Font Size: a A A

Research On Data Transmission Security Based On SM Cryptographic Algorithms

Posted on:2024-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:B B PangFull Text:PDF
GTID:2568306941468714Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Nowadays,large enterprises are actively promoting digital transformation and informatization construction.Many companies have completed the deployment of data centers and data links in their headquarters and branches.Information and data have become increasingly important assets for enterprises.In this context,the guarantee of data credibility has become an urgent research topic.This dissertation considers the longitudinal data link between two levels of data,analyzes the threats faced by the trusted transmission of the data link and the trusted standards to be met,and designs a scheme to ensure the trusted transmission of the data link based on the characteristics of the longitudinal data link transmission.In the face of various threats to trusted data link transmission,this article divides trusted data transmission into trusted data link transmission scenarios and trusted data access scenarios.In the data link trusted transmission scenario,it is mainly necessary to ensure the credibility of data during data link transmission,while in the data middle station trusted access scenario,it is necessary to ensure the credibility of mutual authentication between data middle stations.The trusted authentication of the data center is an important prerequisite and guarantee for the reliable transmission of data links.Aiming at the data link trusted transmission scenario,this dissertation designs a data link trusted transmission scheme using the state secret algorithm.According to the characteristics of domestic cryptographic algorithms,this scheme uses SM4 algorithm as a data encryption algorithm,SM2 algorithm as a key encryption algorithm,and combines SM2 digital signature algorithm and SM3 cryptographic hash algorithm to effectively ensure the reliability of data link transmission.This dissertation proposes a trusted identity authentication scheme for trusted access scenarios in data centers.This scheme innovatively applies interactions between agents to identity authentication scenarios.Based on the interaction history between agents,hypothesis testing methods are used to determine whether the identity of the other party is legitimate.Because it is difficult to model the decision-making model of an agent from limited observations of its behavior,the credibility of the scheme can be fully guaranteed.On the premise of successful authentication,the scheme can also complete the key negotiation process based on this interaction history,and can provide a trusted way for data link trusted transmission schemes to distribute public keys.Experimental analysis shows that the authentication accuracy,anti attack,and timeliness of this scheme have achieved good results.
Keywords/Search Tags:SM Cryptographic Algorithms, Data link, Trusted Transmission, Trusted Authentication
PDF Full Text Request
Related items