Font Size: a A A

Designing And Realizing Of SCA Based On PKI

Posted on:2006-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:F H LiuFull Text:PDF
GTID:2168360155475412Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
To solve the security problem, we must set up a believable institution on the network and this has become the most important problem. After the research of many countries, there has formed a set of scheme-PKI to solve the security problem. PKI is a system providing security service based on public key theories. PKI give us an approach of development and tactics, so we can be sure authentication and Non-Repudiation. PKI technology will become the base of E-commerce and E-government affairs and PKI technology will become the main technology for Network security. Origin of task: information security platform (PKI structure) is fruits that are gained from 863 Plan in China. Our main task is to separate most material and central part of PKI from software or hardware system structure overseas so that it can run by the way of breaking away from foreign host hardware platform and operating system, which can construct trusted calculating environment. Information security platform (PKI structure) has changed the remedying model in information security field in China and has put forward an integrated technology solution, which put another complexion on civil information security field limited and controlled before. Heilongjiang Economic and Trade Commission Information Center and other several companies put forward the application to National Cryptograph Commission for constructing PKI. Now the application has been examined, approved and reported to the head at the same time. The construction will promote the development of information security and network application in Heilongjiang province. Researching on the project will bring a broad market scene for our province, such as network office, declaring dutiable goods and network trade and so on. The content of the task is that we utilize PKI to construct secure CA system. The design ensures that the private keys will not be obtained by the attackers when the CA is attacked and the design will realize the interactivity of the components. The paper first illuminates the technology about PKI/CA. After analyzing the hidden dangers of current CA, we give the designing and the realizing of security CA. Finally, the paper brings forward some deficiencies of the solution and the research direction in the future.
Keywords/Search Tags:Public Key Infrastructure, Certificate Authority, Digital Signature, Digital Certification, Object Oriented Technology
PDF Full Text Request
Related items