Font Size: a A A

Applied Research For Authentication Based On PKI In The Field Of E-government

Posted on:2009-08-15Degree:MasterType:Thesis
Country:ChinaCandidate:X J JiangFull Text:PDF
GTID:2178360245985754Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, build ing E-government has already become a hotspot in our governmentinformation construction, but the information system security of E-government becomes aproblem. As the first threshold for the safety system, the identity authentication technology hasbecome an important task of the E-government Security. It makes the most important functionin this safety field .Nowadays, informatization of business system is the key targets of Xinjia ng autonomousregion. It is an inevitable trend that implementing the digital ma nagement for enterprises withnew information and network technologies can realize interactive work between the businesssystem and enterprises. There appears a new method for annual inspection by network. It canbring benefits, improve efficiency and cost savings . However, it also brings some security risks.For example, identity forgery, information stealing, information juggle and so on. Thetraditiona l and simple authentication which based on one-way is not safe enough. It has beenalready no longer able to keep up with the security requirement, that the enterprises wouldverify the identity of the web server. Furthermore, it is so dangerous that the data is transmittedas pla intext through the network. So, aiming at this problem, this paper designs a safe identityauthentication system.The ma in work is researching PKI and the information security technology, anddevelop ing an identity authentication system based on PKI which is widely used in the field ofnetwork information security. This system ma inly takes PKI as the design foundation and takesthe X.509 as the standards. This system takes RSA public key cryptographic system as themathematica l model and takes SSL as the correspondence standards. The system uses LDAP tostore and ma nage the certifica tes and keys. This system not only solves the problem thatpassword is broken, but also solves the problem that password is intercepted when transmittingin the traditiona l authentication way. Furthermore, there is a safety channel between Browser and Web server, and the information that through the channel will be transferred to beciphertext. So, the defects of important information in the traditiona l way can be canceled. Atlast, this paper analyzes and researches the potentia l problems about the applica tion.
Keywords/Search Tags:PKI, Authentication, Digital certifica te, SSL principle, E-government
PDF Full Text Request
Related items