Font Size: a A A

The Research And Design Of WTLS

Posted on:2011-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:H Z LiuFull Text:PDF
GTID:2178360305450885Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
With the wireless network wide applications in various fields and the continuous development of open wireless network, many industry applications faced all kides of wireless communication networks threats, people was worried about the security to put forth the new security needs. As the industry standard for wireless applications, WAP protocol security can be boiled down to the study of WTLS protocol security.The Internet World Wide Web architecture provides a flexible and powerful programming model, The WAP programming model is the WWW programming model with a few enhancements,This paper describe two models of the architecture of WAP, WTLS protocol play a importent roles in the wireless network security. WTLS Protocol Specification and by calculation of its encryption, in particular its core protocol HP process and message structure of the in-depth analysis, six security threats have been found.Because anonymity is conflict of authentication, this paper defects WTLS protocol designed three similar i-WTLS key exchange protocol, to meet the different aspects of anonymous or authenticated security requirements. Through these three i-WTLS key exchange protocol security and performance, by analyzing, i-WTLS protocol generally better than the traditional WTLS protocol. Entity authentication based on the new design i-WTLS key exchange protocol, this paper establishes the corresponding strand space model, entity authentication i-WTLS key exchange protocol in secrecy and authentication of evidence. Main results are summarized as follows:(1) through a detailed analysis of WTLS protocol specification, combined with previous studies, summarized WTLS protocol faced six security threats, and pointed out that the root of WTLS security problems.(2) aim at the WTLS security threats, designed three i-WTLS key exchange protocol, in which two-way anonymous i-WTLS key exchange protocol is used for anonymous needs, entity authentication i-WTLS key exchange protocol requirements for certification, while the one-way anonymous i-WTLS key exchange protocol is a combination of both for the user anonymous and server authentication requirements. Through the three i-WTLS protocol security and performance analysis results in a modest increase in computing cost of the premise, the new design of the i-WTLS key exchange protocol has perfect forward security and unknown keys that can withstand attacks.(3) entity authentication i-WTLS key exchange protocol as an example, the establishment of the i-WTLS protocol strand space model, the strand space method i-WTLS protocol of secrecy and authentication for a formal proof.
Keywords/Search Tags:WAP, WTLS, handshake protocol, strand space
PDF Full Text Request
Related items