Font Size: a A A

Research And Implementation Of Key Agreement Protocol For Embedded Terminal

Posted on:2016-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:L J LuFull Text:PDF
GTID:2308330470971208Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the advent of mobile internet era, growing popularity of 3g and even 4g network environment and the widespread use of intelligent terminal such as cell phone and PDA, wireless network bandwidth and stability will be greatly improved.Performance and function of intelligent terminal is now comparable to pc. Meanwhile its communicationfunction, portability, mobility and easy to operate makes it become a prominent precondition for implement of enterprise mobile application. Mobile application is gradually extend from consumer area to enterprise end. Limitations of working in fixed workplace, network and facilities in pc era is become obvious, there’s a strong demand for mobile application to no matter enterprise administrators, business manager or strategy decision-makers.Mobile access is refer to mobile terminal (pad, smart-phone, wireless meter) connecting to security gateway through specific wireless network and to access enterprise networks and business applications. In the condition of considerable network bandwidth and variant regional stability, it’s very important to work out a key agreement for security access which also accord with actual network environment.This study is on the basis of state grid security access platform which for embeddedterminalvoltageacquisition system, it analyzeddisadvantages of mainstream security access platform which base on OpenVPN in practical application, it also compared functions of RSA encryption mechanism with EllipticCurveCryptosystem. It implements SM2 algorithm and improved SM3 algorithm via commercial algorithm code which published by bureau of national cipher. Based on EllipticCurveCryptosystem’s commercial encryption algorithm SM2,SM3, this paper works out a key agreement which suit for actual deployment environment of state grid embedded mobile terminal system in boundary access.
Keywords/Search Tags:Secure Access, Mobile Terminal, Domestic Commercial Cipher, Boundary Access, Key Agreement Protocol
PDF Full Text Request
Related items