基于PKI技术的数据加密解密解决方案目录1背景................................................................................................................................................................-1-1.1应用背景........................................................................................................................................................-1-1.2PKI理论.........................................................................................................................................................-1-1.2.1公钥基础设施PKI....................................................................................................................................-1-1.2.2对称加密算法...........................................................................................................................................-2-1.2.3哈希算法...................................................................................................................................................-2-1.2.4公钥加密体系...........................................................................................................................................-3-2产品概述........................................................................................................................................................-4-3产品功能........................................................................................................................................................-5-3.1产品功能架构................................................................................................................................................-5-3.2产品功能组件................................................................................................................................................-6-I3.2.1密钥管理中心(KMC)..........................................................................................................................-6-3.2.2签发中心(CA)......................................................................................................................................-8-3.2.3注册中心(RA)....................................................................................................................................-12-3.2.4存储发布系统(CRL)..........................................................................................................................-16-3.2.5在线证书状态查询系统(OCSP).......................................................................................................-17-3.2.6目录服务系统(LDAP).......................................................................................................................-17-3.2.7数据加密/解密、签名/验签中间件......................................................................................................-19-3.3产品技术特点..............................................................................................................................................-19-3.3.1部署灵活、操作简单.............................................................................................................................-19-3.3.2系统平台的高安全性.............................................................................................................................-20-...