信息安全研究 ›› 2021, Vol. 7 ›› Issue (12): 1121-.

• 学术论文 • 上一篇    下一篇

国密算法在主动安全网络架构中的应用

刘建兵;王振欣;杨华;   

  1. 北京北信源软件股份有限公司 
  • 出版日期:2021-12-05 发布日期:2021-12-02
  • 作者简介:刘建兵 硕士,高级工程师.主要研究方向为网络安全、工控安全. fqy-vrv@wo.cn 王振欣 硕士,高级工程师.主要研究方向为网络安全、工控安全. wzxllp@163.com 杨华 博士.主要研究方向为网络安全、人工智能. 13810170661@139. com

Application of National Secret Algorithm in Active Security Network Architecture

  • Online:2021-12-05 Published:2021-12-02
  • Contact: 刘建兵 硕士,高级工程师.主要研究方向为网络安全、工控安全. fqy-vrv@wo.cn

摘要: 本文是主动安全网络架构系列文章的第五篇,概述了密码技术在网络安全中的核心地位以及国密算法对于网络安全防护自主可控的重要作用,明确了网络安全防护国密算法使用和推广的总体方向和趋势;同时分析指出了基于物联网的标识密钥技术拥有之前密钥技术所没有的多种特点和自主可控性,其技术的众多特性可以实现以往密钥技术解决不了的安全问题,非常适合主动安全网络架构的安全防护需求。在主动安全网络架构的支撑协议族中可充分使用标识密钥技术进行协议的构建,以国密算法支撑主动安全网络架构各种业务功能的安全运行,进而实现网络安全基因的自主可控和主动安全网络架构运行的安全可靠,从根本上提升网络的安全防护能力。

关键词: 密码技术, 安全基因, 国密算法, 标识公钥, 安全特性

Abstract: This is the fifth article in a series of articles on active security network architecture. It outlines the core position of cryptography in network security and the important role of national secret algorithms for network security protection. It clarifies the use and promotion of national secret algorithms for network security protection. At the same time, the analysis pointed out that the Identity Public Key technology based on the Internet of Things has a variety of characteristics and autonomous controllability that the previous key technology does not not have, and its many features can solve the security problems that the previous key technology cannot. The Identity Public Key technology is very suitable for the security protection requirements of the active security network architecture. In the supporting protocol family of the active security network architecture, the Identity Public Key technology can be fully used to construct the protocol, and the national secret algorithm can be used to support the safe operation of various business functions of the active security network architecture, and then realizes the independent control of the network security gene, the safe and reliable operation of the security network architecture and fundamentally improves the security protection capabilities of the network.


Key words: Cryptography, Safety Gene, National Secret Algorithm, Identity Public Key, Security Features