Font Size: a A A

Study On Theories And Techniques Of PKI In Ad Hoc Network

Posted on:2007-01-07Degree:DoctorType:Dissertation
Country:ChinaCandidate:H Z NingFull Text:PDF
GTID:1118360212468305Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
For being quick and easy to construct high anti-destructive network, ad hoc network has been taken more attention by the business. However, for the openness and limited resources, ad hoc network security is becoming the problem which restricted it to be applied in actual world and can't be resolved by traditional security ways. Actually, PKI theories and techniques are very scientific in solving the network security. But the current PKI system is designed for traditional immobile network, and can hardly be applied in ad hoc network directly. Therefore, researching PKI system of ad hoc network is significant and valuable for ad hoc network security application and PKI system development.This thesis presents a PKI system model. Under this model, Chebyshev(2p) polynomials over ring Z2p is studied, and Chebyshev(2p) key agreement algorithm, Chebyshev(2p) public-key encryption algorithm, Chebyshev(2p) digital signature algorithm, hybria CA system, digital certificate trust maintenance algorithm, etc. for ad hoc network are presented. These algorithms and systems ensure the security of ad hoc network. The research work of this thesis is supported by National Natural Science Foundation of China(No.60572035) and Beijing Municipality Key Laboratory of Communication and Information System(No.SYS100040408).The main innovations of this thesis are following:1) A PKI system model, which describes the relationships and functions among these parts of PKI system, is presented. The model provides ways for the study and development of PKI system.2) The Chebyshev(2p) polynomials over ring Z2p is defined. With studying its properties, we know that Chebyshev(2p) polynomials of n>1 can get good pseudo-random characteristic by controlling the pseudo-random action of 2-Chebyshev(2p) polynomial. Under these properties, Chebyshev(2p) polynomials can avoid the defeats of Chebyshev polynomials in PKI system and can be used to construct public-key algorithm.3) Chebyshev(2p) public-key algorithm system for ad hoc network is presented. By Chebyshev(2p) one-way trapdoor function, key agreement algorithm, public-key encryption algorithm and digital signature algorithm for ad hoc network were...
Keywords/Search Tags:Ad hoc network, Network security, PKI system, Public-key algorithm, Public-key management
PDF Full Text Request
Related items