Font Size: a A A

Research And Design On Data Transfer Security Mechanism For Mobile Internet

Posted on:2011-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y LiFull Text:PDF
GTID:2178330338476271Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile Internet, the demand for secure communications became more and more important. Encryption technology is the core of information security. End to end communication can be encryption by using symmetric cryptography, but key agreement, identity authentication and other occasions, need to use the public key cryptographic algorithm. By studying the mobile Internet data transfer security mechanisms in the public-key algorithms, the main works of this paper are summarized as follows:1.This paper analysis the basic characteristics of mobile Internet, and we found that existing security mechanisms in mobile Internet encryption technology are mostly base on symmetric encryption algorithms (including identity authentication protocol). In this paper we has been Choose and optimized three kinds of algorithms, elliptic curve cryptographic algorithms, Rabin and NTRU, through the computation time, the algorithm take up storage space can be seen public-key cryptographic algorithm if we appropriate selection and optimization.2.In order to conquer the load for managing the public-key certificates, we introduced identity based cropty (IBC). We analyze the mutual suitability of IBC and wireless network, and design two practical identity based key exchange protocols. These two protocols solve the problem without pre-decided secrets of the mobile terminal secret key agreement problem. Further, as the most time-consuming part of IBC was the bilinear pairing on elliptic curve, we choose the proper bilinear pairings Weil, Ate, Tate and optimized the computations.
Keywords/Search Tags:Mobile network, Symmetric Encryption, Asymmetric Encryption, Authentication, Key Agreement, Identity Based Crypto, Bilinear Pairin
PDF Full Text Request
Related items