Font Size: a A A

Network Security .. Net Environment To Achieve Transmission

Posted on:2005-09-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhengFull Text:PDF
GTID:2208360125957347Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
This paper work over some elementary theory and practise method about the encrypt of network transfer. In this paper, also talk about the public key algorithm and symmetry algorithm.The nonpatent Blowfish algorithm and its realization is emphases of this paper. On a base of gave out an brief introduction of many encrpytion techniques,this paper have accomplished a simple data transporting security channel.The author choosed Microsoft .Net Framwork as his programming environment because the .Net platform offers series of very important and powerful programming technologies and containes a wide class libraries, which could enhance the programming efficiency distinctly.In this paper, the author built up a simple certificate center in order to simulate Kerberos certificate service. And the Kerberos protocol was reformed in following functions: improved the ciphertext arithmetic in protocol dialogue period, and choosed RSA, an open ciphertext key arithmetic instead of DES, the symmetry ciphertext arithmetic used in Kerberos certificate service. The certificate center could manage and identify the users' status, produce and dispense the ciphertext key used in the data transportation between clients and corresponding servers.When the clients start to communicates with servers, the clients should pass the status identification firstly, then get a ticket contained status and protocol dialogue ciphertext key from the certificate center. The clients shows its legal status to servers and transmit the protocol dialogue ciphertext key to servers through using the ticket. Thereafter, all data transmission between clients and servers were encrypted or disencrypted through using the unique protocol dialogue ciphertext key. Furthermore, the Socket programming and multithreading application for achieving the security data transmission through network in .Net environment were also described respectively in this paper.Although the author detailed introduce and practise the theory on how to identify the status of data transfers, how to manage the dialogue ciphertext key and how to promise the security of own data through using encrpytion tachniques in public open Internet, when the administrators would like to build up an enough secure network system, they must consider all factorsgenerally because the technology involved in networks data security transfers is much more wide and complex than the above mentioned in this paper.
Keywords/Search Tags:transporting security, encryption, key, authentication
PDF Full Text Request
Related items