Font Size: a A A

The Research And Design On Authentication Scheme

Posted on:2008-12-08Degree:MasterType:Thesis
Country:ChinaCandidate:J DengFull Text:PDF
GTID:2178360215999127Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the development of computer network, the computer network has made the resource sharing effectively, but the resource sharing also brings many security problems. Because resource sharing and information security is a pair of contradiction, as the resource sharing develops, the information security problems become obvious day by day. How to guarantee the legal users to get access to data resources and how to protect the resources from hackers' attacks have been the main content of network security. Security mechanism contains some essential factors: authentication, authorization, integrality, non-repudiation and confidentiality. Authentication plays a very important role in security system and it is a basic security service. Other security services all depend on it.This paper'researches focus on X.509 digital certification and Kerberos protocol, and proposes a scheme of authentication of X.509 digital certification based on the elliptic curve cryptosystem. At the same time, the disadvantages of Kerberos protocol are analyzed in detail, and a promoted Kerberos scheme is proposed based on public key cryptosystem. Using the promoted Kerberos protocol, authentication of database cryptosystem is applied. The researches are summarized as follows:1,With the research of X.509 digital certification, an authentication scheme is proposed which is based on X.509 digital certification with the elliptic curve cryptosystem.2,The paper introduces the principle of Kerberos protocol ,and analyzes the advantage of Kerberos protocol potential security in detail. At the same time, the potential problems of Kerberos protocol are analyzed in detail3,Improvement has been made to Kerberos based on public key encryption technique during which random number method is used to replace time stamp technology to prevent replay attack. It abandons the weak points of original protocol. A higher security of identity authentication protocol is designed and the security and adaptability of the whole protocol get further improvement.4,On the base of former research, a new model of user authentication system of database cryptosystem is proposed based on the improved Kerberos protocol and public key encryption system. And the designed practical application of the model is given also, and to apply the user authentication of database encryption system.
Keywords/Search Tags:Information Security, Authentication, Database Cryptosystem, Elliptic curve cryptosystem, X.509 digital certification, Kerberos Protocol
PDF Full Text Request
Related items