Font Size: a A A

Design And Implementation Of The ISA Security Communication Algorithm For ICS Playing System

Posted on:2014-11-05Degree:MasterType:Thesis
Country:ChinaCandidate:L JiangFull Text:PDF
GTID:2268330422463477Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
New generation red-ray high definition disk player (NVD) is high definition video playback machine researched and developed by China as a response to global high definition market rapid development,products use of high-definition blue-ray are expensive and slow sales in market and continue to use blue-ray will also be enslaved to foreign patent technology. It has49core patent.Internet certification playing system (ICS) is a new playing mode using of NVD player connecting to network.User will put red-ray disk into player then player remote connect to servers in network to obtain the ICS key and complete playing disk.As it work in network mode, security threats of network environment make security communication particularly important.Thus, this paper presents the task of ISA security communication algorithm in the ICS playing system.ISA security communication algorithm is designed by the analysis of system’s architecture, security threats and security communication targets and completed by designing the system’s main communication processes,making it has safety functions of bidirectional certification, channel encryption and information’s integrity.Based on the communication algorithm’s design, some main modules have been achieved, including encryption and decryption modules, identity certification module, data processing module and communication module, and the ICS key encryption and decryption modules on certification server and player terminal.The realization of ISA security communication algorithm add the security services of bidirectional certifications, channel encryption, data security and integrity for the playing system.Tests on ISA security communication algorithm show that it can complete the desired security communication goals, realization identity certification,channel encryption and under the concurrent situations it can be completed in a reasonable period of time to deal with users’needs, so it has achieved the design requirements.
Keywords/Search Tags:Playing system, Security communication, Communication algorithm, Identitycertification, Channel encryption
PDF Full Text Request
Related items