Font Size: a A A

Safty Authentication In Trusted Environment Based On Network Computing

Posted on:2012-06-06Degree:MasterType:Thesis
Country:ChinaCandidate:D W GuFull Text:PDF
GTID:2248330374980963Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology, information security is requiredurgently with high standards. Traditional information security measures are installed firewall,intrusion detection and intrusion prevention on servicer. But the vast majority of computerintrusion attacks are launched from the terminal computer in the computer information systemmade of the terminal computer, communication network and servicers. Since the terminalcomputer is the source of insecurity, the security of network is ensured from the terminalcomputers.Authentication is used to guarantee the certainty of terminal computer. In the trustedcomputing network, the terminal computer can safely access the network with remoteauthentication in the protection of their privacy and not being leaked. This paper proposes anew remote anonymous authentication design based on combination of public keycryptosystem on analysis of trusted computing in the shortcomings of existing remoteauthentication scheme. It can ensure the security of information from the terminal computersecurity. This paper contributes the followings:(1) Depth analysis of the trusted computing platform architecture and working principleof remote anonymous authentication scheme problems.(2) Based on trusted computing environment, a new remote security certificationprogram, and the program described in detail.(3) Analyze the functions of new remote anonymous authentication. This newcertification program is based on the combined public key algorithm, with session security,user anonymity, non-repudiation, anti-replay attacks and so on. The certification scheme isreasonable, efficient, and possessed a broad application prospects.
Keywords/Search Tags:Authentication, Combined Public Key, Trusted computing, Network security
PDF Full Text Request
Related items