Font Size: a A A

Research And Design Of Military Network Information Security System

Posted on:2005-07-06Degree:MasterType:Thesis
Country:ChinaCandidate:J H LinFull Text:PDF
GTID:2178360182468574Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Information combat, which is the most important maneuver in the modern high-tech war, affects each domain and space of joint warfare. With the progress of the computer technique, various attack techniques targeted at information system emerges endlessly. Revolution in military affairs makes the dependency of campaign resources upon military information system increase gradually. How to assure information security is the current hot point of researching. In fact, information security is more than a technique problem, much more, it's a strategy problem. We must have good top-level design, unified infrastructure of the information security and increased research of the information security technique, which provides evidence for the construction of application information system and achieves synchronized development of information security and military informatization. Therefore, this paper makes researches in four parts according to the method from top-level design to fundamental research.The first part introduces the concept of information system security, history and present status of research in detail and analyses technique characters. Then it analyses security defence techniques corresponding to the network security, data security and system security. Finally it summarizes and analyses development tend of the information attack and defence techniques.The second part firstly introduces the concept of the tactics Internet. Then it analyses the threat that compromises the tactics Internet in five aspects: physical security, radiant security, computer security, communication network security and security management. Adopting the method described together by campaign architecture, system architecture and technique architecture, it designs the security architecture model of military information system according to architecture of informationsystem security, combining with special requirements of military information system. Then we put forward the information security settled project of the tactics Internet and integrate security technique, law, management to resolve security problem of the application information system.In the third part, we choose encryption subsystem with high performance price ratio to make further research and establish a new encryption system model in many subsystem of the tactics Internet information security. The model synthesizes advantages of various encryption frameworks, meet the demand of privacy, integrity, identification and anti- deny in one communication process, and achieve good balance between high security and high efficiency.The fourth part firstly selects encryption algorithm in the encryption system model and analyzes the security of system roundly. It realizes encryption system model by programming with the develop tools VB 6.0 and obtains good actual effects.
Keywords/Search Tags:information security, computer network, cryptographic technique, symmetry encrypt technique, asymmetry encrypt technique
PDF Full Text Request
Related items