Font Size: a A A

Design Of PKI System And Research Of Its Certificate Retraction Technology

Posted on:2004-07-16Degree:MasterType:Thesis
Country:ChinaCandidate:W L ZhaoFull Text:PDF
GTID:2168360095460549Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of science technology rapidly, computer communication and micro-electronics technology are promoting the information revolution which has the trait of network,digilal. All kinds of activities in society are increasingly depending on information network. But everything has two sides, on the one hand, information revolution has brought convenience and shortcut; on the other hand, information network intimidate human in information security industry. All sorts of "network cutpurse", "network cheat" are disturbing our lives all the time. In this case, man are gradually realizing that we need elementary security service such as encryption, authentication, integrity, otherwise we will have no security pledge in digital world. Especially, the application for E-commerce and E-government affair intensify the cognition above. And the Public Key Infrastructure which is to be researched in the thesis originate.A layered model is put forward based on the notion, standard etc for the PKI, then a scheme of certification revocation is also presented in this thesis.When the PKI system applied for the certificate management,the task of certificate retraction (when the certificate is invalid )will be placed in front of you. Whether the scheme of certificate retraction is good or not has strong influence on the efficiency of PKI system'operation and the convenience for the users. In the mechanism of periodic publication, the CRL is a comparatively mature technology, but it has its own defaults.At the same time, there are some other certification revocation technologies to be selected. For example. Certificate Revocation Tree technology is an effective one, but it has defect too-revocation cost is high. So a new scheme is put forword in the thesis to improve on it.
Keywords/Search Tags:PKI, CA, CRL, CRT, Certificate revocation, Binary sorted tree, Merkle Hash tree, Distributed Application
PDF Full Text Request
Related items