Font Size: a A A

System-specific Authentication Technology To Achieve

Posted on:2003-01-21Degree:MasterType:Thesis
Country:ChinaCandidate:J D TangFull Text:PDF
GTID:2208360092471241Subject:Radio Physics
Abstract/Summary:PDF Full Text Request
Since human civilization,man wish to protect sensitive information.In inforl11ationera,institution and indivual more and more depend on computer system and net to storeinformation and intercource information. PKI (Public Key infrastructure),based on public keyencrpytion techniques,provide comprehensive secutity service.for computer system and net. Thekey to PKl system is numeric certificate management (generate, distribute, validate, remove etc).Celtificate is data incIude user identity information,user pubIic key and digest signature ofcertificate authority. Parsing certificate is anthetication to a user and process of gettinginformation. Research and developing PKI certificate discriminator make us Iucubrate PKI andstandard algorithm in cryptography so it is significance both in theory and practice. In this paper,we use embed system to parse certificate, surround the PKI standard algorithms. Chapter 2analyse cryptography technique using in PKI system. We Emphase on symmetricalgorithm,public-key a1gorithm and digest signature theory and standards Besides we presentsthe identity authentication theory and technique. Chapter 3 anaIyse certificate, includingcertificate systeIn --PKI, certificate standard--X.509, PKCS. At last we analyse certificateenveloping standard PKCSl2 advanced by RSA Corp. This structure is adapted worldwide byPKl system. In chapter 4,we make system design for discriminator and hardware system design.At first we divide the system to hardware system and software system. In hardware system, weuse a processor ARCA-l made in our country. AIl other peripherals systems are circumfLsing tbeprocess. In chapter 5,we design tl1e sofrware system. In the chapter we discuss t11e systemstandard cryptographic algorithm and fast lookup mothed using hash tab1e. AIso we analyse.parsing process completely. We publish the testing result of the system.. At the end of the paperwe gives the summary of this paper.
Keywords/Search Tags:Anthentication, Certificate Anthentication, Information Security
PDF Full Text Request
Related items