Font Size: a A A

Research On Internet Security And Related Techniques

Posted on:2003-02-28Degree:DoctorType:Dissertation
Country:ChinaCandidate:C J WangFull Text:PDF
GTID:1118360095951184Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The State Physics Lab of England set up the first testing network based on Lande theory at 1968, and then the Advanced Program Manage Department of USA establish the ARAnet (i.e. the former of Internet) at 1978. From then on, Internet got a great development and has been applied into all aspects of human society. As the same time of the great development of Internet, more and more concerns have been focused on the security problem of Internet. While communicating or doing a business through a public network, i.e. Internet, people always concern the secrecy, authentication and integrality of the information through the network system. How to keep the secrecy, authentication and integrality of information in the network is the key problem to be solved for any application of Internet. Currently, the security researches on Internet are most focus on the following two aspects: one is the research on network system security, i.e. the firewall technique. Another is the security of applications of Internet. That is research on security scheme aim at different Internet applications. To solve the security problem of Internet, the most basic tool is cryptography technology.In this thesis, we research the Internet security problem both in network system and in application system. Our studies are most emphasis on the Firewall technique, Public Certificate system, Internet anonymous communication system and secure Internet Mobile Agent system.By far, there are still many studies on Internet security problems and some security problem are still not solved. We are going to discuss some concrete security problem in this thesis, and the mainly research results are list as follows.1 The defects of existing firewall system are present and an advanced firewall system based on IPv6 are proposed.2 We discuss the security of the PKI and propose an improved public key certificate system.3 We make a completely research on Internet anonymous communication technology and present a security comparison of existing anonymous communication systems.4 An anonymous Web browsing system is proposed and implemented based on group signature scheme. We also present the performance curve and security analyses of our system. From the security consideration, our system is stronger than other existing systems (For instance, CROWDS, ANOMOZIER).5 The security problems of Internet Mobile agent system are discussed and the security requirement of Mobile agent system are present. Furthermore, we give a security performance comparison of existing Mobile Agent system.6 A secure Web transaction scheme based on mobile agent is proposed. Compared with other existing scheme, our scheme has many security properties, such as secrecy, anonymity, effectivity and non-reputation.7 A multi-round online auction system (with seal bids) based on Mobile Agent is proposed and a security analysis of the system is present.
Keywords/Search Tags:Internet, Firewall, Public Key, Certificate, Anonymity, Group, Signature Scheme, Mobile Agent, Digital Signature
PDF Full Text Request
Related items