【正文】
ncryption technology is through the use of code or password to protect data security. For encrypted data is called plaintext, specifically through the role of a encryption algorithm, the conversion into cipher text, we will express this change as the cipher text is called encryption, the cipher text by the decryption algorithm to form a clear role in the output of this a process known as decryption. Encryption algorithm known as the key parameters used. The longer the key, the key space is large, traverse the key space the more time spent, the less likely cracked. Encryption technology can be divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption to the data encryption standard DES (Data Encryption Standard) algorithm is represented. Asymmetric encryption is usually RSA (Rivets Shamir Aleman) algorithm is represented. (B), authentication Commonly used security authentication technologies: digital signatures, digital certificates, digital time stamp, CA security authentication technology. (C), hacker protection technology Currently, hackers have bee the biggest emerce security threats, thus preventing hacking work security technology has bee the main content, by governments and industry are highly valued. Hacking techniques include buffer overflow attacks, Trojans, port scans, IP fraud, work monitoring, password attacks, and denial of service Dos attacks. At present, people have made many effective antihacker technologies, including firewalls, intrusion detection, and work security evaluation techniques. Ⅵ .the future security of emerce Increasingly severe security problems, are growing threat to national and global economic security, governments have been based on efforts in the following areas: (1) Strengthen the legislation, refer to the advanced countries have effective legislation, innovative, emerce and improve the protection of the laws against cybercrime security system. (2) Establishment of relevant institutions, to take practical measures to bat cyber crime. Development of the law, the implementing agencies should also be used for its relevant laws, which must establish an independent oversight body, such as the executing agency to implement the law. (3) Increase investment in work security technology。 plete data encryption system and so on. Ⅳ .emerce security issues facing As emerce work is the puterbased, it inevitably faces a number of security issues. (1) Information leak Performance in emerce for the leakage of business secrets, including two aspects: the parties are dealing transactions by third parties to steal the contents。 Third, enterprises should also be responsible for product aftersales service, This service may be through works, may not. Inter transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that the goods can not be confirmed until the hands reach into their own hands, what it is