Font Size: a A A

Research On Secure Transportation Of Data Blocks Of IP Protocol

Posted on:2004-10-04Degree:MasterType:Thesis
Country:ChinaCandidate:H Y LuoFull Text:PDF
GTID:2168360092490160Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Ten thousands of the network users communicate and exchange their data materials on the Internet at present. As the network user increases very quickly, more and more criminal events by network take place frequently. It is very important to study how to protect the network user's data materials that were placed on the network.Many network users use TCP/IP protocols that were composed of a series of protocol layers to finish their communication tasks. The user's data information is divided into a great many of data blocks. When the data blocks are transported through the layers of the protocols, they are added the controlled information in their headers. These controlled information express the regularity of each protocol layers. After the data blocks were packeted, they formed the physical data frames that were transported in the network. The physical data frames will be transformed into the forms of IP packets when they arrive at every router nodes. The IP data packets are stolen easily because they are plaintext in every router nodes.According to the principles of the network, this thesis proposes a practical method to improve the secure function of the TCP/IP protocols. For example, the user's data materials were encrypted before they were transmitted. The data materials existed on the network in the forms of ciphertext, so this information was useless to the stealers. To prevent the data materials from being modified illegally we may add data message digest into the data packets. The digital signature helps us to recognize the data blocks that are transmitted from the reliable communication users. These secure methods provide the network users with a transparent and secure communication channels.
Keywords/Search Tags:Algorithm, Data blocks, Privacy, Integrity, Digital signature
PDF Full Text Request
Related items