Font Size: a A A

Production Enterprises Control Network Remote Access Security Schemes

Posted on:2015-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:H X QiFull Text:PDF
GTID:2298330467971068Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the continuous development and progress of society, more and moremultinational enterprises show regional trends. Emergence and the rapid developmentof the Internet, and the pace acceleration of information technology make the remotecontrol technology is widely used in various m production enterprises. The security ofremote access control network in various production companies becomes particularimportant. For security requirements of production enterprise control network remoteaccess,security scheme of production enterprise control network remote access arestudied. The MD5algorithm and elliptic curve cryptography used in security schemeare optimized to ensure greater security in remote access via network。 the mainresearch work:1.The background and significance of this topic are analyzed, the current remotecontrol technology, the primary means of network attacks and common encryptionalgorithm have a detailed elaboration, the control network remote access securityresearch scheme is presented for the current user’s security requirements.2. The MD5algorithm and elliptic curve cryptosystem are used in networksecurity scheme. The MD5algorithm work principle is explored, the main attackmeans and security analysis are elaborated. The basic mathematic theoretical basis ofelliptic curves is discussed, definition of elliptic curve, and definitions and basicarithmetic of elliptic curves are described.Then encryption and decryption datatransmission process used elliptic curve cryptosystem mades a presentation, ellipticcurve cryptosystem work principle is described Through this process.3.The optimized MD5algorithm is applied to the user authentication. The mainadvantage is that the user login password is added additional string of characters andnumbers, and then the replacement the location. The plaintext is encrypted with theMD5algorithm, a piece of cipher text is random intercepted, and the equal length datareplaces it using the random function.4.The optimized elliptic curve cryptosystem is applied to encrypt datatransmission.Point addition operation and point multiplication operation are narrated.Because of the point multiplication operation speed determines the speed of executionof elliptic curve cryptosystem, based on the analysis of NAF algorithm and window algorithm, low storage optimized NAF algorithm is proposed. The improved algorithmreduces memory consumption and improves the efficiency of execution.
Keywords/Search Tags:remote control, point multiplication, MD5algorithm, Elliptic curvecryptosystem, user authentication, data encryption
PDF Full Text Request
Related items