Font Size: a A A

Research On PKI Based Network Security Technology And Application

Posted on:2003-04-15Degree:DoctorType:Dissertation
Country:ChinaCandidate:W C TianFull Text:PDF
GTID:1118360185964845Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
It is increasing to attach importance to security of communication network, which should be. There are all kinds of security request for applications. PKI is a standard interface of network security, and it may provide unanimous and clear security ensurer for all kinds of applications. In this paper, we have researched the key technology of PKI, the key technology of RSA algorithm, the data encrypting algorithm based on multilayer feedforward neural networks, RSA algorithm based secret sharing scheme, PKI based tree-type security multicast system, PKI and SOCKS v5 based VPN scheme, PKI based e-commerce payment system and WPKI etc. The main contribution is below:(1) Expatiating the key technology of PKI system systemically, circumstantiating the related international standard. Analyzing the core technology of RSA algorithm, including generating pseudo random number, test of primality, etc., and giving an implementation of RSA algorithm using Java.(2) Proposing a new data encryption algorithm based on multilayer feed forward neural networks. The security of public key algorithm is based on mathematic problems, and the security of symmetric cryptographic algorithm is based on the key length. The performance of diffusing and confusing input data is necessary for symmetric cryptographic algorithm, and neural networks fit for processing data by encrypting or decrypting data because of its native non-linearity. Experimentation shows the new algorithm have more performance of diffusing and confusing than DES algorithm.(3) Secret sharing provides a scheme to assign power, for example, nuclear button, cashbox key of bank, etc. Threshold signature is a scheme to implement group signature. Secret sharing scheme may divide a secret into n shares, which are hold by n users, and the collaboration of some shares may recover the secret sharing. This paper proposes a secret sharing scheme based on RSA algorithm, and the scheme also may be...
Keywords/Search Tags:Application
PDF Full Text Request
Related items