Font Size: a A A

The Research And Application Of Signature Technology

Posted on:2007-04-30Degree:MasterType:Thesis
Country:ChinaCandidate:C JiaFull Text:PDF
GTID:2178360215495261Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the information technology, especially with the quick popularization of the Internet technology, people can acquire much information through the network, while how to confirm the reliability of the information. Especially the problem concerning the economy sides, such as commercial activities, how to avoid the loss owing to the transaction side's disavowal, further more, while going to do some official tasks, people maybe hope not to be imitated. Facing these troubles, people often ask how to solve them. In this paper, the main task is to try to solve some problems through using digital signature technology.This paper includes the content as follows.Firstly, it discusses the foundation of cryptography. Cryptography is divided into two main parts: symmetric cryptography and public-key encryption scheme. It analyzes and discusses their conception, principle, advantage and disadvantage respectively.Secondly, it analyzes and compares among several normal signature schemes, including MD5, RSA and DSS etc. Then it analyzes digital signature's application in the actual world. The content includes email, e-commerce and remote communication and so on.Lastly, It puts forward and fulfills the secret hash digital signature algorithm according to the advantage and disadvantage of symmetric algorithm, public-key algorithm and one-way hash function. This algorithm makes use of the principle of RSA public-key algorithm, MD5 one-way hash function and permutation code at the same time. It constructs a signature scheme that can quickly realize the data security and data signature.
Keywords/Search Tags:RSA, permutation code, digital signature, secret hash digital signature
PDF Full Text Request
Related items