Font Size: a A A

The Research Of Information Security Technology In The Integration Of Telecommunication Network, Cable TV Network And The Internet

Posted on:2011-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y ShenFull Text:PDF
GTID:2178330332463210Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The integration of three networks shows telecommunication network,broadcasting network and the internet gradually integrating into the unity information and communication network in the world. Integration is the trend of communication development.In the process of development, information security has become one of the most urgent problem to solve. Therefore,it is necessary to research security technology and policy for the integration of three networks.And make information transmitted in the network is confidential by the use of digital encryption, that is the basic methods of essential to achieve information security.In the article,there is the basic principle and objective of network information security in the integration. Analyzing the basic situation of information security and existing safeguards in the telecommunications network, the internet and the broadcasting network. Basing on studying and mastering methods for the analysis of information security and information security technology. Totally discussing information security issues and protection technology in the isolated environment among the computer networks, cable television and telecommunications networks.By analyzing the problem of information security in the integration. Showing appropriate information security measures and coping strategies for different security threats to information security. Designing the information encryption and decryption software based on RSA encryption using Java programming language. Through analyzing the RSA public key encryption algorithm,the simulation achieves the whole process of encryption and decryption for the information.The test result shows that the information security threats in the integration is serious.More effective protections should be used to protect the information in the integration environment. The result of software simulation shows that the design of RSA public key encryption algorithm program is feasible, being able to complete the whole process of encryption and decryption.
Keywords/Search Tags:The Integration of three networks, Network security, Asymmetry cryptography, RSA algorithm
PDF Full Text Request
Related items