p>  正如我們前面所說,applet 是在Java平臺上開始流行起來的。實際上,人們發(fā)現(xiàn)盡管他們可以編寫像著名的“nervous text”那樣栩栩如生的applet,但是在JDK1.0安全模式下無法發(fā)揮其一整套非常有用的作用。例如,由于JDK1.0下的

64、applet要受到嚴密的監(jiān)督,因此,即使applet在公司安全內部網(wǎng)上運行時的風險相對較小,applet也無法在企業(yè)內部網(wǎng)上發(fā)揮很大的作用。Sun公司很快就認識到,要使applet真正變得非常有用,用戶必須可以根據(jù)applet的來源為其分配不同的安全級別。如果applet來自值得信賴的提供商,并且沒有被篡改過,那么applet的用戶就可以決定是否給applet授予更多的運行特權。</p><p>  如果要給予a

65、pplet更多的信賴,你必須知道下面兩件事:</p><p>  (1)applet來自哪里?</p><p>  (2)在傳輸過程中代碼是否被破壞?</p><p>  在過去的50年里,數(shù)學家和技術機科學家已經(jīng)開發(fā)出各種各樣成熟的算法,用于確保數(shù)據(jù)和電子簽名的完整性,在java.security包中包含了許多這些算法的實現(xiàn)。在下面幾節(jié),我們將要介紹消息摘要是如何

66、檢測數(shù)據(jù)文件中的變化的,以及數(shù)字簽名是如何證明簽名者的身份的。</p><p>  消息摘要是數(shù)據(jù)塊的數(shù)字指紋。例如,所謂的SHA1(安全散列算法#1)可將任何數(shù)據(jù)塊,無論其數(shù)據(jù)有多長,都壓縮為160位(20字節(jié))的序列。與真實的指紋一樣,人們希望任何兩條消息都不會有相同的SHA1指紋。當然這是不可能的—因為只存在2160 個SHA1指紋,所有肯定會有某些消息具有相同的指紋。因為2160 是一個很大的數(shù)字,所以存

67、在重復指紋的可能性微乎其微,那么這種重復的可能性到底小到什么程度呢?根據(jù)James Walsh在他的《True Odds:How Risks Affect Your Everyday Life》,Merritt Publishing出版社1996年出版,一書中所闡述的,你和他們所有的人都死于雷擊的概率,比偽造的消息與原來消息具有相同的SHA1指紋的概率還要高。(當然,可能有你不認識的其他10個以上的人會死于雷擊,但這里我們討論的是你選擇

68、的特定的人的死亡概率)。</p><p>  消息摘要具有兩個基本屬性: </p><p>  (1)如果數(shù)據(jù)的1位或者幾位改變了,那么消息摘要也將改變。</p><p>  (2)擁有給定消息的偽造者不能創(chuàng)建與原消息具有相同摘要的假消息。</p><p>  當然,第二個屬性又是一個概率問題。讓我們來看看下面這位億萬富翁下的遺囑:“我死了之

69、后,我的財產(chǎn)將由我的孩子平分,但是,我的兒子George應該拿不到一個子?!?lt;/p><p>  這份遺囑的SHA1指紋為:</p><p>  2D 8B 35 F3 BF 49 CD B1 94 04 E0 66 21 2B 5E 57 70 49 E1 7E</p><p>  這位有疑心病的父親將這份遺囑交給一位律師保存,而將指紋交給另一位律師保存。現(xiàn)在,假

70、設George能夠賄賂那位保存遺囑的律師,他想修改這份遺囑,使得Bill一無所得。當然,這需要將原指紋改為下面這樣完全不同的位模式:</p><p>  2A 33 0B 4B B3 FE CC 1C 9D 5C 01 A7 09 51 0B 49 AC 8F 98 92</p><p>  那么George能夠找到與該指紋相匹配的其他文字嗎?如果從地球形成之時,他就很自豪地擁有10億臺計

71、算機,每臺計算機每秒鐘處理一百萬條信息,他依然無法找到一個能夠替換的遺囑。</p><p>  人們已經(jīng)設計出大量的算法,用于計算這些消息摘要,其中最著名的兩種算法是SHAI和MD5。SHAI是由美國國家標準和技術學會開發(fā)的加密散列算法,MD5是由麻省理工學院的Ronald Rivest發(fā)明的算法。這兩種算法都使用了獨特巧妙的方法對消息中的各個位進行擾亂。如果要了解這些方法的詳細信息,請參閱William Sta

