Font Size: a A A

Design And Implementation Of End To End Encryption Communication Key Management System In Public Mobile Network

Posted on:2014-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:R WangFull Text:PDF
GTID:2248330398972110Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of communication and computer technology and rapid increasement of the number of mobile users, the demand of data service increases in daily communication. This situation makes the types of data service become more diverse and the demand of security more stringent and various types of service providers spring up. The constantly optimize of mobile network and arise of new business make the rapidly developing data service become the mainstream business of public mobile network. However, mobile communication services exposed more and more security issues in its development process. Mobile communication is vulnerable to eavesdropping for its open communication channels, and its network is also vulnerable to be used by unauthorized users. End to end encrypted communication is a good encryption mechanism in public mobile network, it could provide a very good protection of secret communication content. To provide a safe, efficient, and reliable end-to-end encryption communication system, we should study its key management mechanisms. In this paper, I study key management mechanisms of end-to-end encryption communication scheme in mobile communication network and summarize the main advantages and disadvantages of a variety of domestic and foreign-key management mechanism. I analyze the major safety issues in mobile communication network and present a safe, reliable and efficient key management scheme based on the analysis. In this scheme, reliable security keys protect the communication contents between the enterprise server and enterprise users or between corporate users. The Key Management System (KMS) uses special programme to generize, update and group the keys. The user terminal will register to the server regularly. Then registering, the terminal will communicate with the KMS to update the expired keys in terminal. Symmetric algorithms and communication keys strored in the terminal will be used to encrypt or decrypt the SMS/MMS when using client security client program to communicate with server.Finally, I raise the software requirements based on the above theoretical studies. Then I give a detailed interactive process, overall design, detailed design and code implementation of the KMS. At last, I use simulative terminal program to test the KMS.
Keywords/Search Tags:public mobile network, end-to-end encryption, keymanagement, server
PDF Full Text Request
Related items