Font Size: a A A

Study On Security Theory Of Electronic Commerce And Chaotic Encryption

Posted on:2002-09-19Degree:DoctorType:Dissertation
Country:ChinaCandidate:X M HouFull Text:PDF
GTID:1118360155456835Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
The globality and openness of Internet makes the security of Internet-basedelectronic commerce necessary and intractable. In this dissertation, the securitytheory and chaotic-encryption techniques of electronic commerce are extensivelystudied.The main studies carried out in the dissertation are:1. In order to overcome the shortcomings of static security employed in traditional network-security systems, a novel concept, dynamic security, is put forward in this dissertation, based on which a kind of P2DR-model based dynamic security strategy is also proposed. In this security strategy, the security degree is measured by three parameters: protection time, detection time and response time.2. A synthetical encryption technique is put forward by integrating DES into RSA. This novel technique possesses the merits of both of these two encryption techniques.3. The commonly used digital signature can not ensure a secure data transportation. In order to improve the security of data transportation, a scheme of encryption signature is put forward. This scheme realizes digital signature, signature verification and data encryption simultaneously. An extensive study is carried out on digital certificate, CA and PKI; a sample of digital certificate is given. The performance of SSL protocol and that of SET protocol are also compared in the dissertation.4. A novel firewall is proposed by synthesizing packet filter and proxy technique. It can not only filter the packets transported, but also provides proxy service on the application layer. This firewall surpasses other packet-filtering firewalls over datum-processing efficiency, since it realizes the micro-kernel of the TCP/IP protocol.5. It is also studied how to apply chaotic control principles in the encryption of electronic commerce. A chaotic-encryption technique is put forward. Both encryption and encoding can be efficiently carried out with this technique. The simulation results of this technique on a difference chaotic system show that it...
Keywords/Search Tags:electronic commerce, security, chaos encryption
PDF Full Text Request
Related items