Font Size: a A A

Study On Encryption And Digital Signature Of Electric Document

Posted on:2004-04-02Degree:MasterType:Thesis
Country:ChinaCandidate:J H XiangFull Text:PDF
GTID:2168360122466832Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet and electric business, our society has been changed greatly. Office Automation is an important application field for government and corporation. It requires a high reliability and security. On this thesis we discuss the security of the electric document, and focus on digital signature and the protocol application on Office Automation, which including three departments ---- Hash Algorithm, the security protocol about work flow and security key base on the Public Key Infrastructure. The article includes five departments, they are:Unit 1: According to the features of electric documents, some protocols are proposed to keep the electric security including digital signature and document encryption. One is one to one message transportation, another is one to multi message transportation.Unit 2: One algorithm is constructed which could identify the data integrality and apply in documents amended, according to the work flow features. Then, the security of the algorithm is discussed.Unit 3: In this chapter, we introduce the feature of cryptography function. According to the feature of Boolean function in cryptography, we study the way of the construction of Boolean function, mainly discussing the Bent function. According to the theory of J. Seberry, an group of functions are constructed which are one kind of balanced correlation immunity and high nonlinear priority. At last, these functions are used to advance SHA-1, and a new hash function called CSHA is proposed.Unit 4: At present, cryptography hash algorithm for applications such as digital fingerprinting of messages, message authentication, and key derivation is commonly iterative processed which hash inputs of arbitrary length by processing successive fixed-size blocks of the input. The iterative process is commonly serial construction. In this part, some new constructions are proposed which include serial parallel, parallel constructions, and different hash functions are mixed in one hash algorithm. Then, some examples are applied to hash the same message to compare the result.Unit 5: PKI is the base of digital signature. In this part, the basic theory of PKI is introduced; the PKI system is designed; and PKI functions are discussed.
Keywords/Search Tags:Office Automation, digital signature, Hash function, iterative process, work flow, PKI, quadratic residue
PDF Full Text Request
Related items