Font Size: a A A

Research And Implementation On CA Based On J2EE

Posted on:2011-03-26Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2178360305950605Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The Internet becomes popular and the Wireless Network is applied broad, based on this, the E-commerce is flourishing, which makes those security problems in electronic commerce more and more important. A key-point is identity authentication. A digital certificate provides an extremely secure and flexible scheme of identity authentication in PKI (Public Key Infrastructure) by certifying the entity's public key.The PKI systerm has bean improved very well,but in our country it just naissanced six years ago.In armed police force,it's more later than the society, and the security application of Digit certificates is far more inadequate,especially that the PKI technicians are much short, so the development of PKI is slowly.Obviously,it is very significance to study a PKI instance, for some patent,commerce and secrecy reasons,this paper chooses EJBCA from Open Source Community as the object to study.Firstly, this paper briefly reviews cryptology foundation, and then learns the PKI foundation, further more; the characteristic of WPKI (wireless PKI) is researched. Point that there is much difference between the wire-service and the wireless-service, but for the CA (Certificate Authentication), it is the basicly same to authentic theory. In the 4th chapter, we go deep into the EJBCA system, and from the service tier to the serial tier, make a detailed analyse to the related technic and the third party software. In the 5th chapter, for the need of WPKI, we study the worldwide research hotspot, elliptic curve cryptography, and analyse 6 arithmetics to make a safe curve, meanwhile design a fast algorithm for the point-multiplication operation.At last, this paper designs and implements a WEJBCA system to service wireless application by making an improvement on EJBCA. In the following, this paper gives details of structure and functions of the WEJBCA system. Indeed, the current WEJBCA is not a perfect system, just a rough implemention, so the further job is to make it a real security system.
Keywords/Search Tags:PKI, ECC, EJBCA, EJB, WEJBCA, WTLS
PDF Full Text Request
Related items