Font Size: a A A

Authentication And Key Management Based On Cpk

Posted on:2011-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:J K CuiFull Text:PDF
GTID:2198330338989564Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of network and computer, as people commonly use on the network, there is a high demand for building of a trusted and secure network. Currently, people could do many things just like daily work business, communication, trade and other behaviors through the network. In these acts, how to solve the authentication problem is the basis of all behaviors. There is no trust if identification issue is not resolved on the network.The authentication system is establishing trust system of proof system for e-commerce, e-government network activities. Authentication system's core is to set up effective and reasonable signature mechanism. But realization of signature mechanism also relies on reasonable secret key control. This article aims at the two main topics of authentication system that to solve: large-scale secret keys production and secret keys distribution that based on identification. It is doing study for the CPK technology of basing on elliptic curve which has China proprietary intellectual property rights.The CPK technology of basing on ECC is the new technology of Chinese independent researching. It developed fast in resent years. This technology mainly through elliptic curve cryptography's relevant operation generate the secret keys matrix and then through using the image on secret keys matrix of user identification to get the corresponding user secret keys. CPK technology solves many difficult problems in authentication system research at present: large-scale secret keys production, secret keys distribution that based on identification, off-line authentication, and cross-domain authentication and so on. This article firstly introduces the development and current situation of authentication system. And it introduces ECC technology and current most general PKI authentication system relation technologies at the same time.Then, it does the in-depth research to aim at authentication technology and secret keys management technique of CPK. It designed and realized CPK secret keys large-scale generation technology based on ECC, and it gave a management system structure model of secret keys. It also gave the process of off-line authentication and cross-domain authentication at the same time.Finally, comparative analysis with the PKI technology, describes the CPK in terms of performance and safety of the advantages.This topic root in"Eleven Five"State 863 project: preventing distort electron secret classification identification technology research (topic number 2007AA01Z458).
Keywords/Search Tags:Public Key Infrastructure, Elliptic curve cryptography, CPK, authentication System, Key management
PDF Full Text Request
Related items