Font Size: a A A

The Design And Implementation Of Data Security And Authentication In Network Communication System

Posted on:2005-05-31Degree:MasterType:Thesis
Country:ChinaCandidate:Y H MengFull Text:PDF
GTID:2168360122497761Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the increasing development of Internet, The global information has become the major tendency in the development of man. The appliance of computer information in every area brings the great advance of society. Especially, in the field of military, the speed and security of data translated and received are always the front line in the study of military. This thesis is written on the basis of the system of military region armoring equipment. It implemented the design of one PC to network, and then completed the system of network communication.This thesis begins with an analysis on the current research status of the network system security. It is pointed out the primary weakness and challenge that are faced now, and then expounds the scheme, which is used to resolve the problems, that is, encryption, authentication, and remote dynamic password authentication scheme.The mixed data encryption system is used in this thesis based on analysis the advantages and disadvantages of each algorithm, the triple IDEA in Inner CBC model is used to encrypt plaintext, the RSA is used to encrypt the three session keys, it can resolve the poser in the mana -gement of keys. The digital digest generated by SHA is employed to realize authentication based on introduce the technology of authentication. A new remote dynamic password authentic -ation scheme is used to realize that the password of the client used to log in a remote server is dynamic, which can resist the re-transimission attack. Theory of the network API Winsock and the key flow of the connection-oriented TCP are described, the design of communication interface and the method of program are produced.Based on the above blocks, the network communication system based on data encryption is proposed and implemented. This system already succeeds in laboratory s LAN. Finally, advantages and disadvantages of this secure network system are summarized and the feather studying direction is pointed out.
Keywords/Search Tags:Network Security, Data Encryption Algorithm, Remote Dynamic Password Authentication, Socket
PDF Full Text Request
Related items