Font Size: a A A

Based On The Pki System, Network Security Electronic Key Research And Development

Posted on:2005-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:W Q ZhaoFull Text:PDF
GTID:2208360152467012Subject:Power electronics
Abstract/Summary:PDF Full Text Request
The rapid development of computer network and the far-flung popularization of personal computer make network enter every corner of the world. Network applications such as e-business, searching information brings great help to out life, work and study. But at the same time some problem emerges. Internet is open and interlinked, the information of internet users may be exposed to others by many different ways. It causes that other people make use of the information and you suffer unpredictable loss. Also, the information transmitted by internet can't be regarded as the evidence for user 's act.In order to make the internet user satisfy the need of security, Public Key Infrastructure(PKI) appears in time. As the authentic third party, PKI uses asymmetric cryptosystem, realizes data encryption and identity authentication by using certificates. Asymmetric cryptosystem guarantees security in open internet. PKI can be applied to e-business, e- government affair etc. The certificate including private key is top-secret in PKI. All encryption and authentication are based on this certificate. If the private key leaks, security is verbiage. It is key of PKI that we manage, store and use private key securely. How to download, store and use certificate is the topic of this thesis. Based on the open interface by Certificate Authority, develop Dynamic Link Library for the open interface. Store private key in token, by this way, any use of private key can be only processed inside token.In this thesis, firstly discuss the basis and application of PKI and discuss why select CPU card as the store medium. Analyze how to resolve and put forward design project, and develop the hardware by which to access CPU card. Develop the reusable class by which we can visit electron key. Base on Microsoft CryptoAPI one of the open interfaces by CA, develop Cryptographic Service Provider (CSP) . Develop SDK development bag for electron key user. Then test software module. At last, use electron key in internet by downloading certificate, sending and receiving encrypted email by OutLook.All modules and functions are realized in computer in internet, the result of using electron key validates that electron key meets the need of design.
Keywords/Search Tags:electron key, Public Key Infrastructure(PKI), Certificate Authority(CA), CSP, CPU card
PDF Full Text Request
Related items