Font Size: a A A

Research And Design Of PKI System In Campus Network

Posted on:2005-08-28Degree:MasterType:Thesis
Country:ChinaCandidate:F M ZhangFull Text:PDF
GTID:2168360125464201Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of Computer Technology, Net Work Technology and Others, it becomes difficult to Control the criminial or immority in traditional in society. With the development of the Internet and electronic commerce, the security of electronic information becomes more and more important to person. Applied Cryptography is essential for security. The traditional encryption has the problem of the manage of key. PKI technology based on public key system can resolve the problem of the manage of key through issuing the certificates by CA(certificate authority). PKI can provide confidentiality,,integrity,authentication and non-repudiation for the vary net applications.First,the paper describes the base theorem of PKI,vary standard of PKI and the area of application of PKI and then the paper emphases on the system architecture of PKI ,trust model and the manage of certificate and key. The technology of asymmetric key is the base of the PKI system. The work relating to PKI standardization has improved in the last several years.At last in the paper, author presents the model of PKI system including two layers of CA and several RAs in campus network according to the speciality of school and campus network.and think more of sercurity of the system and analyse the advantage and disadvantage of the model according to the speciality of school and campus network. and then the author presents the accomplish plan of the certificate management based on the model, and at last the author describes that key management software manages the key of PKI system according to speciality of the school. Author describe how the key management software manages the key and presents a simple realization of the key management software in detail.
Keywords/Search Tags:PKI, CA authority center certificates, certificate, authentication, trust model, private key management, certificate management.
PDF Full Text Request
Related items