Font Size: a A A

Research On Remote Identity Authentication Based On CPK

Posted on:2020-06-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y R ChenFull Text:PDF
GTID:2428330572985655Subject:Engineering
Abstract/Summary:PDF Full Text Request
In the current information society,remote office has become a new way of working,due to the high cost of establishing a dedicated physical network,the current remote office is more inclined to establish information channels based on wifi.Although the security of wifi has been improved rather than before,all kinds of illegal mobile terminals can invade and forge the identity of legitimate users to upload viruses,conduct unauthorized access and other operations.In order to achieve this goal,after analyzed the Radius?VPN?SSL and other access methods,this paper tend to compare some of strengths and weaknesses.Taking full account of the remote office environment,combining with the existing terminal authentication and access control technology and other basic knowledge,a scheme based on CPK(Combined Public Key)authentication is proposed to improve the security of the whole remote office project.In this paper,CPK is taken as the research object,secure user access is taken as the entry point,elliptic curve digital signature algorithm(ECDSA)and role access control are taken as the main line,and relevant research and implementation are carried out in combination with system development and design and functional test.Firstly,after researching and reviewing the relevant data,the paper summarizes the main problems of remote office.Secondly,the relevant basic knowledge and theories involved are sorted out to provide knowledge support for the paper.Then,the existing problems in identity authentication based on elliptic curve digital signature algorithm are summarized,an improved scheme of CPK digital signature is proposed to solve the problem of login time consuming and forgery attack in the process of terminal and server identity authentication.Lastly,aiming at the problem of unauthorized access to illegal terminals,this paper proposes a scheme combining CPK and role access control,and analyzes the advantages and detailed design process of the scheme.Based on the above research,Java is used to develop this system,along with the CPK algorithm,the application system for remote office security access is developed on the B/S development platform,and the client software and server software of the system are developed respectively.The system realizes the management of roles,user groups,identity authentication and other functions through CPK key,at the same time,the system can resistforgery attack and shorten the authentication time in the process of client and server authentication,access permissions for different visitors are also set based on the role-based access control model.Lastly,the test results prove that the system can meet the remote office environment requirements and achieve the expected goals of the program.
Keywords/Search Tags:combined public key, identity authentication, CPK Key, Elliptic curve digital signature, role access control
PDF Full Text Request
Related items