Font Size: a A A

Research And Application Of Cryptography Technology In Bluetooth Wireless Monitoring Master's Design

Posted on:2005-11-09Degree:MasterType:Thesis
Country:ChinaCandidate:X B MaFull Text:PDF
GTID:2168360122480880Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
In recent years, with the technological advancements and economic progress, the security of the property, the important documents and others in governmental departments, companies, all kinds of banks and so on has been thought more of. Under the circumstances, in the society, the monitor equipments with better qualities, new techniques have been needed increasingly. This paper provides a new kind of monitoring system: wireless security monitoring system based on Bluetooth technology, in which, application of Bluetooth and cryptography technology can remedy the lacks of current monitor facilities like infrared, television, magnetic flux, as a result, this monitoring system has an important application value. The system is mostly designed for the governments. It adopts combination of software and hardware mode. It includes monitoring master, monitoring slaves, local inspect center and BWD(Browser/Web/Database) system. The design of monitoring master and the security of data transmission in network are the center of the paper's study. So, this paper's aids are design of master and the search of the appropriate encrypting arithmetic.In the paper, firstly, the paper introduces the pertinent knowledge of Bluetooth, and then, the paper introduces the cryptography, which is the basic theory of the network communication between monitoring master and the center. In the part, the paper brings forward a new kind of linear congruence arithmetic and analyzes the arithmetic's security, combining the arithmetic and the m sequence, the paper provides a cutting method. What's more, combining the arithmetic and traditional linear congruence, the paper educes another good quality encrypting arithmetic. The two encrypting arithmetic have good value in network data's transmission. In the cryptography research, the paper also educes a series of singular nonlinear feedback functions which can produce another kind of regular sequences; in the addition, the paper points out the forge signature attack about a kind of threshold digital signature scheme, gives the example and mend measureSecondly, the paper introduces the whole design of the monitoring master, which consists of master and slave principle, modules adopted and the module parameters, circuit diagram designed and so on. At the last, the paper gives out the part program design charts, particularly analyses the means of cutting and traditional linear congruence stretch arithmetic's application in encryption.
Keywords/Search Tags:Bluetooth technique, linear congruence, Monitor, Cryptography, Digital signature
PDF Full Text Request
Related items