Font Size: a A A

The Research Of SSL Security Strategy Applying In The IP Communications

Posted on:2007-08-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y N LiFull Text:PDF
GTID:2178360212467749Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With VoIP technology continuing popularity in the global telecommunications market,It's highly attractive thing for the service providers, equipment manufacturers and end-users to improved performance, cost reduction and functional support for VoIP .As the growing interest of VoIP, voice communications security may develop into a key requirement for VoIP solutions.In the past 20 years, the development of information technology was marvelous, more and more valuable information which is in the digital form is stored in computers or other digital information storage equipment. At the same time, information-sharing technology has obtained tremendous breakthrough. Represented the development of the Internet, within a short period of time, it was from a special networks of the U.S. military developing to a enormous information networks which is connecting hundreds of thousands of people in the whole world.As the development of information digitization and computer application, it is inevitable that the data and other information stored in computer should be protected, especially in the case of sharing system entering though the pubic networks. This kind of demand appears especially urgently. At present, the technology for these demand are anti-virus technology and firewall technology etc. Some literature named this technology of protection data and prevention of the illegal data accessing as the computer security or the system security technology.This article studies the knowledge and the concept of cryptology correlation, symmetrical encryption and RSA key encryption, also discripts the SSL working principle, the recording level seal handshake agreement, the key derives the process as well as the conversation restores the technology all is the SSL constituent. Moreover, emphatically analyzes SSL handshake agreement and each part of securities and the anti- attack capability of SSL agreement, and in detail elaborated the SSL agreement as the foundation security IP communications system design proposal, the realization method. Finally, detailed analysed the performance and the secure of this system.
Keywords/Search Tags:SSL, RSA, Message digest, Digital signature
PDF Full Text Request
Related items