Font Size: a A A

Improvement Of Secure WEB System Based On Cryptography Device

Posted on:2006-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:D Y SunFull Text:PDF
GTID:2168360155953100Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Network security has become more and more important with thedevelopment of computer network technology. Cryptography technologyplays an important role on solving the problem. Its purpose is to ensureprivacy by keeping information hidden from anyone for whom it is notintended, even those who have access to the encrypted data.There are two types of cryptosystems: symmetric cryptography andpublic-key cryptography. In the case of symmetric cryptography, the samekey is used for both encryption and decryption. Symmetric cryptosystems arequite effective, but its weakness is obvious: the big danger is sharing thesecret, which must be done before any encryption can take place. In the caseof public-key cryptography, each user has a public key and a private key. Thepublic key is made public while the private key remains secret. Encryption isperformed with the public key while decryption is done with the private key.Public-key systems make key management easy, there is no need to arrange ashared secret ahead of time, but public-key crypto is computationallyintensive. The practical remedy is to use public-key crypto only at the start ofa session, to establish credentials and arrange the delivery of a shared-secretsession key. The shared secret can then be used for economical privacy insubsequent messages. This is the principle of SSL protocol.In this paper, through modifying the realization of traditional SSLprotocol, we introduce a secure WEB system based on Cryptography devices,which can provide more security protection. The work of this paper is basedon the WEB system Apache+Modssl+Openssl, which is popular using in theinternet.Traditional realization of SSL protocol uses public-key cryptography toprovide secure communication. It uses software arithmetic to do thecryptography. That is: both the public key and the private key are stored on...
Keywords/Search Tags:Cryptography
PDF Full Text Request
Related items