72、llings撰寫的《Cryptography and Network Security》一書,該書由Prentice Hall出版社于2005年出版口值得注意的是,最近人們在這兩種算法中發(fā)現(xiàn)了某些微妙的規(guī)律性,因此許多密碼人員建議最好避免使用MD5,而應該使用SHA1算法,直到有更強的加密算法出現(xiàn)。(查看http://www.rsa.com/rsalabs/node.asp?id=2834以了解更多的信息)。</p>&l

73、t;p>  Java編程語言已經(jīng)實現(xiàn)了SHA1和MD5。MessageDigest類是用于創(chuàng)建封裝了指紋算法的對象的“工廠”,它的靜態(tài)方法getInstance返回繼承了MessageDigest類的某個類的對象。這意味著MessageDigest類能夠承擔下面的雙重職責:</p><p> ?。?)作為一個工廠類。</p><p> ?。?)作為所有消息摘要算法的超類。</p

74、><p>  例如,下面是如何獲取一個能夠計算SHA指紋的對象的方法:</p><p>  MessageDigest alg = MessageDigest.getInstance(“SHA-1”);</p><p> ?。ㄈ绻@取計算MD5的對象,請使用字符串“MD5”作為getInstance的參數(shù)。)</p><p>  當你已經(jīng)獲取M

75、essageDigest對象之后,通過反復調用update方法,將信息中的所有字節(jié)提供給該對象。例如,下面的代碼將文件中的所有字節(jié)傳給上面建立的alg對象,以執(zhí)行指紋算法:</p><p>  InputStream in=….</p><p><b>  int ch;</b></p><p>  while((ch=in.read())!=

76、-1)</p><p>  alg.updat((byte) ch);</p><p>  另外,如果這些字節(jié)存放在一個數(shù)組中,那就可以一次完成整個數(shù)組的更新:</p><p>  byte[] bytes =...;</p><p>  alg.update(bytes);</p><p>  當完成上述操作后,調用

77、digest方法。該方法填充輸入信息—指紋算法需要的—并且進行相應的計算,然后以字節(jié)數(shù)組的形式返回消息摘要。</p><p>  byte[] hash=alg.digest();</p><p>  程序清單9-15中的程序計算了一個消息摘要,既可以用SHA,也可以使用MD5來計算??梢詮奈募虞d需要計算摘要的數(shù)據(jù),也可以直接將信息輸入文本區(qū)域。圖9-11顯示了該應用程序的畫面。<

78、/p><p><b>  消息簽名</b></p><p>  在上一節(jié)中,我們介紹了如何計算原始消息的消息摘要和指紋的方法。如果消息改變了,那么改變后的消息的指紋與原消息的指紋將不匹配。如果消息和它的指紋是分開傳送的,那么接收者就可以檢查消息是否被篡改過。但是,如果消息和指紋同時被截獲了,對消息進行修改,再重新計算指紋,這是一件很容易的事情。畢竟,消息摘要算法是公開的,

79、不需要使用任何密鑰。在這種情況下,假消息和新指紋的接收者永遠不會知道消息已經(jīng)被篡改。數(shù)字簽名解決了這個問題。</p><p>  為了了解數(shù)字簽名的工作原理,我們需要解釋關于公共密鑰加密技術領域中的幾個概念。公共密鑰加密技術是基于公共密鑰和私有密鑰這個兩個基本概念的。它的設計思想是你可以將公共密鑰告訴世界上的任何人,但是,只有自己才擁有私有密鑰,重要的是你要保護你的私有密鑰,不將它泄漏給其他任何入。這些密鑰之間存

80、在一定的數(shù)學關系,但是這種關系的具體性質對于實際的編程來說并不重要(如果你有興趣,可以參閱http://www.cacr.math.uwaterloo.ca/hac/站點上的《The Handbook of Applied Cryptography》 一書)。</p><p>  密鑰非常長,而且很復雜。例如,下面是一對匹配的數(shù)字簽名算法(DSA)公共密鑰和私有密鑰。</p><p>&l

81、t;b>  公共密鑰:</b></p><p>  p: fca682ce8e12caba26efccf7ll0e526db078b05e6ecbcdleb4a208f3ae1617ae0lf35b9la47e6df63413c5e12ed0899bcd132acd50d9915lbdc43ee737592el7</p><p>  q: 962eddcc369cba8

82、ebb260ee6b6a126d9346e38c5</p><p>  g:67847lb27a9cf44ee9la49c5147dbla9aaf244f05a434d648693ld2d1427lb9e35030b7lfd73da179069b32e2935630elc2062354d0da20a6c416e50be794ca4</p><p><b>  y:</b&g

