Font Size: a A A

Research On The Model Of Intrusion Tolerance System And The CA Scheme Based On Threshold

Posted on:2007-03-19Degree:MasterType:Thesis
Country:ChinaCandidate:B Y LiFull Text:PDF
GTID:2178360185466959Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Intrusion Tolerance Technology is the core of the third security proposed by the USA. Intrusion Tolerance has a kind of ability with positive defenses. Intrusion Tolerance can accomplish the function to maintain integrality, confidentiality and usability of key information and service in the whole system, when some parts of the system protected are attacked.This paper introduces the fundamental theory of the Intrusion Tolerance Technology—Byzantium Protocol, which to be based on an application model is proposed for Intrusion Tolerance System. In practice, Intrusion Tolerance System can protect CA. The system is able to keep the confidentiality of the secret keys for CA by handing out the secret keys to different parts and guaranteeing that any of the on-line parts could not resume the secret keys. In this paper, Intrusion Tolerance solutions for CA are deeply researched and compared on the ground of two different Threshold technologies. In the summary, the paper concludes the result of comparing two solutions. The result states that Intrusion Tolerance solution for CA based on Threshold ECC is prior to that based on Threshold RSA in the perspective of the security and efficiency.
Keywords/Search Tags:Intrusion Tolerance, RSA, ECC, CA
PDF Full Text Request
Related items