Font Size: a A A

Hash Algorithm Based Research On Authentication Protocols

Posted on:2006-11-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y R LinFull Text:PDF
GTID:2178360182456486Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the long term application of network technology in business, government, finance and military fields, more and more attention has been paid to the secuirty of information exchange. Plenty of research work has been done in information security field, and many types of security models or schemes are proposed. However, in all security technologies, certification on the identity of communicators is the precondition of any reliable communication. Thus, certification is an important issue in information security field.This thesis mainly concerns about certification related issues, giving some introduction and analyzation on several well known certification protocols. A method of generating secure message digest is proposed, which provides better integrality on data. Additionally, by Applying the method above into certification protocols to make them immune from various attacks, the signifficant enhacne in security of those protocols could be seen.The content of this thesis is as follows:1. An introduction on the theory of data encryption is given, which is the basis of certification.2. Presentation about several well known certification protocal is given, and profound analyzations from security aspect are made.3. A method of generating secure message digest is proposed, which provides better integrality on data.4. Buy Applying the method above into certification protocols to make them immune from various attacks, the signifficant enhacne in security of those protocols could be seen.
Keywords/Search Tags:authentication protocols, hash algorithm, SHA
PDF Full Text Request
Related items