Font Size: a A A

Research And Design On The Cryptosystem And Protocol Based On USB Security Key

Posted on:2006-10-01Degree:MasterType:Thesis
Country:ChinaCandidate:X Y JiaFull Text:PDF
GTID:2168360155957973Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the development of information technology (IT), especially electronic business, the safety of information transmission via network is becoming a major concern. Basic online security need including data encrypt, figure sign and the identity is verified etc. Data encryption key technology of network, it through is it is it come to information that network transmit to ensure his security to encrypt to go on. In order to realize data encrypt , figure sign with identity USB safe key , authentication of function carrying on systematic research this text The main research of the essay is described briefly as follows. (1) To study the cryptosystem suitable to encrypt data, to implement digital signature and identify authentication on the USB Security key. (2) To study the protocol of the identify authentication and digital signature suitable for USB Security Key, as well as the method to encrypt data. The following main research achievements were obtained from previous studies. (1) Hybrid cryptosystem-----RSA and 3DES suitable for USB Security Key to implement these functions as digital encryption, digital signature and identify authentication was proposed, which featured high safety, easy implementation and easy verification; it is applicable to desktop security, E-business, E-vote, and E-currency. (2) Through the analysis and study of USB security key model, utilizing RSA , 3DES technologies and HASH function constructed with 3DES, new protocols of identity authentication and digital signature were brought up, based on which a safer protocol of authentication and signature was designed.
Keywords/Search Tags:USB Security Key, Cryptosystem, Digital Signature, Algorithm
PDF Full Text Request
Related items