Font Size: a A A

Analysis And Implementation Of PKI Trust Model

Posted on:2006-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:S WangFull Text:PDF
GTID:2168360155954876Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the fast development of computer and Internet, people have come to live in the digital times which based on network and information security. Thus, secure service, such as authentication, integrity and secrecy, has become the most essential service of digital world and network application. Public Key Infrastructure (PKI) is a kind of important technology in network security which is the basic framework of secure service and becoming the pivotal part of the whole secure architecture. PKI is a hot problem of the whole secure management system and makes many standards and secure application possible. PKI is the most feasible and effective measure to construct a secure network and information system under the open network environment. With the digital certification enacted by CA, Public Key Infrastructure (PKI) provides a framework to construct and manage the trust relationship. Trust model is the foundation of the whole secure architecture because it determines the trust form adopted and the risk to adopt it in network. So the research of trust model in PKI has been the hot-pot of PKI technology.Firstly, some backgrounds of PKI and trust model as well as the problems to be solved by the model are discussed. Through analyzing and comparing several extant CA-based trust model, their advantages and disadvantages are described and a new model called composite model peer-to-peer trust model is proposed. Moreover, its construction strategy is given including the realization of the model, the construct of the trust path, etc. Finally, a summary of the new model is made.The innovations of this paper are summarized into two points. Firstly, the concept of composite model peer-to-peer trust model is proposed, which can satisfy the equality requirement among trust fields in the large-scale distribution systems. With the help of the model's great feasibility and scalability, individual CA or trust field, which want to join or withdraw from the infrastructure, only need to add a path agent (PA) module. Secondly, the idea that the implement of policies should be combined with the construction of trust paths and be independent with advertising of trust paths is proposed. With this idea, the systems conformed to composite model peer-to-peer trust model can support more complex policies without...
Keywords/Search Tags:Public Key Infrastructure (PKI), Certification Authority (CA), Trust Model, Path Agent (PA), Digital Certificate
PDF Full Text Request
Related items