Font Size: a A A

Design Of Network Security System Based On USB Security Key

Posted on:2007-10-13Degree:MasterType:Thesis
Country:ChinaCandidate:X B ZhengFull Text:PDF
GTID:2178360182460733Subject:Detection Technology and Automation
Abstract/Summary:PDF Full Text Request
The share and transmission of information conveniences our lives, but the risk and unsureness of business increase enormously at the same time, so the information security has already become the main problem to design the Electronic Commerce system, and also is a choke point in the development of Electronic Commerce. A thought of network security system based on USB security key is brought up in this paper to meet the requirement of Electronic Commerce, which adopts USB security key on the foundation of referencing the Kerberos authentication protocol to solve the pivotal question in Electronic Commerce—ID Authentication, and combines IDEA private-key cryptosystem with RSA public-key cryptosystem to realize Digital Signature.Kerboeros authentication scheme is factual industrial standard of the identity authentication protocol in the computer network. But it has some hidden trouble in security when applied to Electronic Commerce. Accordingly a Kerberos authentication scheme based on USB Security Key is brought forward to finish ID Authentication, which utilizes the hardware encryption capability of USB Security Key to identify users's ID and adopts IDEA algorithm to encrypt data. In the process of designing of Digital Signature, Hash function is introduced to create message digest, IDEA algorithm is used to encrypt the open file, and RSA algorithm is adopted to encrypt IDEA key and message digest. So the reliability of Digital Signature is improved efficiently. After analyzing issues that affect IDEA algorithm and RSA algorithm rate, a effective way is proposed to speed up operation. Specially the research on RSA algorithm, parallel idea penetrates into its basic algorithm including modular addition, modular multiply, modular inverse and modular power. Big numbers operation will take time, especially modular inverse operation and modular power operation for big numbers. In order to obtain high encode/decode rate, these basic algorithms are deeply optimized. So the processing speed and efficiency of RSA algorithm are improved a lot in application.The structure design method and program realization method got from the research and design on ID Authentication, Digital Signature and encryption algorithm can be a practical guide to design the network security system, and can be applied widely to solve the network security problem in Electronic Commerce.
Keywords/Search Tags:USB Security Key, ID Authentication, IDEA, RSA, Digital Signature
PDF Full Text Request
Related items