Font Size: a A A

Cryptographic Module Safety Protection Design And Optimization Method Research

Posted on:2013-08-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y GaoFull Text:PDF
GTID:2248330395480569Subject:Systems Engineering
Abstract/Summary:PDF Full Text Request
Cryptographic Module, a ready-to-use product in cryptographic technique, is a basiccomponent in the construction of information system security and an important support forbuilding a secure environment. The safety of cryptographic module is vitally important to thewhole system, thus being the focus of researchers for a long time. The cryptographic modulesafety protection design is the basis for the establishment of cryptographic module safetyprotection capabilities. In the design of cryptographic module safety protection, the principle of“modest safety” should be followed. That is to say, the design shall be adapted to the asset beingprotected and current abilities of attacking methods, so that safety, economy and conveniencecan be achieved correspondingly.The research on the cryptographic module safety protection design, though has attracted dueattention in related fields, has carried little research findings in this area. This thesis conducts aresearch on the cryptographic module safety protection design and corresponding optimizationmethods. It builds up a multi-objective corresponding optimization model and proposes a designcycle for the cryptographic module safety protection. It also optimizes the safety protectiondesign based on the optimization methods of discrete particle swarm. The thesis is made up bythe following parts.1. The construction of the cryptographic module safety protection systemThis thesis analyzes the security threat in the crypto module, thus explores the cryptomodule safety protection elements from the perspective of technology and administration. Itfurther establishes the crypto module safety protection systems based on physical safety,environmental safety and administration safety, and analyzes the ability to secure the protectionsystem.2. The construction of the cryptographic module safety protection design cycleOn the basis of cryptographic module safety protection systems, this thesis, referring to theideas in the information security system safety engineering process, establishes the cryptographicmodule safety protection design cycle by conforming to the crypto module security requirements,the cryptographic module protection requirements, safety protection system structural design,detailed safety design and the cryptographic module safety protection methods.3. The construction of the multi-objective collaborative optimization models ofcryptographic module safety protection.Through the research on the relationship between the safety object, economy object andconvenience object in the multi-objects of crypto module safety protection, this thesis adopts themulti-objective optimization theory and system cooperation theory, establishes a multi-objective optimization model in cryptographic module safety protection and proposes the objectivefunction and relating constraint conditions.4. The proposal of the cryptographic module safety protection optimization designmethodsThe cryptographic module safety protection scheme design concerns a series of safetyprotection measures, between each of which there exists relationship and mutual exclusion. Asthere are multiple safety protection measures, it is relatively difficult to select the best protectionscheme when dealing with its design. Therefore, this thesis adopts the discrete particle swarmoptimization as one of the best choices to tackle this problem. The thesis also establishes themapping between the optimization algorithms and cryptographic module safety protectionoptimization problems. However, in practical application, it is found that the discrete particleswarm optimization is liable to bring about slow rate of convergence and local optimum. In orderto achieve better effects, this thesis further proposes the cryptographic module safety protectionscheme optimization methods based on an improved discrete particle swarm optimizationalgorithm and proves the effectiveness of the method with case studies.
Keywords/Search Tags:Cryptographic Module, Safety Protection, Design Cycle, Optimization, DiscreteParticle Swarm Optimization
PDF Full Text Request
Related items