Font Size: a A A

Password Technology Is The Practical Application Of The Tax Control Field

Posted on:2006-08-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y H LiuFull Text:PDF
GTID:2209360182476972Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
During the development process of the socialistic market economy system, tax revenue is performing the important functions of organizing the financial revenues, controlling the economy and regulating social distributions. In China, more than 90% of the financial incomings come from the tax revenues every year and its status and functions are becoming more and more important. With the rapid development of the economy, the existing administration system still has many problems in efficiently promoting the enterprises to carry out the account auditing, maintaining the social economic order, controlling the sources of the revenues and blocking the levy vulnerabilities. Furthermore, the authenticity and validity of the revenue data are one of the difficulties of restricting the development process of revenue informationization construction, especially in fake-preventing problem of the invoice data. It is imminently demanding a reasonable technological way to solve this problem to further the development of the revenue reform.Experiencing many years of development, the cryptography has formed more perfect system, in particular the advent of the asymmetric algorithm having settled the puzzling perplexes over a long period of time. Reasonably applying the cryptography into the realm of revenue fake-preventing will entirely achieve the goals of fake-preventing of the invoice data.Starting with the requirements of tax controlling for the fake-preventing technology, this paper delves into the cryptography technology, especially the feasibility applying the Asymmetric cryptography into the field of fake-preventing of tax controlling, and incorporating a practical fake-preventing project of tax controlling, emphatically discusses the following problems such as the choice of cryptographic algorithms, the distribution and management of cryptographic keys, the design of security procedures of the system, the component structure of the system modules, the development of the relevant security devices etc. Furthermore, this paper also analyzes and expounds the possible security risks faced and the security measurestaken by the entire system.In this project, we adopt the special cryptographic chips authorized by Country Cryptographic Management Committee to develop a suite of tax controlling fake-preventing management system and the relevant specific cryptographic devices for the clients. The entire system consists of two main parts, that is, Taxpaying client and Bureau (Revenue Department) end, respectively making use of tax-controlling encryption box and validation server as the kernel security devices. These devices have the functions of creating fake-preventing code and validating the fake-preventing code, so fundamentally ensuring the devices would not be misused. Furthermore, being the security foundation of the entire system, generation algorithm of fake-preventing code - short cryptograph asymmetric algorithm possesses the characteristics of generating short cryptograph (8 Bytes), high security strength, extraordinarily suitable for the demands of the invoice fake-preventing.The whole system and the relevant security devices are developed under the directions of the Country Cryptographic Management Committee and absolutely coincident with the laws of the cryptographic management and pass the country's technical appraisal.
Keywords/Search Tags:cryptography, fake-preventing of the invoice data, asymmetric algorithm, revenue fake-preventing
PDF Full Text Request
Related items