Font Size: a A A

The Application Research Of Data Encryption Technology In Network Security

Posted on:2008-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:J X SongFull Text:PDF
GTID:2178360215969563Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of global information and the popularization of Internet, the security of computer network has become the focus of concern gradually. A network in which data was transmitted should promise the data's confidentiality, authentication, identity and anti-negation. The only valid way to solve these problems is modern cryptology. Thus this paper has introduced modern cryptology in details, and introduced elliptic curve cryptology especially. For identity authentication is the gateway of a secure network system, to keep password from detecting and transmission leaking, the information security expert bring forward the technology of One-time Password Authentication. As an application of data encryption technology in network security, combined with Elliptic-curve cryptology, this paper proposed a new improved One-time Password Authentication Scheme on the base of modern cryptology.To embody the superiority of this scheme, first of all this paper describe the classic one-time password authentication scheme that is S/KEY authentication scheme, then point out the security flaws. Thus, based on the Challenge/Response system and depended on the safe one-way Hash function, the scheme was designed, which can be applied in the network environment effectively. Because of the mutual conversation key was produced by making use of ECC, the security requirement of channel in which the key is transmitted was decreased; in every authentication process, by using different communicating key to increase the security. This scheme can implement the two-way identity authentication; the spending of server was cut down by producing a random data in custom.This scheme conquered the flaws of traditional Challenge/Response system, protected the custom's ID information effectively and can avoid some common attack means such as replay attack, mini number attack, imitate attack etc.The innovation in this paper is using ECC key exchange mechanism to produce the mutual key and in every authentication process using different key to encrypt the transmitted data, thus a new one-time password authentication design was proposed and carried out. This scheme has an excellent performance and a dramatically increased security.
Keywords/Search Tags:Data encryption, One-time password, ID authentication
PDF Full Text Request
Related items