Font Size: a A A

The Research And Realize Of Identification Authentication Technology In Network Security

Posted on:2001-06-18Degree:MasterType:Thesis
Country:ChinaCandidate:C Y ZhangFull Text:PDF
GTID:2168360062480059Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The security of network information is closely related to the immediate Interests of our country, society and subscribers, which only can be developed by technology power of our own. Among these, Client Access Authentication Technology ensures encrypting communications participator's identification against hacker's fabricating status, malicious bugging and distorting, and plays an important role in protecting the security of networking communication and recourses accessing.First, the paper talked about the standard of security computer networking, mainly analyzing the structural standard for OSI Security system. Second, it issued about the introduction of X.500 Directory Service and lightweight Directory Access Protocol, especially dealing with the relationship between X.500 and LDAP. hi the third part, it introduced the international standard of RFC Security Authentication Protocol and CCITT X.509 Secure Authentication Framework Protocol, both with regard to the authentication system, and still emphasizing the key parts of Certification's Format, how to get the Certification, the X.509's authenticating process, encryption key and management of certification. Based above-mentioned references and according to X.509, Centralized Authentication unit was designed and realized. What's more, the Client's Application Program appeared by using this unit. So Authentication Unit management system provided such functions as Client's Identification Authentication, Certification signing and submitting, and digital signature. Then, Client's application program realized the access to authentication unit and security communications with verification.
Keywords/Search Tags:Network security, Identification authentication, Certification Authority, X.509 authentication framework, Directory, Digital signature, Strong authentication
PDF Full Text Request
Related items