Font Size: a A A

The Design And Implementation Of Key Distributed Storage Scheme Based On Host Security Level

Posted on:2014-08-24Degree:MasterType:Thesis
Country:ChinaCandidate:Q D LiFull Text:PDF
GTID:2268330398482533Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of digital and information society, people have continuously improved the importance awareness of the information security and privacy. As Internet banking, e-shopping, e-mail have quietly integrated into the daily lives of ordinary people. People naturally pay more attention to the information security. The purpose of information encryption is to ensure the confidentiality, integrity, and security of the information. Key management is one of the hardest parts in information encryption. Meanwhile, key security is the core of key management. Therefore, how to effectively ensure the safety of key information security has become an important area of research. In recent years, in order to better protect the security of the key, the key distributed storage has become a trend, which is helpful to improve the security of key. In this paper, considering combining the host security to study key distributed storage optimization scheme. The main research contents are as follows:1. For the key protection methods and processes, key distributed storage is a feasible way. This article based on the common (t, n) threshold secret sharing scheme and the related knowledge of cryptography, through going deep into corresponding number theory and theoretical basis, put forward the idea of distributed storage to improve the security of the key.2. The (t, n) threshold secret sharing scheme based on the polynomial which proposed by Shamir is easy to understand and implement. In order to improve the security of the (t, n) threshold secret sharing scheme, Literature [1-2] proposed corresponding solutions to sub-key unlimited use and anti-fraud. Nevertheless, t/n values’choice affects the security of the (t, n) threshold secret sharing scheme in the actual decision-making. This paper solved the problem caused by the influence (the key, subtle and vague) on the security and ease of use for the t/n value selection through introducing fuzzy multi-attribute decision making. 3. Storing more sub-key on the high security level of the host can improve the security of the key. Host security involves authentication, access control, security audits, intrusion prevention, malicious code injection, resource control, whose safety status changes will directly affect the host security. Therefore, combined with the host security, this paper has given a key distributed storage optimization scheme of sub-key dynamic transfer and storage, solving the problem of the host security influences key safety.4. This article study detailed of some research on the CA private key protection at home and abroad. For the protection of the private key, the more commonly used protection is offline or using the method of the literature [3] mentioned. Nevertheless, But the problems faced by the distribution and management of the private keys are relatively difficult. This article using key distributed storage solutions which based on host security to disperse the CA private key storage, not only solved the complicated problem of CA private key distribution and management, but also effectively improve the security of the CA private key.5. Developing key distributed storage management tools based on host security, which can make key storage management become more easy and convenient to operate.
Keywords/Search Tags:Threshold Scheme, CA, Fuzzy Logic, Host Security, Secret Sharing
PDF Full Text Request
Related items