Font Size: a A A

The Design And Implementation Of An Identity Authentication System Based On Agent

Posted on:2005-06-15Degree:MasterType:Thesis
Country:ChinaCandidate:P S HanFull Text:PDF
GTID:2168360152965011Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
The identity authentication protocol and system in network plays an important role in network security. It has much effect on the security of the application on network. It is a necessary condition for guaranteeing the secure communication to have research on the identity authentication protocol and design secure identify authentication protocol and system.This has a very important and practical meaning.This paper presents the design and implementation of an identify authentication system based on agent associating with the application in the mobile police affair system. First, it presents the designing of the whole identify authentication system based on the secure requirement in the mobile police affair system and the comparison of present solutions. And then, it introduces the design and implementation of CA. After that, it designs the protocol of this system based on the analysis of the mind of Kerberos protocol and proves its security with BAN logic. Then it explains the implementation of the protocol's participators-the identity authentication server the application server and the client detailedly. At last, considering the expanding of the system, the paper has a research on some possible farther applications of this system.
Keywords/Search Tags:Identify Authentication Protocols, Authentication Agent, Ticket, Kerberos, PKI, CA
PDF Full Text Request
Related items