Font Size: a A A

Design And Implementation Of The Internet Security Applicance Based On PKI

Posted on:2007-08-09Degree:MasterType:Thesis
Country:ChinaCandidate:J J ChenFull Text:PDF
GTID:2178360182480580Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the swift development of Internet, economy and society have carried out a huge development. At the same time, Information Security became standing out more and more. How to insure confidentiality, integrity, authenticity and non-repudiation of information has become a predominant task in domain of Network Security, the domain of Information Security is growing up gradually, but, because of the jumping-off point is far behind developed countries, some of the sensitive department of government have to use foreign information security equipments. So, it's significant to design an information security manufacture based on home high-strength arithmetic.At first, this paper introduced some broadly used arithmetic in the world, analyzed the traits of the arithmetic, and based on the differences between symmetrical arithmetic and asymmetric algorithm, discussed the functions of the two kinds of algorithm. In the paper, the definiens, sorts and framework of certificate were introduced, and the purpose of certificate was discussed.I this paper, we researched the function, standard and structure of PKI, discussed the traits of some security protocols in PKI, especially SSL(Secure Socket layer) protocol, after describing some attacks to the protocol, how to use SSL protocol safely was discussed.At the last part of this paper, a security protocol used home USB Key, based on PKI was designed, and an internet security appliance was implemented. In the security appliance, identity validation, security transmission and control of access purview were implemented. In this paper, the flows of the security protocol were introduced, and the main parts of the security appliance: client, access control sever and certificate server were introduced. After discussing some familiar attack against the security appliance, proved that the security protocol has high dependability, and the security appliance has high practicability.
Keywords/Search Tags:Information Security, PKI, Security Protocol, USB Key, Internet Security Appliance
PDF Full Text Request
Related items