Font Size: a A A

Research On The Security Of Data Transmission In EPG System

Posted on:2017-05-04Degree:MasterType:Thesis
Country:ChinaCandidate:X WangFull Text:PDF
GTID:2348330518495356Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of digital television technology in our country,EPG(Electronic Program Guide)system is developed,it has become an indispensable basic business of digital television.Functionally speaking,it's a platform for transmitting messages between TV and users,provides a window of human-computer interaction,for users to operate fast and efficiently,but security issues have become increasingly prominent.At present,there is not a complete set of security mechanisms based on the EPG system,it has a lot of security risks,and one of the biggest security risk is the illegal tampering of data,once the attacker will have a purpose,destructive content on the TV side to play smoothly,will cause extremely bad influence.The subject mainly solves the security problem of illegal tampering with the data of EPG system,design of data transmission security scheme of EPG system based on trigger file monitoring technology and message integrity verification technology.Data integrity detection using the improved SHA-1 algorithm in this paper,to verify the integrity of EPG information.The ultimate goal of the program is to prevent tampering with the EPG information to the set-top box.The main contents are as follows:First,the structure of EPG system is described in this paper,it analyzes security risks in the EPG system,also the security requirement of EPG system is analyzed,and the subject related technologies have been studied.Secondly,program focused on the issue of the use of the core algorithm SHA-1 conducted in-depth research and effective improvement.According to the current SHA-1 algorithm in the collision of the defects,this paper focus on two ways from the compression function and message expansion methods to improve the SHA-1 algorithm,improved SHA-1 algorithm named E-SHA-1.The E-SHA-1 algorithm plays a key role in the research of this project.Next,a brief introduction to the three preliminary program is presented,we analyze their advantages and disadvantages.There by,based on the E-SHA-1 algorithm,this paper detailed design a program of the EPG data transmission system security protection.The design and implementation of the program decomposition into EPG file preprocessing system;Design and implementation of EPG file monitoring system;Design and implementation of EPG file integrity checking system.The division of each function module and the design of the key interface in the implementation process are described in detail.Finally,the project scheme and E-SHA-1 algorithm are tested.At first,the E-SHA-1 algorithm is tested in six aspects,such as completeness,avalanche effect,strict avalanche effect,anti-collision,message spreading and algorithm efficiency,the test results show that the algorithm has improved the security of the algorithm;Followed by the program of each function module and the overall system test,the test results show that the proposed scheme achieves the desired results,strictly prevent the EPG files from being tampered with the set-top box,the scheme design is complete,which is suitable for the actual EPG system environment.
Keywords/Search Tags:EPG system, File monitor, SHA-1 algorithm, Integrity verification
PDF Full Text Request
Related items