Font Size: a A A

Design And Realization Of KMS Key Management System

Posted on:2012-04-09Degree:MasterType:Thesis
Country:ChinaCandidate:L H WuFull Text:PDF
GTID:2178330332499541Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The key management system (KMS) is designed to guarantee the safety of a system through technical methods compounded by management instruments. It increases the capabilities of a system to bear the brunt inflicted by external factors, thus making a system less vulnerable to unexpected attacks and react sensitively to possible attacks with corresponding strategies. It is an indispensable component of the general card system (GCS). Because the key management system's reliability has great bearing on the safety of the whole system, it is an important link of the general card designing system to work out a rigorous and reliable key management system.Against the backdrop of the General Card Project, this project realizes a KMS by combining concrete projects in it and has a detailed analysis on the usage of KMS, with focus on the usage of KMS in the GCS.The paper analyzes the safety of smart card and key management based on the analysis of their relevant concepts. From the perspective of the smart card's "one zone one key" theory, corresponding solutions are given, and the rationale is provided to realize key management. Based on these rationales, as well as the thinking of software engineering and the analysis on the system's requirement, a general plan and detailed design of the system, involving general framework, system architecture, partition of functional modules, key structure and the smart card file, are offered, which lays a engineering foundation for the realization of key management system. The realization procedures of two kernel functions, key born and key download, are provided at the end of this paper and the key management system is finally realized.Key management is supplied by technical methods which is the system management tools to protect the security of the system from external attacks as much as possible, and to increase the capacity of the system by dealing the attack that may occur , which is an important component of the campus card system. The key is a string of binary strings, it has meaningful by itself, as a building is locked, as the user's key is to ensure the safety of their creation and storage, and only properly authorized users can use. At present the international community has developed a number of criteria. Such as the International Standards Organization has developed over X.509, the United States in 1993 theory proposed key escrow and the Massachusetts Institute of Technology developed Kerboros agreement. In order to prevent the secret too concentrated, there is an important technology that is secret sharing technology, which is a separate secret technology, ever since this idea was proposed Shamir1979 Since the secret sharing theory and technology to an unprecedented development and application, particularly, people still very concerned about. Since the reliability of key management system threatens the security of the entire system, so design a rigorous key management system is a reliable campus card system design essential.Key management is a key link in the key distribution, there are a lot of key distribution agreements, but its safety analysis is an important issue. At present, many leading universities and companies involved, making this area a hotspot. A variety of effective methods and ideas continue to emerge, in theory, this area is gradually becoming more mature."Smart Card", also known as IC card (Integrated Circuitcard) is a high performance identification card. Its essence is an integrated circuit chip. The difference between it and the general principal is the chip shape. As we often see that, IC card, playing card shape as it is embedded in the integrated circuit made of a plastic film.Using smart card technology vulnerabilities to steal information or direct acts of fraud has never stopped. Especially in tthis society, the use of smart cards unprecedented extensive and people's lives will become more increasingly dependent on them. Once this information leaks, the consequences will be very serious. And the attack against the cards is also growing and decoding technology, we may be necessary to discuss security issues and the corresponding countermeasures. This topic is to card works as the background and key management in the card system as the center of key management in the system model, combined with specific projects to achieve the key management system. Based on the Smart Card Management System of the key, the main purpose is to establish an appropriate campus card system, in the full realization of the card features the premise, from the overall situation of the entire system to maximize the card security and easy management personnel on the card and system management.The related concepts based on this key management and smart card, analyzing its security, smart card from one district to achieve a density point of view, the corresponding solution for the realization of key management system provides a theoretical basis. Based on this theory, according to software engineering, the system requirements, the overall framework of the system, architecture, system, function module, smart card file structure and key areas and making general design and detailed design, in order to make sure that Key Management System to provide engineering basis. Finally, this key generation and key download two core functions of the implementation process, and ultimately the key management system.
Keywords/Search Tags:key management, key distribution, Smart Card, campus card, information security
PDF Full Text Request
Related items