Font Size: a A A

The Design And Simulation Of A New Online Trade Security System Based On SSL Procotol

Posted on:2005-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:R LiFull Text:PDF
GTID:2168360122981193Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Since the new business methed EC (E-Commerce) had come out, it received a flying development. It has been regarded as the most promising business methed. In 2002, the sum of EC took up 14% in retail sum while the proportion in China is only 0.02%. The major factor restrict EC's development in China is the suspicion to the security of EC.As we know, the most important and complex part in EC is the security assurance in online payment. This conundrum is going to be the major obstruction of the EC's developing.Pursuing the assurance of security has got some achievement such as Ipsec (Internet Protocol Security) and SSL (Secure Socket Layer). These protocols are developed for Internet security rather than EC security, but they did well for some years except some sever problems.On the other hand, develop countries such as the USA prohibit export high grade networks security technologies or productions to China due to consciousness difference..it is clearthat networks security technologies are as important as advanced ammo. To develop our own EC security technologies is an exigent mission.Based on SSL, we can develop new EC security protocol, which can offer us more security assurance. This is I would like to do in this paper.On the basis of some conceptions relating to EC security such as encrpytion techniques and Identity-Authentication, we mainly discuss the disadvantages of using SSL in online payment.To solve these disadvantages of SSL, I try to add bilateral-identity-authentication to give the customs more equitable circumstance to do EC businesses. For the reason of confronting the hacking, the management of cryptogram must to be improved. Thus a new EC security protocol has formed. At the same time, we try to use attribution certificate to manager the mass popedoms.New software has been developed to simulate this new EC security protocol, to show whether the new one is better than olders. The result shows that the new one could run as fast as the old, while offering much hight security insurance. The output bit flow of the new has a good randomicity that is quite useful forpreventing hacking.Due to the scarcity of technologies and reference, the new protocol has its shortcomes. It can hardly to be used for the occasion of trisection EC business.Some company use this technology to secure their online notarization and online declaration operation, it do a good job until now.
Keywords/Search Tags:EC Security, Identity Authentication, Security-Key, Network Security Protocol
PDF Full Text Request
Related items