Font Size: a A A

Embeded Research And Design Of PKI Secure Communication

Posted on:2006-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:X YaoFull Text:PDF
GTID:2168360152998322Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapidly development of the computer and communication technology, the way of people's living and working changed profoundly. While enjoying the pleasure brought by the cyberworld, people are disturbed by the security problem caused by it. In order to solve the identity authentication in the cyberworld, it's very necessary to introduce Public Key Infrastructure (PKI). As a kind of infrastructure, PKI isn't aimed at individual for security purpose, but is similar to power infrastructure in real world to meet certain standard application and provide the same security services. These services are almost completely transparent to terminal user's operation. The transparency make all of the security operation immerging behind the user without extra interference and user's concerning with it's key and algorithm. At the same time, it wouldn't cause security harm even if user operates wrongly. Because of it's novel concept and mighty functions, PKI has caused much attentions at home and abroad since it's brought up. This paper consists of the following aspects: 1) brings forward the summarize of PKI's fundamental theory, including it's fundamental theory , trust model in common use and the standards it follows; 2) demonstrates the confidentiality and authentication of the CCITTX.509(3) communication protocol i with Strand space theory, analyzes the SSL protocol which often used in security communication and presents the application architecture of how to use SSL protocol ; 3)puts forward how to build an enterprise level certificate management system, then analyzes and discusses the communications between components within a system; 4) presents the design and implement of the system's communication module.
Keywords/Search Tags:PKI, security, communication
PDF Full Text Request
Related items