Font Size: a A A

The Research Of Signature Chains Based On RSA And The Achievement In The Kerberos System

Posted on:2006-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:B SunFull Text:PDF
GTID:2178360185459889Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The world today has entered into an era with blooming of new technologies. The accelerated development of network technology may be witnessed by the many internet-based application systems employed in a wide range of industries. While WEB service has become one of the most popular applications on the internet, the security and reliability of WEB service remains a challenge that needs to be addressed, as an open system of internet application necessitates safe ID authentication. The spreading of internet technology has been accompanied by increasing security problems and diversified network attacks. Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.This paper is to give a detailed description of security requirements at different levels of network system, after an overall analysis of traditional security structure of network. Based on an review of current ID authentication approaches and popularly applied OPT technologies, a new OPT approach based on RSA signature chains is to be proposed. Comparisons will be made between S/Key OPT and the proposed RSA-signature-Chains based OPT. It is to be argued that the application of RSA-signature-chains based OPT in Kerberos ID authentication may effectively improve the safety of authentication system. The RSA-signature-chains based OPT will then be applied in Jiangsu Education Door Station to replace the username and password based ID authentication approach. This paper is to conclude by arguing that the revised ID verifying system will effectively improve the security of...
Keywords/Search Tags:network safety, ID authenticate, OTP, digital signature, Kerberos
PDF Full Text Request
Related items