Font Size: a A A

The Encrypted Tansformation System Based On Mobile Agent Technology

Posted on:2007-10-21Degree:MasterType:Thesis
Country:ChinaCandidate:B YuFull Text:PDF
GTID:2178360185973465Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
It is very important for user to provide a secure and reliable communication channel. Currently, encrpytion tachniques is applied to encrypt data, which makes it impossible for invalid user to see the data, so that it can be safely transport in network. There are two methods ,symmetrical encryption and dissymmetrical encryption, in modern encryption system. The former's keys appled to encrypt and decrypt can be same or deduced each other. But nor does the latter's. In dissymmetrical encryption system, the encrypted key is public,but the decrypted key is private.The encrypted data can only be decrypted correspond to the match key. Encryption arithmatic usually is open, so the security of encrypted data mainly depend on that of key. This means how to save and distribute keys play a very important role to data transportation in network. Thus, it is necessary for both to introduce the third believable party to provide the service saving and distributing keys. But meanwhile it also add the network load and transportation cost. Our research hopes to discover a solution to make secure transportation of the data in network easier and more converient.Mobile agent technique originally derives from artificial intelligence (AI). The key properties of mobile agents are autonomy , intelligence and mobility. Because of these characters, mobile agent is more adaptive than other techniques in distributed system, .when more and more mobile equipment visit network, especially in internet.In order to add operation reliable and reduce network load, mobile agent technique will be a good choice in distribution system.In this thesis, a summary about mobile agent is introduced, including mobile agent's characteristic, the differences between mobile agent and other distributed techniques, and develop system and language used to mobile agent, etc. Then, we give a presentation about a tool used develop mobile agent—IBM Aglet, such as how to install and configure, and its' basic elements. Lastly, We used the IBM aglet mobile agent system to implement a data-encrtyped transportation system, adopted master-slaver pattern. In this system, the slaver agent with encrypted key was produced and dispatched to the remote machine to access some data by the master agent.When it finished its' task ,the slaver will transport the result back.And the master receive and decrypt it in decrypted key. Because only encrypted key and data were transported in network in the whole process, if attacker acquire them , he can not decrypt them.. Moreover, without introducing the third reliable party , network load is reduced .transportation cost is decreased and work efficiency is added.
Keywords/Search Tags:Mobile agent, Distributed Computing Paradigms, AI, Encryption, KDC
PDF Full Text Request
Related items