83、t;</p><p>  c0b6e67b4ac098ebla32c5f8c4clfee7e6fb9d832532e27d0bdab9ca2d2a8123ce5a8018b816la6048efadd040b927281ddb22cb9bc4df596d7de4dlb977dS0</p><p><b>  私有密鑰:</b></p><p>

84、<b>  p:</b></p><p>  fca682ce8e12caba26efccf7ll0e526db078b05edecbcdleb4a208f3ae1617ae0lf35b9la47e6df63413c5e12ed0899bcd132acd50d9915lbdc43ee737592e17</p><p>  q: 962eddcc369cba8ebb26

85、0ee6b6a126d9346e38c5</p><p><b>  g:</b></p><p>  67847lb27a9cf44ee9la49c5147dbla9aaf244f05a434d648693ld2d1427lb9e35030b7lfd73da179069b32e2935630elc2062354d0da20a6c416e50be794ca4</

86、p><p>  x: 146c09f881656cc6c5lf27ea6c3a9lb85edld70a</p><p>  在現(xiàn)實中,幾乎不可能用一個密鑰去推算出另一個密鑰。也就是說,即使每個人都知道你的公共密鑰,不管他們擁有多少計算資源,他們一輩子也無法計算出你的私有密鑰。</p><p>  任何人都無法根據(jù)公共密鑰來推算私有密鑰,這似乎讓人難以置信。但是時至今日,

87、還沒有人能夠找到一種算法,來為現(xiàn)在常用的加密算法進行這種推算。如果密鑰足夠長,那么要是使用窮舉法—也就是直按試驗所有可能的密鑰—所需要的計算機將比用太陽系中的所有原子來制造的計算機還要多,而且還得花費數(shù)千年的時間。當然,可能會有人提出比窮舉更靈活的計算密鑰的算法。例如,RSA算法(該加密算法由Rivest, Shamir和Adleman發(fā)明)就利用了對數(shù)值巨大的數(shù)字進行因子分解的困難性。在最近20年里,許多優(yōu)秀的數(shù)學家都在嘗試提出好的因

88、子分解算法,但是迄今為止都沒有成功。據(jù)此,大多數(shù)密碼學者認為,擁有2000位或者更多位“模數(shù)”的密鑰目前是完全安全的,可以抵御任何攻擊。DSA被認為具有類似的安全性。</p><p>  圖9-12展示了這項工作的處理過程。</p><p>  假設Alice想要給Bob發(fā)送一個消息,Bob想知道該消息是否來自Alice,而不是冒名頂替者。Alice寫好了消息,并且用她的私有密鑰對該消息摘

89、要簽名。 Bob得到了她的公共密鑰的拷貝,然后Bob用公共密鑰對該簽名進行校驗。如果通過了校驗,則Bob可以確認以下兩個事實:</p><p>  (1)原始消息沒有被篡改過。</p><p>  (2)該消息是由Alice簽名的,她是私有密鑰的持有者,該私有密鑰就是Bob</p><p>  與她用于校驗的公共密鑰相匹配的密鑰。</p><p&

90、gt;  你可以看到私有密鑰的安全性為什么是最重要的。如果某個人偷了Alice的私有密鑰,或者政府要求她交出私有密鑰,那么她就麻煩了。小偷或者政府代表就可以假扮她的身份來發(fā)送消息和資金轉賬指令等等,而其他人則會相信這些消息確實來自于Alice。</p><p><b>  X.509證書格式</b></p><p>  為了利用公共密鑰這種密碼系統(tǒng),必須將公共密鑰分發(fā)

91、出去。最通用的一種簽名證書格式稱為X.509格式。X.509格式的證書被VeriSign、微軟、網(wǎng)景和其他許多公司廣泛應用于對電子郵件消息進行簽名,對程序代碼進行認證,以及對許多其他類型的數(shù)據(jù)進行認證等等。 X.509標準是由國際電話標準機構,即國際電報電話咨詢委員會(CCITT)提出的用于目錄服務的X.500系列建議的組成部分。</p><p>  X.509證書的具體結構是用一種形式化表示來描述的,稱為“抽象

92、語法表示法#1”(abstract syntax notation)即ASN.1。圖9-13顯示了第3版X.509格式的ASN.1定義。雖然具體的語法對我們并不重要,但是你可以看到,ASN.1為證書文件的結構給出了精確的定義?!盎揪幋a規(guī)則”(basic encoding rules),即BER,精確地描述了如何將該結構保存為二迸制文件。也就是說,BER描述了如何對整數(shù)、字符串、位串以及諸如SEQUENCE、CHOICE和OPTIONA

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論