Font Size: a A A

A Security Risk Analysis Method Based On Certificate Authority System

Posted on:2010-12-21Degree:MasterType:Thesis
Country:ChinaCandidate:A L ZhangFull Text:PDF
GTID:2178360278465636Subject:Cryptography
Abstract/Summary:PDF Full Text Request
In modern times, PIG has been recognized as one of the most effective tools for providing security of dynamic networks, which makes the use of CA more and more popular. Information security risk assessment is one of the most important methods to enhance the security of information systems and to reduce security risk, otherwise, it's the prerequisite and basis for developing security information systems. The research of CA systems security risk detection methods is of great significance to improve the security of CA systems, to reduce risk events, and to protect the national security and people's property.First, this paper introduces the risk assessment and CA systems theoretical foundation, as well as the research status at home and abroad. As a combination of this knowledge, it put forward the framework of CA system security risk assessment.Second, this paper focuses on two parts of the detection framework. First, some special parts are the main research units. As one of the kernel functions of CA systems, the management of the certificates, as well as the conservation of the certificates, is the detection emphasis. This paper realizes the detection of certificates through several methods. Otherwise, secret key management, the safety of data transfer as well as the safety of the system management are also the key point of this paper. Protocols used in CA systems, as another key point of this paper, it makes a detailed discussion, the establishment of a complete detection system, the code realization and the use on CA systems.Based on the characteristic of CA systems, combining with the theoretical foundation of risk assessment, this paper put forwards a new method of CA system security risk detection, given the detection in the general steps to release and related measures, the state regulatory agencies in the implementation of our own CA system management provide a reference for policy.
Keywords/Search Tags:CA, risk assessment, PKI, certificate, secret key
PDF Full Text Request
Related items