Font Size: a A A

Research On Cipher Algorithm Remote Soft-loading System

Posted on:2006-02-24Degree:MasterType:Thesis
Country:ChinaCandidate:Z ZhaoFull Text:PDF
GTID:2178360182460484Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology, the application of network becomes wider and wider. Especially, as a result of the appearance of the wide-band network, the capacity and speed of network transportation reaches a higher stage. Today, the modern military information system has already been developed into an integrated system which is based on cumptuer and cryptogram technology, aggregates information encryption, security authentication, crypto management online, and the usage of synthetical network communication and information technology. Nowadays, however, crypto algorithmic loading and replacing is still taken to the old method of local loading which is secure but inefficient. Facing to the fast growth of the network communication technology, the research on algorithm soft-loading on network has great value in terms of both theoretical exploration and practical application. This paper will study this technology concerned, and provides a feasible solution.Cipher algorithm which is the key part of ciper system, belongs to highly sensitive information and is the security basis of the military information system. Due to the globalisation, opening and dynamic characters of internet, algorithm passing on network has some potential weaknesses. This paper concerns the designation of the soft-loading system which can realize remote loading algorithm through internet in a secure way. It also provides a solution on encryption, identification and integrality between two computers located in different physical areas. Meanwhile, the solution can prevent unapproved users from robbing, imitating and destroying data through network security weaknesses, and assure the security of communication connection and data transportation.As far as the macro-viewpoint is concerned, this paper explores and describes the framework of cipher algorithm remote soft-loading system as a whole. On the other hand, it provides a designation and implementation of a special and safe protocol— Soft-loading protocol, SLP in short, which efficiently complete remote loading algorithm passing through internet. In short terms, the paper focuses on the following areas: 1, The general summarization of the security threats embeded in internet in recent years, andthe introduction of the essential technologies and solutions.2,As far as the main security threats are concerned, the paper creates the framework of cipher algorithm remote soft-loading system which consists of five modules: identity authentication, digital signature, transfers protection, soft-loading and algorithm validation.3,On the basis of the summization of security characters and the rules of designation of security protocol, the paper designs and realizes special Soft-loading protocol so as to safely and effectively accomplish loading algorithm. Then the paper provides a solution on how to use Petri net to describe and verify SLP.4, The realization of the simulation of SLP protocol.
Keywords/Search Tags:Information security, Cipher algorithm, Soft-loading, SLP, Petri net
PDF Full Text Request
Related items