Font Size: a A A

Design And Implementation Of Anonymity Security Authentication Protocol

Posted on:2008-10-01Degree:MasterType:Thesis
Country:ChinaCandidate:J Y LiuFull Text:PDF
GTID:2178360215982758Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet, We have an increasing requirment for information security. However, at the same time of using electricity signature to guarantee the security, we are easy to expose our private information. So it emerges increasingly that both guarantee information security and protect personal private information. Anonymity Security Authentication can meet this demand.This article introduces using RSAand Blind Signature to implement Anonymity Security Authentication. The user transforms plain text to blind message and send to the person who is responsible for signature. After he made a signature on the received message, he send back. The user reverses the blind transform to get the signature on the original plain message. Then the user sends it to that person. This methord both guarantees information security and protects personal private information, and make Anonymity Security Authentication come true.This paper describes the following parts:1.Research the current background and requirement of Anonymity Authentication technology, furthermore put forward the design target and research development.2.Research mathmatics theory knowledge about Anonymity Authentication, and some (?)muia, that is the foundation.3.Do a deep research on the basic technology of Encryption, main algorithm, protocol framework, signature operation.4.Through researching about RSA and its algorithm, principle, preferences, and examples. Excellence and disadvantage is analyzed.5.Combined with digitial signature theory, the blind signature concepts is put forward, and analyze the principle, which resolves the problem that identity authentication and protection of individual privacy.6.Based on RSA algorithm and blind signature theory, aiming at the goal and the requirement of the Anonymity Security Authentication Protocol, the implement method of the protocol is established. In addition, I also finished architecture design, and modularizes software function component, designs interface between functions.With the development of network, new method of Anonymity Security Authentication Protocol will be sure for getting a promotion. It will resolve the problem better. It must have a bright future.
Keywords/Search Tags:Network Security, Authentication Technology, Anonymity Authentication, Security Protocol, and Software Implementation
PDF Full Text Request
Related items