Font Size: a A A

Study Of Network Security Transfer Programs And Algorithms

Posted on:2009-12-17Degree:MasterType:Thesis
Country:ChinaCandidate:T T TangFull Text:PDF
GTID:2208360275983876Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of computer networks, network security has attracted more and more attention from researchers. Thus it is nessary to build up a secure transport platform in Internet. At the same time, the increasing security events in the network are heavily destroying the network performance so it is urgent to develop the security data transmission scheme.This thesis works over some elementary theory and practice methods about the security transmission technology, and talks about the widly used algorithms such as RSA, DES, SHA and ECDSA. The thesis does some improvements on these algorithms and carries out a network security transmission scheme based on the algorithms. It can overcome the conflict between cost and efficiency in the traditional methods of secure transmission processing.The thesis focuses on Public Key frame. The Ellipse Curve Public Key System is used to implements the message signature, and the RSA Public Key System is used to complete the key transfer process. On the same time, the thesis resolved the problems on efficiency. The DES is used to encrype the message and the SHA is used to get the Hash value of the message. It does a lot of researches on the RSA, DES and ECDSA and does some improvements and experiments on these algorithms.The system designed by author combines the Public Key System and the none Public Key Systems together. It supports authentication, data security, data integrality, secure transmission and digital signature. It has greate running efficiency and reliability. The network security transmission system provides a use for reference for network secure transmission model and can be consulted for various large-scale special network and application system.
Keywords/Search Tags:Ellipse Curve Public Key System, RSA Public Key System, DES, SHA
PDF Full Text Request
Related items