Font Size: a A A

The Research And Application Of The Military Information Network's Security

Posted on:2009-08-16Degree:MasterType:Thesis
Country:ChinaCandidate:P J XuFull Text:PDF
GTID:2178360272971817Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Information combat, the most important maneuver in the modern war, affects each domain and space of the war. With the progress of the computer technique, various attack techniques targeted at information system emerges endlessly. How to assure information security is the current hot point of researching. In fact, information security is more than a technique problem, much more, it's a strategy problem. We must unified infrastructure of the information security and increased research of the information security technique, which provides evidence for the construction of application information system and achieves synchronized development of information security and military informatization. Therefore, this paper makes researches in four parts.The first part introduces the concept of information system security and the importance of information security.The second part analyses the threat that compromises the tactics Internet. Adopting the method described together by campaign architecture, system architecture and technique architecture, it designs the security architecture model of military information system according to architecture of information system security, combining with special requirements of military information system. Then we put forward the information security settled project of the tactics Internet and integrate security technique, law, management to resolve security problem of the application information system.In the third part, we choose encryption subsystem to make further research and establish a new system model in many subsystem of the tactics Internet information security. The model synthesizes advantages of various encryption frameworks, meet the demand of privacy, integrity, identification and anti-deny in one communication process, and achieve good balance between high security and high efficiency.The fourth part firstly selects encryption algorithm in the encryption system model and analyzes the security of system roundly. It realizes encryption system model by programming with the develop tools VB6.0 and obtains good actual effects.
Keywords/Search Tags:information security, computer network, cryptographic technique, symmetry encrypt technique, asymmetry encrypt technique
PDF Full Text Request
Related items