Font Size: a A A

The Research Of Data Security And Integrity In Network Communication

Posted on:2011-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:H XieFull Text:PDF
GTID:2178360308969346Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With computer and network technology developing rapidly, the network becomes indispensable to the daily life. It brings us not only the tremendous convenience but also the computer and network security problems. Although the issues of network security have affected the information confidentiality and integrity of the communication network severely, the development of cryptography addressing security issues paves the way for security-critical applications. These cryptographic algorithms, such as RSA, the public key algorithm, hash algorithms, are basic to the security problems. And kinds of network security issues can be resolved using the various security protocols.In order to maintain information confidentiality and integrity of network communication, research on RSA, which is the most widely used public key encryption algorithm, and MD5 hash algorithm that is the most representative authentication technology. After discuss the intrinsic characteristics of RSA, loopholes and network attack, this article brings up better security solutions. Meanwhile, with discussing the collision problem of MD5 and the hash function of the applications, analyze the potential security problems and the vulnerability of the encrypted short message.After resolve parts of security issues on these two algorithms and study symmetric key algorithms, design the solution to the security problems of network communication, which adopts digital signature technology to protect information confidentiality and integrity. Moreover, it is necessary to address the performance of encryption in the network communication. Through performance analysis of the public key encryption algorithm and the hash algorithm, the improved encryption algorithm is presented.Then design a simulation system that complaints to the basic framework, which simulates every step of the execution of the system with security services. The basic target of the system is achieved that is accessed by testing and analysis. However, there are also some problems need to be resolved in the on-going research.
Keywords/Search Tags:Confidentiality, Integrity, Public Key Algorithm, Hash Algorithm, Digital Signature, Certification
PDF Full Text Request
Related items