Font Size: a A A

Based On The Rsa Anonymous Two-way Authentication System Design And Realization

Posted on:2009-06-30Degree:MasterType:Thesis
Country:ChinaCandidate:H FanFull Text:PDF
GTID:2208360245978926Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The theory of public key infrastructure has solved a lot of problems such as information encryption, key exchange, digital signature and anonymously bidirectional authentication in the realm of information security. Now, it has extensively implemented in the business. However, because of the existence of certificate authority, it doesn't suit to implement in an environment, which is easily invaded and destroyed. In order to a more extensive application environment, the paper provides an anonymously and bidirectional authentication system project based on RSA, which is acentric and adaptive.The main contents of my paper lie as follows.Firstly, the paper is based on the theory of PKI. It synchronizes the (t, n) threshold theory based on Lagrange Polynomial, compressed bloom filters, and distributed method of generation of RSA parameter. By analyzing the generation strategy and the security of signature in detail, it provides an anonymously and bidirectional authentication project. Besides of inheriting all benefits of PKI, the project is also acentric, adaptive, optimist in authentication and traceable.Secondly, the paper designs a set of interact protocols from system initialization, running and re-composition, which solves the DoS attack in the period of authenticating certificate, avoids the problem of statistics analysis owe to using same fake name and certificate in a long time, and finishes the traceable method of exchanging fake name and certificate and distributed management of certificate.Thirdly, in order to improve the security in re-composition of the system more and avoid the true resolution from being juggled, the paper provides a strategy which can guarantee the true resolution being issued in the range of certain probability.Lastly, the paper implements an ante type system program. By testing the program, it confirms the security and reliability of the project.
Keywords/Search Tags:RSA, distributed, threshold theory, anonymously bidirectional certification, self-adaptation
PDF Full Text Request
Related items