Font Size: a A A

The Design And Realization Of Digital Signature Algorithm For Security Middle Ware

Posted on:2007-07-24Degree:MasterType:Thesis
Country:ChinaCandidate:H P ChenFull Text:PDF
GTID:2178360182496252Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the development of contemporary communication technology and itsrapid popularization, the computer internet composed of data communication andcomputer technology has gone deep into each area of the social production andpeople's life, and has brought active influence profoundly. However, the securityproblem of network and information is also increasingly outstanding and thissituation is complex more and more. Assuring the security of computer internet hasturned to be the social focus problem which is concerned by earthling and the popresearch domain of computer science.The research of SMW (Security Middle Ware) is a main branch of computersecurity domain, and has became the pop problem studied by people progressively.The SMW combines information security techniques and middle ware techniquesto analyze the common security service requests in various application systems. Itseparates from the whole system, provides the corresponding security serviceinterface, and turns to be the universal loose coupling software, to resolve theproblem of the software's high expense, poor usability and poor interoperability inthe information security domain. On the one hand, SMW needs to shield thedifference brought by various technology platforms and heterogeneousenvironments;on the other hand, it should provide all sorts of protecting functiones,so we must consider the problem of system's running stability and efficiency.However, it doesn't reach an agreement on the algorithm selection and the way toimplement these functions to suit the SMW, through which can embody the meritsof SMW better and resolve the problem of running stability and efficiency.Based on this practical situation, by analyzing current SMW technology andcontemporary research status, this paper choose the SMW's function of digitalsignature as pivotal research object. By analyzing the existing relatively maturedigital signature technology, the author discover that applying these algorithms toSMW is more or less problematic, so it seems more important and necessary toseek a kind of digital signature algorithm which is applicable for the SMW torealize the digital signature technique.This paper firstly introduces the SMW's developing status, then analyzes therelatively mature architecture of SMW in detail. This architecture is conditional tomatch the digital signature algorithm. After analyzing the current digital signaturetechniques which are relatively mature and frequently used, especially theELGamal digital signature algorithm, the author find out that all those algorithmsare inadequately secure, high time-consuming, or even unsuitable to the SMWarchitecture. Applying the existing digital signature algorithms to SMW directly torealize the digital signature function couldn't embody the SMW's merits. Therefore,this paper imposes Hase Function and Self-certified Public Key to improve thedigital signature algorithm named ELGamal, and form a new one namedSMWDSA.The digital signature technique realized by using SMWDSA algorithm couldadapt to the SMW architecture better, embody the merit brought by the SMW'scharacter that it could shield the difference among various technique platform,enhance the SMW's efficiency and acquire stable performance. All these characterscause the SMW to work more flexibly and conveniently, achieve stronger functionsand broader adaptability.In order to realize the digital signature function of the SMW, this paper hasmainly accomplished the following works:(1). Analyze the relatively mature digital signature algorithms which werefrequently used, summarize the merits and defects of them, and find out theproblems of applying these algorithms to SMW among the realization of the digitalsignature function.(2). Aiming at the character that these frequently used digital signaturealgorithms are weak to Substitution Attack and Homeostasis Attack, the authorperforms the hase transformation on the message before signature. After analyzingthe Hase Function's mechanism, the author using the method proposed byJ.Seberry to construct the Hase Round Function which meets the characters ofbalance, high nonlinearity, strict avalanche and easiness of realization. Moreovermake use of the Hase Round Function to contrive the new hase algorithm namedDSHA.(3). Aiming at the character that these frequently used digital signaturealgorithms are weak to Active Attack and impersonation attack, the author usingthe Self-certified Public Key method and Hase Alogarithm DSHA proposed byGirault to advance and realize a kind of new digital signature algorithm SMWDSAwhich is similar to ELGamal.(4). Achieve the digital signature algorithm SMWDSA using C#.NETprogram language.(5). Analyze the SMWDSA digital signature algorithm systematically fromthe two aspects of security and time-complexity. The analytic results indicate thatthe new algorithm has enough secure intensity and lesser time-complexity.
Keywords/Search Tags:Realization
PDF Full Text Request
Related items