Dissertation > Excellent graduate degree dissertation topics show

The Design and Implementation of the Security System for the Banking-Securities Data Exchange Platform

Author: YangJun
Tutor: TuChangHe
School: Shandong University
Course: Software Engineering
Keywords: PKI technology CA X.509 symmetric encryption rc6
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 91
Quote: 0
Read: Download Dissertation

Abstract


With the continuous development of the information age, Internet technologies widely used in the defense, telecommunications, financial services, media, commerce and trade and other fields, the network and information security problems also have become increasingly highlighted. At present, the protection of network information security programme more mature technology is used PKI Authentication Framework system, through the use of digital certificates and encryption, digital signature technology to confirm the identity of the two sides of the encryption and transmission of information. Key Management Center and PKI trust system is a vital part of the certificate authentication system to provide key management services.China’s digital certificate authentication system in many places have entered the field of the development and application of digital certificates stage of the promotion, promotion approach is through the realization of the Internet industry and commerce, such as online tax, corporate users will be the number of applications certified to promote substantive stage. For example, with online business, enterprises can be realized after the completion of the annual evaluation online payment; with the Internet and e-business tax credit system, the enterprise funds through the payment gateway can reach the financial sector, complete tax process. The online payment system will be dependent on legitimate digital authentication center’s corporate customers online identification and payment confirmation.But now in China, CA technology truly is the application of industry and commerce, taxation, web sites, finance, customs, import and export, telecom these large areas and sectors, the demand for small personal use. This is China’s Internet and the relative level of development should be, at home and abroad CA is the fundamental reason why there is a gap.Shenzhen Securities Communication Co., Ltd. is a stock market for providing data communications services high-tech enterprises, developed for banks, securities companies and the relevant inter-agency data exchange systems business - financial data exchange platform, using mature Shenzhen Securities Communication Network as a major underlying network facilities, but also to accept dial-up, green connections, Internet VPN, and other means of open access. Through a variety of access methods, BSDEP the banks, securities firms, exchanges, clearing corporation registered, regulatory bodies, such as linking together. In order to ensure network security, and financial data exchange platform in the network, it also needs a very complete tight security measures. For existing financial data transmission platform, by the hundreds of millions of shareholders and is related to several hundreds of millions of dollars of capital flows, and its functions can not powerful, their safety is important to mention. However, financial data transmission platform powerful, more complex structure, and so in the course of its encryption, if using the same encryption methods, sometimes it is not necessary, therefore, concrete analysis of concrete problems and seek the most reasonable at the same time have a better cost encryption to ensure the security of data transmission, this is the problems faced by.In this paper, described the design of the system, given the function of the system structure and logic diagram. Then according to the system’s overall structure, and analysis of the function it is to achieve the required two steps, including internal LAN transmission, green transmission. , And a detailed description of each step of the function, structure and process, and then the entire system is running the test data encryption status.This paper introduces the pki technologies, as well as how to use the technology to be pki encrypted data encryption, on several symmetric algorithm of the pros and cons and, ultimately, the use of optimal algorithm for encryption. Description of the final status of the entire system of encryption test results.

Related Dissertations

  1. Study on Prohexadione Calcium on Growth of Rice and Wheat,S511
  2. Research on the Efficiency of Circle-Flow Constructed Wetland Process for Swine Wastewater Treatment and Zeolite Regeneration,X713
  3. Design on the Individual Cow’s Identification and Position System Based on ZigBee,TN929.5
  4. Information-oriented physical systems IEEE802.15.4MAC protocol analysis and optimization,TP212.9
  5. Eu- doped α-SiAlON phosphor First-principles study,TB34
  6. Study on Kinetics and Morphology of Calcium Carbonate Precipitation Catalyzed by Bacterial Carbonic Anhydrase,O643.32
  7. The Design and Implementation of an Online Shopping System Based on PKI,TP393.09
  8. Si-containing magnesium alloy microstructure and mechanical properties,TG146.22
  9. PKI technology in the military document circulation system application and implementation,TP393.08
  10. CA model under the constraint of land sensitivity and scale expansion of city size,F299.2;F224
  11. Implementation and Improvement of the MAC Layer of Zigbee Protocol Based on ARM7 Platform,TP212.9
  12. Experimental Research on CA Mortar Mixing Parameters and Mixing Process,U215.6
  13. Experimental Research on Vibratory Mixing Asphalt Cement Mortar,U214
  14. Design and Implementation of Electronic Seal System Based on Improved Algorithm of MD5,TN918.1
  15. Synthesis and Photoluminescence Properties of Ti4+ and Eu3+ Doped or Codoped M2SnO4(M=Ca, Sr, Ba) Phosphors,TB34
  16. Studies on Calcium Nutrition of High-quality Flue-cured Tobacco Production in Fujian Province,S572
  17. The Acquisition of the English Past Tense in EFL Classroom: a Comparison of the Effects of Two Teaching Approaches,H319
  18. Fingerprint feature transform based research PKI encryption platform design,TP393.08
  19. Research and Implementation of Web Services Based on WS-Security Specification,TP393.08
  20. Design of Secure E-mail System Based on Encryption,TP393.098
  21. Research of Centralized Authentication Base on SAML and Implementation in Digital Campus,TP393.18

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile