Font Size: a A A

Research And Implementation Of Key Technologies In Military Signature System

Posted on:2014-10-21Degree:MasterType:Thesis
Country:ChinaCandidate:Z H LuoFull Text:PDF
GTID:2268330392472178Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the constant changes in the situation of both at home and abroad, themilitary struggle preparation of China has stepped into the assault fortified positions inrecent years. As the main carrier of the confidential information, military message flowsystem is playing a more important role in the domain of military informationconstruction so that it has direct concern with the safe transportation of the confidentialinformation.Based on the cryptography theory and the related technology, this paper analyzesthe operation situation, the application scope and the problems existed of the militarymessage flow system in details. At the same time, for the existing electronic signaturesystems store both the public keys and the private keys in local, the key management isa serious problem and there is a single model in identity authentication. To solve theseproblems referred to, the main tasks of this paper are list below:①Applying the third party server to store the key information, aiming at solvingthe problem of key management and reducing the possibility of secret divulging.②Taking advantage of the Diffie-Hellman key exchange protocol based onElliptic Curve Cod(eECC)to produce session key, and applying the fingerprint identityauthentication to compare the Fingerprint Character Cod(eFCC)to implement one-wayidentity authentication from server to client.③Embedding the fingerprint character code and the signature information withwatermark into the signature image, by means of extracting the fingerprint textureinformation and computing the fingerprint character code, and enhancing the safety ofthe documents transportation.Based on the system functions and the performance requirement targets, thispaper deeply analyzes the key problems of the military signature system, and discusessthe key technologies to implement system, that includes: the elliptic curvecryptosystem, advanced encryption system(AES), fingerprint matching based on thetexture analysis, digital watermarking, middleware technology and so on. This paperstudies on how to integrate these technologies mentioned to a signature system,designs a new and safe signature system model coupling with the military messageflow system, and describes the work principle and the function module of the system.At last, this paper combines the ActiveX and the Word to achieve the data from the documents and store the signature information in the Microsoft Word. During thedevelopment, this paper implements the functions of identity authentication, signatureimage manufacturer, official documents signature and the signature confirmation,based on the Visual C++6.0platform.The experiments show that the system put forward is a practical electronicsignature system, which has the advantage of simpler and safer key managementcompared to that of the traditional system based on the PKI/CA architecture.
Keywords/Search Tags:Electronic Signature, Fingerprint Identification, Digital Watermarking, Fingerprint Character Code, Diffie-Hellman protocol
PDF Full Text Request
Related items