Font Size: a A A

Research And Design Of Military Email Transferring System

Posted on:2006-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:K F WeiFull Text:PDF
GTID:2178360182977298Subject:Computer technology
Abstract/Summary:PDF Full Text Request
As an information exchanging tool, email was paid attention since its debut for its convenience,economy,efficiency and currency. However the security is a big concern while transferring military confident information within automatilized network of commanding and integrated service information network of the army that only have comparatively low level security.Currently, the army is developping military network based OA project with effort among which military email transferring system is an essential application module. This paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. It discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model,mail exchange protocol and application requirement of cryptogram management. Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate-based identity authentication and digital signature, etc.This system is consisted of two sub-systems:center of certificate mangement and client based military email transferring component, proposing two methods namely "two-level encryption" and "certification carrying" to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. It uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no-denying of email tranfer, which forms a complete military email transferring system. This system provides support for group sending of military emails belonging to the same security domain as well as point to point transfer. It also supports functions such as distribution,refreshment and recovery of keys.This system can be applied to transfer of military email within automatilized commanding network and integrated service information network of the army as well as transmit classified military sensitive information with specific secret level.
Keywords/Search Tags:email security, security service, key management, certificate management
PDF Full Text Request
Related items