You are on page 1of 11

1.

1
1.2
1.3
1.4
1.5

20-21
3C

(arbitrated protocol)(adjudicated protocol)


(self-enforcing protocol)


1.1
(confidentiality) /
(integrity)(availability)
/

(interruption) (interception)
(modification)(fabrication)

(denial of services) 1-1

A
1-1

1-2

A
C
1-2

1-3

A
C

1-3

1-4

A
C
(Act as A)
1-4

(denial of services)(theft)(deletion)
(copy) (logic bomb, Trojan horse, trapdoor, information
leaks)(lost)(theft, copy)
(change)(forgery)

()
(IC )
(supervisor)(audit trails)
(project management)
(tamper-resistant)
()

1.2

/(plaintext, cleartext)(ciphertext)(encryption,
encipherment) (decryption, decipherment) /
(encryption/decryption key)/

/
/
(permutation)(combination)


1-5

1-5
(message)(signature)(sign)
(verify)/(signature generation/verification key)
(factorization)
(discrete logarithm)(elliptic curve)

1-6
()
(

(+)
()

1-6
(symmetric cryptosystem)
(asymmetric cryptosystem)

(secret key)
(private key system)(one-key system)


(public
key) (private key)
(key pair)

(public key system)(two-key system)

1.3

(password)

Token IC

4 8

(one-time pad passwords)


(knowledge
split)
(interactive)/ (noninteractive)/
- (challenge-response)
(zero-knowledge proofs) -

IC


(identity)
(
)

(time stamp)(time-variant parameter)

(one-way hash function)(keyed hash function)


( 128
160 )(message digest)
(collision)( 10-6)
()
(Message Authentication Code,
MAC)

(correctness)
(time-variant)
(replay)

1.4
1977 (International Standard Organization, ISO)
OSI(Open System Interconnection)(
80)1984 OSI

OSI (application layer)


(presentation layer)(session layer)(transport layer)
(network layer)(data link layer)(physical
layer) 1-7

1-7

OSI


OSI

(Virtual Terminal, VT)(File Transfer Access


and Management, FTAM)(Message Handling System, MHS)
(Directory Service, DS) (Network
Management, NM)

OSI

tab

(Uyless, 1991)

(check point)

OSI

( 81)

( 81)
(token management)
(activity management) (dialogue control)
(exception reporting)

OSI

( 81)

OSI (routing)

OSI
X.25

OSI

OSI

()()
0 1

(Uyless, 1991) EIA RE-232RS-449


CCITT
X.25
(arbitrated protocol)
(adjudicated protocol)(self-enforcing protocol)
1-8

1.(arbitrated protocol)2.(adjudicated protocol)


TTP
A

TTP
B

ADJ

3. (self-enforcing protocol)
A

B
1-8

1.5

()
(users to system)
(Internet to Intranet)(users in system)

()()
()

1.
2.
3.
4.
5.

TCP/IP OSI

(adjudicated protocol)
(application layer)
(arbitrated protocol)
(asymmetric cryptosystem)
(availability)
(ciphertext)
(confidentiality)
(data link layer)
(decryption, decipherment)
(denial of services)
(discrete logarithm)
(Directory Service, DS)
(elliptic curve)
(encryption, encipherment)
(encryption/decryption key)
(factorization)
(fabrication)
(File Transfer Access and Management, FTAM)
(integrity)
(interception)
(interruption)
(International Standard Organization, ISO)
(keyed hash function)
(message digest)
(modification)

(Message Authentication Code, MAC)


(Message Handling System, MHS)
(network layer)
(Network Management, NM)
(one-key system)
(one-time pad passwords)
(one-way hash function)
(password)
(physical layer)
(plaintext, cleartext)
(presentation layer)
(private key)
(private key system)
(public key)
(public key system)
(routing)
(secret key)
(self-enforcing protocol)
(session layer)
(symmetric cryptosystem)
(time stamp)
(transport layer)
(two-key system)
(Virtual Terminal, VT)

( 81)OSI 6
( 81)OSI 14
( 80) OSI 23
Uyless D.B.(1991). OSI: A Model For Computer Communication Standards.
London: Prentice-Hall International.

You might also like