Font Size: a A A

Tls Protocol Analysis Software

Posted on:2002-09-21Degree:MasterType:Thesis
Country:ChinaCandidate:Q XiaFull Text:PDF
GTID:2208360032953715Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Information security is an inevitably problem of network application. Under modem network environment network is used more and more widely, so this problem is becoming more immence. Security of information can be obtained by means of two essencial technologies: encryption and authentication. In real network application environment, these technologies must be combined to integral secure transport protocol to impliment data encryption and authentication. itS protocol is such a typical secure transport protocol which has the upper functions. The functions of TLS protocol include user authentication, data secrecy and integrity. By exchanging shakehand datagrams, client and server negotiate encryption and signing algorithms and keys for encryption and user authentication. This topic includes the following content: 1. The detailed content of itS protocol, including encoding methods, datagram format running process and cipher suites defined by the protocol. 2. Definition of states and state machine. 3. An object oriented analyze and design of itS and an implementation frame based on event driving. 4. Some mathematical principles and international standards of public key algorithms used in the protocol such as RSA, DSA and DH.
Keywords/Search Tags:TLS, security, encryption
PDF Full Text Request
Related items