Font Size: a A A

Research Of Safety Problems For Financial Field And Realization In Fund Currency System

Posted on:2007-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhangFull Text:PDF
GTID:2178360182496025Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of internet, modern finance is moreand more applied on it, and it makes the finance currency whichmaybe area-span, bank-span, or bureau-span possible. Bank card,credit card and check become the major carrier in the currency,as a result business online emergence. However, it brings someproblems which may only occur online.Enjoying the advantage of internet, we may face certainproblems, for example—security. As we know, finance needs ahighly secret environment, therefore, as early as in the beginning,security is on the agenda. And therefore, cryptology—such asnumeral signature--is widely applied on the finance area. At thesame time, facing the challenge of more and more emerging problems,the theory of cryptology itself improves rapidly.Comparing with the overseas finance area, it is not mature inchina. Firstly, the degree of internet applied on finance area iscomparatively low, the security system is not perfect and improvesslowly, qualified internet system only lies in bank. Secondly, newencryption techniques have not been well applied. Thirdly,businesses which provide online service is really on there own,and therefore hamper the speed of development. To sum up,first and foremost, we should further improve the securitystandard which matters the development of application of internet.The most widely used algorithm in finance area are DES, RSAand MD5 algorithm, which represents the three major algorithm incryptology, which are symmetry encrypt algorithm, common keyalgorithm, and Hash function algorithm respectively. In practice,they are applied in the three follow areas, they are the emergeof cryptograph, the interchange of secret key, and the verify ofinformation. In this article, we start with the state of artalgorithm, then we introduce DES, RSA, MD5 algorithm in detail.In order to better understand how cryptology works, the authorcites a finance operation system as an example. To note that, thesystem is already applied on ATM. In this article, the authorintroduces the design and realization of the system, as well asthe framework and operation flow. After that, the author analysisthe protection tactic in security area and the existing problemas well as its causation and resolve measure. To note that, theproblems discussed above cover every area where a highly secureinternet might be attacked in the cryptology perspective, andtherefore are highly representative.The amelioration cited in the article is already used in themodification of the system, and therefore is meaningful to othersystems in the same area.
Keywords/Search Tags:Realization
PDF Full Text Request
Related items