Font Size: a A A

Pre-research On Encrypting Network Card & Design For Its Software And Hardware Flat Form

Posted on:2006-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y CaoFull Text:PDF
GTID:2168360152971564Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the improvement of Internet technology, computer networks are providing people with abundant information along with more and more quick and convenient service, at the same time, its opening and inorganization bring obvious information security problem, for example, most of current network equipments transmit data in plain text on link layer, so the information including IP address, port and application protocols are exposed outside, which gives chance to attackers and invaders. So it's very necessary to carry out protection measure to assure networks' security.This paper proposes a security resolution scheme on data link layer using encryption technology, that is to say, the encrypting network card will provide all data on data link layer with encryption and authentication services, protecting such information as IP address from leaking. In this paper, the principle of encrypting network card on data link layer is introduced and the scheme of managing keys applied to data link layer encryption as well as its actualizing steps are introduced. Furthermore, the process of establishing the software and hardware plat-form of the encrypting network card is described in detail. In the concrete, the main work can be summarized as follows:1. The universal use of current ethernet network card and the security problem in network are analyzed. The work mechanism of ethernet network card and the theory foundation of realizing encrypting network card are introduced in detail.2. Various technologies used to realize the encrypting network card system are summarized, especially, the ARM designing process and the protocol of IEEE802.10 are introduced.3. A set of integrated system controlling data encryption and decryption is designed and its software and hardware plat-form along with the debugging environment of the design is build up.4. Every function module of the scheme is explained, the application of ARM and uCLinux in this system is analyzed, on this basis, the actualization in software of the keys managing function in the scheme is discussed and the flow chart of keys managing program is present.Part of program performances are realized in C and assemble language and the principle chart of PCB is realized with protel.
Keywords/Search Tags:ARM, uCLinux, IEEE802.10, Keys managing
PDF Full Text Request
Related items