Font Size: a A A

The Research Key Management Protocol For Mobile E-commerce Encryption Algorithm

Posted on:2010-08-27Degree:MasterType:Thesis
Country:ChinaCandidate:G ChenFull Text:PDF
GTID:2198330338982186Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the information of the development of Internet technology as a new type of e-business models, mobile e-commerce has begun to have a wide range of practical applications. Its business activities in the application of mobile communications technology for mobile terminals identity, the nature of the existence of mobile e-commerce and the general have different e-commerce security. In a mobile e-commerce solutions, you should use a reliable and efficient encryption algorithm security key management protocol.In this study, e-commerce system for mobile communication security in mobile commerce based on the key management protocol and its encryption algorithm. Business environment for mobile key exchange and key agreement protocol research, pointed out that the security protocol in the mobile e-commerce the need for key management agreement, understanding, security focus and essence of the agreement; typical management agreement for some of the encryption algorithm structural analysis, and implementation of the principle, as well as an analysis and summary, analysis of their strengths and weaknesses.In this paper, a mobile e-commerce to build a conceptual model of environment, that is, MobNet key management system. Specific environmental requirements in accordance with the agreement, respectively, based on symmetric key and asymmetric key encryption, designed two MobNet system Key Management Protocol. Both agreements can be an effective solution to customers, merchants, banks and other communications between the reliability of authentication for mobile e-commerce in the actual environment. MobNet Key Management Protocol in accordance with the model used in the management agreement and the Diffie-Hellman key-key encryption algorithm RSA key comparative analysis MobNet system in the two agreements in the encryption algorithm. Design of two types of encryption algorithms, including the establishment of key, key distribution, key delivery, the control keys to achieve MobNet Key Management Protocol in the encryption algorithm.Designed to carry out a series of security protocol verification, Formal Verification statements are based on technical analysis and validation process of the agreement, the establishment of model agreements proposition. By attacking the test, and all aspects of overhead compared to a clear response to the impact of security protocols of a variety of performance factors, the results show that the encryption algorithm, so that key in the update at the same time does not affect the calculation of the interruption of group communication, the realization of key The non-blocking update process to improve the business environment in the actual movement of the security of key management and efficiency.
Keywords/Search Tags:Mobile e-commerce, Key Management Protocol, encryption algorithm
PDF Full Text Request
Related items