Research on cryptographic technology of future network information system

This article focuses on network information cryptography technology.The strategic significance of cyberspace has become increasingly prominent. Technologies such as artificial intelligence, edge computing, and dynamic reconfiguration are widely used in cyberspace. In the future, network information...

Full description

Saved in:
Bibliographic Details
Main Authors: Liu Xiaokai, Wang Wendong, Yang Pengfei, Yang Jiangshuai, Meng Xiangbin
Format: Article
Language:zho
Published: National Computer System Engineering Research Institute of China 2022-02-01
Series:Dianzi Jishu Yingyong
Subjects:
Online Access:http://www.chinaaet.com/article/3000146239
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849420481144291328
author Liu Xiaokai
Wang Wendong
Yang Pengfei
Yang Jiangshuai
Meng Xiangbin
author_facet Liu Xiaokai
Wang Wendong
Yang Pengfei
Yang Jiangshuai
Meng Xiangbin
author_sort Liu Xiaokai
collection DOAJ
description This article focuses on network information cryptography technology.The strategic significance of cyberspace has become increasingly prominent. Technologies such as artificial intelligence, edge computing, and dynamic reconfiguration are widely used in cyberspace. In the future, network information systems will also face new threats and attack risks while introducing emerging technologies. This paper focuses on the characteristics of future network information system multi-domain integration, ubiquitous perception, intelligence, service customization and endogenous security, conducts security and confidentiality demand analysis and security threat and risk analysis, and designs a technology including cryptographic software and hardware platform technology, cryptography algorithms and protocols, cryptographic applications and security goals, hierarchical cryptographic architecture oriented to the future network information system.
format Article
id doaj-art-dd6a505e0a594884a91bc86b0261f6a0
institution Kabale University
issn 0258-7998
language zho
publishDate 2022-02-01
publisher National Computer System Engineering Research Institute of China
record_format Article
series Dianzi Jishu Yingyong
spelling doaj-art-dd6a505e0a594884a91bc86b0261f6a02025-08-20T03:31:45ZzhoNational Computer System Engineering Research Institute of ChinaDianzi Jishu Yingyong0258-79982022-02-01482656810.16157/j.issn.0258-7998.2115823000146239Research on cryptographic technology of future network information systemLiu Xiaokai0Wang Wendong1Yang Pengfei2Yang Jiangshuai3Meng Xiangbin4National Computer System Engineering Research Institute of China,Beijing 100083,ChinaNational Computer System Engineering Research Institute of China,Beijing 100083,ChinaNational Computer System Engineering Research Institute of China,Beijing 100083,ChinaNational Computer System Engineering Research Institute of China,Beijing 100083,ChinaNational Computer System Engineering Research Institute of China,Beijing 100083,ChinaThis article focuses on network information cryptography technology.The strategic significance of cyberspace has become increasingly prominent. Technologies such as artificial intelligence, edge computing, and dynamic reconfiguration are widely used in cyberspace. In the future, network information systems will also face new threats and attack risks while introducing emerging technologies. This paper focuses on the characteristics of future network information system multi-domain integration, ubiquitous perception, intelligence, service customization and endogenous security, conducts security and confidentiality demand analysis and security threat and risk analysis, and designs a technology including cryptographic software and hardware platform technology, cryptography algorithms and protocols, cryptographic applications and security goals, hierarchical cryptographic architecture oriented to the future network information system.http://www.chinaaet.com/article/3000146239future network information systemcryptographic technologysecurity requirementssecurity threatssecurity risks
spellingShingle Liu Xiaokai
Wang Wendong
Yang Pengfei
Yang Jiangshuai
Meng Xiangbin
Research on cryptographic technology of future network information system
Dianzi Jishu Yingyong
future network information system
cryptographic technology
security requirements
security threats
security risks
title Research on cryptographic technology of future network information system
title_full Research on cryptographic technology of future network information system
title_fullStr Research on cryptographic technology of future network information system
title_full_unstemmed Research on cryptographic technology of future network information system
title_short Research on cryptographic technology of future network information system
title_sort research on cryptographic technology of future network information system
topic future network information system
cryptographic technology
security requirements
security threats
security risks
url http://www.chinaaet.com/article/3000146239
work_keys_str_mv AT liuxiaokai researchoncryptographictechnologyoffuturenetworkinformationsystem
AT wangwendong researchoncryptographictechnologyoffuturenetworkinformationsystem
AT yangpengfei researchoncryptographictechnologyoffuturenetworkinformationsystem
AT yangjiangshuai researchoncryptographictechnologyoffuturenetworkinformationsystem
AT mengxiangbin researchoncryptographictechnologyoffuturenetworkinformationsystem