Font Size: a A A

Design And Realization Of CA Based On PKI

Posted on:2006-03-08Degree:MasterType:Thesis
Country:ChinaCandidate:F ZhengFull Text:PDF
GTID:2168360152495097Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of Internet and Intranet techology such as the e-mail,e-commerce, online bank and the resource releasing.We have to communicate with unidentified identity entity in the network. To provide security service of confidentiality, integrity, authentication and non-repudiation for the internet application.Through the research for many years,We have formed a set of Internet security solutions - PKI technology (Public Key Infrastructure ) which have been adopted extensively at present.PKI technology adopt certificate manage public key, through the third party organization which can be believed - CA(Certificate Authority) bundle users' public key and users' other identification information (such as name, E-mail, ID card number ect ) . Through CA organization, the problem of the key distribute and key management have been better solved. With the digital certificate, realizing encryption and authentication to the data transmission, guaranting the confidentiality, authentication, integrity and non-repudiation of the information transmission.Through study on relevant theories and technology of PKI, designing and realizing a PKI system with better security, commonability and expansibility. The system can produce certificate according X.509 criterion, manage certificate, produce and manage the key , offering PKI service for user. This system have characteristics such as simplified structure ,easy using and ect.This paper introduce the theory of PKI and system's structure in detail, and discussing relevant technology of PKI thoroughly . On this basis , the paper analyse function module of PKI system in detail and discusse the realization technology of CA, RA, certificate management.In the end, We discribe the design and realization of the CA, Summarizing the paper and looking into the further distance of research into the system...
Keywords/Search Tags:network security, public key infrastructure, Certificate Authority, certificate, key
PDF Full Text Request
Related items