Font Size: a A A

The Design And Implementation Of Remote Authentication System Based On USB Key

Posted on:2013-04-18Degree:MasterType:Thesis
Country:ChinaCandidate:T WangFull Text:PDF
GTID:2248330374980259Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the computer network technology, the computer plays a moreand more important role in people’s lives and works. Now the e-commerce and e-bank becomepopular and widespread. The network has changed the styles of human being’s lives andpromoted the efficiency of the business, however it also exposes a serious security risk. Inorder to ensure the confidentiality, integrity and non-repudiation of network communications,it’s very important to authenticate the user’s identification information.Public Key Infrastructure (PKI), which is based on the public key encrypting system, is aninfrastructure of the information security service. PKI supports authentication, the integrity ofinformation transmission and storage, the confidentiality of message transmission and storage,and the non-repudiation of operation. The PKI is to simply follow the necessary principle, asdifferent entities can easily use the various services provided by the infrastructure.Certificate Authority (CA) is the key component of PKI. It’s a management institution,which can issue digital certificates to users as well as confirm users’ identities. It bundlesuser’s public key with user’s information, then issues a standard X.509certificate to the user.CA’s main function is to issue and manage digital certificates.USB Key technology uses software and hardware combination to ensure the security ofthe data and calculations. In the authentication applications, USB Key has two main purposes:one is to store digital certificate, which can be used to prevent certificates to be copied so thatthe private key can be safe; the other is to store RSA algorithm, the public key and private keyof certificate, which can be used to encrypt and signature.Through PKI-related theories and technologies, the paper designs and realizes a remoteauthentication system based on USB Key. This system has the following functions: certificaterequest, certificate creating, certificate signature and so forth.In the end, the work for the paper is summarized and a further research is outlooked.
Keywords/Search Tags:PKI, authentication, USB Key, CA system
PDF Full Text Request
Related items