Font Size: a A A

The Application Research On Network Security Technique Based On PKI In Army's OA

Posted on:2006-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:X YangFull Text:PDF
GTID:2178360182977304Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The global network and information-based progress is changing people's work and life style constantly. Making use of convenient and high speed network to transfer information has become an important way to decrease cost and promote efficiency. How to transfer information securely in the open network has become hot field for research and application in domestic and in abraod.At present, the widely adopted PKI(Public Key Infrastructure) technologies provide a whole solution for Internet's securities. PKI manages public keys using electronic certificates. It binds user's public key and other identification information (such as name, e-mail and identification number) and verifies user's identify through third-party certificate authorities. The general rule is to encrypt and sign the digital information to be transmitted using digital certificates based on PKI, therefore to guarantee the confidentiality, authenticity, integrality and Non-repudiation in data transmission.The army is being placed in the foreland of new military revolution in the world, and the information war is becoming the main style of the modern war. The information system, the carrier of information transfer and the efficient technique platform to connect each battle unit and main battle factor in the battle system, is the core of the information war. There is not secure and reliable information system, there will not exist integral battle and training. The security of the Army's Office Automation System (AOAS), an important part of the army's information-based construction and a control platform of the integral and cooperative battle in the future,, is very important.In the dissertation, the principle and foundation of digital signature technique, PKI frame were firstly summarized, the development process and main characteristics of Office Automation, the present state and main secuirty problem of our AOAS were then discussed in detail. Digital Signature technique was introduced into the AOAS, the project about PKI and the CA institute and JTJCA certification system model for army were followed. Finally, takeing example for the electronics official document flow in army's office automation, we gave the study, design and implementation on the encryption and digital signature of official document, by which the problem of confidentiality, reliability, integrity and Non-repudiation etc were well solved, thus the securiy in the AOAS was improved obviously.
Keywords/Search Tags:Network security, PKI, digital signature, The Army's Office Automation, official document flowing
PDF Full Text Request
Related items