Font Size: a A A

Design And Implementation Of Digital Certificate Parsing And Issuing Software

Posted on:2009-07-03Degree:MasterType:Thesis
Country:ChinaCandidate:J H ChenFull Text:PDF
GTID:2178360275471336Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The most comprehensive and effective solution to information security in the distributed and opening network at present is public key infrastructure. The key of it is public key certificate. The key implementation of public key infrastructure is certificate authority. Due to the problem existing in easy-using, security, using scope and intellectual property rights and the export restriction to China for security product, it is very necessary to design and implementation a reliable and easy-using digital certificate analyzing and issuing tool. This paper is devoted to the research of security, transparency, expansibility and other purpose about digital certificate when designing and implementating the system. We can get the version, serial number, algorithm identifier, issuer, validity,subject, subject public key information, extension and signature after analyzing the certificate according to ASN.1, which convert the abstract data to the visual entity. After analyzing the certificate, using the Hash algorithm and RSA decrypting, we can verify the certificate. After get the user data, using the Hash algorithm and RSA encrypting, we can issue a certificate to a user, who use it as ID card.Digital certificate analyzing and issuing software is divided into certificate analyzing, certificate issuing and certificate verifying. The certificate is first issued. In order to make sure the information in a certificate is correct, we can analyze the every part of a certificate. At last, in order to make sure the data in a certificate is not modified, we can verify it.Digital certificate analyzing and issuing software is focusing on easy using, security, extension, reliable. In order to satisfy the above requirement, the system deeply analyze the every part of certificate .Theory and data analyzing is very detailed and deeply. In the future, we need more effort on the analyzing of the extensions and OID. we also need more research on the security, transparence, the using of extension and other using about certificate.
Keywords/Search Tags:Public Key Infrastructure, X.509 Certificate, Signature Arithmetic, Cipher Technology, Information Security
PDF Full Text Request
Related items