Font Size: a A A

Key Management For Multicast Communication Of MAS

Posted on:2011-06-27Degree:MasterType:Thesis
Country:ChinaCandidate:L L ZhouFull Text:PDF
GTID:2178360308961052Subject:Information security
Abstract/Summary:PDF Full Text Request
MAS, Moblie Agent Server, which is provided by China Mobile to meet group clients's need for high-degree information technology, allows corporate customers to satisfy their needs for information like mobile office, production control and marketing services through their mobile terminals. MAS system is mainly intended for large corporations, such as the banks. And it is always the corpotations'internal data passing through the MAS system. However, the existing MAS system does not provide any security service in all of its applications but the Push Mail service. Therefore, it is very important to do some research on the security technology of MAS system.End-to-end encryption communication is a high-level security function of MAS system. End-to-end encryption addresses the security concerns by encrypting the data within the transmitting terminal and only decrypting it within the receiving terminal(s). The plaintext is never exposed within the infrastructure. In fact, the infrastructure contains no mechanism to recover the plaintext that even the system administrator could do nothing to acquire it. It fits the needs of those who regard their transmissions as particularly sensitive or have special security policy.The main purpose of this paper is to study the key techniques of the end-to-end encryption communication of MAS, solve the security requirements of MAS users, and implement an end-to-end encryption module of MAS key management system.The main achievements of this paper are: 1. A new key management mechanism for group communication is provided in this paper. It dramatically improves the key management performance of the system by slightly increasingthe key storage space of the terminal.2. An end-to-end encryption module of MAS key management system is designed and realized in this paper with the functions of key generation, key storage, key management and key destruction.3. In this paper, the possible security problems of and the potential attacks on the Key Management System are analyzed in detail and the corresponding solutions partially based on some mature mechanisms are provided, which greatly improve the security of the encryption key management system module.
Keywords/Search Tags:MAS, end-to-end encryption, group communication, logic key tree, key management system
PDF Full Text Request
Related items