Font Size: a A A

Study On Secure Data Transferring Technologies Used In Military-emulation-network

Posted on:2007-09-18Degree:MasterType:Thesis
Country:ChinaCandidate:R S LiFull Text:PDF
GTID:2132360215470397Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the developing of network, safety is becoming more and more important. Considering this need, we decide to do the research on military based secure data transferring technologies. We focus on encryption technology and key-management technology.Encryption is the basic and widely used technology to protect communication. In this paper, we study on all kinds of key-based algorithms, include both symmetric and public-key algorithms, such as DES, IDEA, AES, Diffie-Hellman, RSA and ECC. We point out the strengths and weaknesses of each algorithm, and the algorithms we should adopt.Public-key cryptographic systems often involve raising elements of some group to large powers. An important question is how fast this exponentiation can be done, which often determines whether a given system is practical. In this paper we survey the known methods for fast exponentiation, examining their relative strengths and weaknesses, and then choose the methods that best fit our condition. Based on our experiences, we put forward some improvements on Montgomery algorithm, which effectively improve the speed. In addition, we present our improved prime test method, which also obviously improve the speed of prime-generation.Key-management technology is indispensably in secure data transferring. We study on Kerberos technology and so on. We describe the basic issues of them, and discuss the development of them. Then we put forward a new method of end to end key-management. The new method is based on HMAC protocol and Diffie-Hellman algorithm. It can effectual insure the safety of data tranfsering in a local network. At the same time, it can much reduce the cost that PKI bring. We also put forward a new method of group-key-management, which obviously reduce the cost of GDH.At the end, we describe the design and implementation of the software of safe-emulation-platform. We present the top design and some implementation of its modules.
Keywords/Search Tags:Network security, Symmetric cryptographic, Public-key cryptographic, Montgomery Algorithm, Key-management, Public-Key-lnfrastructure
PDF Full Text Request
Related items