Font Size: a A A

Design And Application Of Data Encryption In GSM Communication

Posted on:2009-11-07Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2178360245469852Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Information security has been the focus of communication technology research direction. And it is now popularized gradually from the military and the secrets to the civilian application. In this paper I select GSM wireless mobile communications network that is currently the most widely used in China as a research object. From its both digital communication channels which contain Short Message Service and GPRS, I utilize all the mature symmetric and asymmetric encryption algorithm, and design secure and authenticated all-purpose transmission protocol, then develop some typical applications.There are some emphases in this paper: First, focus on analysis and use of theoretically secure algorithm, and as far as possible to prevent any possible attacks; Second, consider information security that is not only from the secret data, but also all-sided authentication which contains anti-tampering, anti-counterfeiting and anti-denying; Third, study how to communicate securely in the limited environment, including restrictions of transmission capacity and speed.In this paper, one of my own development emphases is writing transplantable large integer computation algorithm that is important in non-symmetric encryption and signature algorithm by myself. And give my own opinion on analyzing and selecting encryption algorithm and encryption mode. The other one is an attempt to design a common and extensible light safe communication protocol, including digital certificate and encryption information format design. At last, with this common protocal, I design several typical applications which are secure peer-to-peer Short Message, secure data backup, secure electronic signatures and secure electronic payment, and give a few concrete solutions.This paper also provides important reference value for other secure applications or design of secure protocol in other channels.
Keywords/Search Tags:data encryption, data signature, GSM network, secure communication protocol
PDF Full Text Request
Related items