Font Size: a A A

E-government Information Security Authentication Technology Research And Design

Posted on:2010-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2208360275491577Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the continuous informationization of global economy and social development,e-government has become the critical factor to weigh the informationization level of the society,administration and service capability of government,even the comprehensive national strength.The development of e-government is a process to fully apply advanced information technology and vigorously promote government' s affairs to be done from traditional and manufactured to computer-based and automated. However,during the process,security problem has become one of the major factors to cumber the development.Cryptography is the core technique in the field of information security which has been playing an important role in the e-government nowadays.Identity authentication is one of the basic applications of cryptography techniques.Owing to the difficulty and complexity of cryptography system,to comprehensively,deeply and accurately understand and master the cryptography technique applied in e-government system,especially the identity authentication techniques,is of great importance.In this thesis,we generally introduce the information security techniques used in e-government(especially cryptography techniques), focus on the field of identity authentication.We summarize first the application and development of information security and identity authentication in e-government system,then analyze the mainstream identity authentication techniques.On this basis,we re-examine,review and deeply probe into the famous Cramer-Damgard Identity Authentication Protocol,point out some security problems in implementation,put forward new security properties for identity authentication protocol running concurrently on Internet.Then,we design and prove a new catagory of identification scheme satisfying the proposed security property.What we mentioned above brings benefit and more profound and accurate understanding to the identity authentification protocol especially the identity security of group when it runs currently on the internet,help conduct to more complete and profound apprehension and analysis on the identity authentication's application in e-government security practise, better achieve applications in security of e-government.
Keywords/Search Tags:E-government, Information Security, Cryptography, Identity Authentication, Security Property
PDF Full Text Request
Related items