Font Size: a A A

Mail Encryption Of USBKEY Implementation

Posted on:2013-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y W YinFull Text:PDF
GTID:2248330374974996Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, Internet users are becoming more andmore.E-mail has become an important tool that people used to contact each other; however,due to the openness of the Internet, the security problem is becoming more and more serious.Currently,the widespread use of PGP (Pretty Good Privacy) E-mail encryption isimplemented in the PC terminals using pure software method, so hackers can implant Trojanhorse programs in the user’s computer to read the signature private key and encryption keys,then e-mail security still can’t be guaranteed.In view of the above problems we introduce USB KEY. It can save the user’s digitalcertificate and the private KEY, in theory they can’t be exported in any circumstances, so thathackers can’t read user’s confidential information such as the private KEY. In order to preventhackers from operating USB KEY to trade by remote control, we introduce the fingerprintidentification module. Using fingerprint identification replace PIN code, even if the hackersremote control the computer and read the PIN code still can’t make any operation, so as toimprove the safety performance of the system.In this paper we introduce the MD5, SHA, DES,3DES, RSA encryption algorithms andUSB KEY system structure (including hardware layer, core driver layer, standard middlewarelayer and application layer), and focuses on the design and implementation of hardware layer.Mainly includes the fingerprint identification design and implementation, the USB drivedesign and implementation and Z32U chip operating system design and implementation.The innovation of this paper is mainly reflected in the following three aspects:1, Designand implement USB KEY E-mail encryption based on Z32U development board;2, PCmachine and Z32U communicate through the USB interface using the Mass Storage ClassBulk-only protocol to get faster data transfer rate3, Introduce the fingerprint identification toauthenticate the user identity, which has greatly enhances the security of system.
Keywords/Search Tags:USB KEY, USB, COS, Fingerprint identification, E-mail
PDF Full Text Request
Related items