Font Size: a A A

Communications Network In Key Escrow Research And Realization

Posted on:2003-06-18Degree:MasterType:Thesis
Country:ChinaCandidate:X R ChenFull Text:PDF
GTID:2208360092970166Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
A Key escrow encryption system is one of the most import issues concerned by cryptography field. Key escrow deals mainly with following problems: under what condition could a law execution department eavesdrop on-line so as to trace the criminals secretly. Another important effect is that when the user key was lost , damaged or can get the key when needed, the system will perform the function of key recovery, offering the needed key or information. Lastly, how to enssure the security and effectiveness is another important issue.A Key escrow encryption system is an encryption system with backup decryption capability that allows authorized persons (users, offices of an organization ,and government officials),under certain prescribed conditions, to decrypt ciphertext with the help of information supplied be one or more trusted parties who hold special data recovery keys. Key escrow can be divided logically into three main components: User Security Components, Key Escrow Components, Data Recovery Components.The article propose the key escrow scheme which can recover the invalid key escrow. The scheme use the blended crypography system which is protect and distribute the session key using public key , meanwhile in communication session key is used with sysmetric algorithm. The scheme has following advantages: (1) Users and management authority generate secret and public key pair colabrately to prevent the under threshold attack.(2) Using threshold scheme to distribute the keys and verify the pieces using RSA. Thus with advantages of two algorithms to prevent the selected encrypted text attack and public module attack. (3)can recover the invalid key escrow. When one key agent lost effectiveness, the other agents and KES cooperately recover the invalid escrow information.(4) The key escrow on the one hand protect the private secrecy, on the other permit the legal eavesdropping. In this theme, two styles of monitoring are provided, one is on-line one time monitoring in the valid period, anthor is permanent off-line monitoring, so that the power monitoring institute is effectively controlled.
Keywords/Search Tags:key escrow, wiretap on-line, threshold scheme, attack
PDF Full Text Request
Related items