Font Size: a A A

Key Decentralized Management System

Posted on:2013-12-19Degree:MasterType:Thesis
Country:ChinaCandidate:A D ZhangFull Text:PDF
GTID:2248330395974496Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the information age which computers are widely used, information by itself istime and wealth. How to protect the security of information is an urgent need toresolve the problem to the information management department. Password is aneffective and feasible way to protect information security, effective means thatpassword can make the information not be illegal to steal, not be tampered ordestroyed, feasible means that the cost it needs to pay is acceptable.Combined with the existing key management technology, development of relatedtechnologies and the actual situation of key management, this paper first introduced theoverview of cryptography, highlighted the key sharing technology, analyzed sometypical key management scheme and explored its performance. This paper introducedthe MD5encryption algorithm and used it to develop a password generation systemruns in C++environment. Explored random number generator algorithm andanalyzed its feasibility and safety. This paper studied key management theory, divide amaster key into a number of sub-key, give them to number of people for separatemanagement, when some people input the correct sub-key, the system will generate amaster key by an algorithm, then the system will compare the master key with theexisting key, only when two keys are identical users can enter the system. This willensure that no one can enter the system alone, only in two or two above users can enterthe system, reduce opportunities for unauthorized access or modify the system’sinternal data. This makes the security and confidentiality of the system’s internal datahas been great improvement in the level, strengthened the security of the system,manage the key more effectively and greatly reduced the possibility of the systemunder attack.This project combine with enterprise integrated transaction platform, provide aguarantee for a more standardized operation for site parity and bid evaluation, furtherenhances the level of enterprise information management.
Keywords/Search Tags:technology of sharing keys, (k,n) threshold plan, MD5, random number
PDF Full Text Request
Related items