Dissertation > Excellent graduate degree dissertation topics show

Authentication and Key Management Based on CPK

Author: CuiJieKe
Tutor: NiuXiaMu
School: Harbin Institute of Technology
Course: Computer Science and Technology
Keywords: Public Key Infrastructure Elliptic curve cryptography CPK authentication System Key management
CLC: TN918.1
Type: Master's thesis
Year: 2010
Downloads: 117
Quote: 0
Read: Download Dissertation


With the rapid development of network and computer, as people commonly use on the network, there is a high demand for building of a trusted and secure network. Currently, people could do many things just like daily work business, communication, trade and other behaviors through the network. In these acts, how to solve the authentication problem is the basis of all behaviors. There is no trust if identification issue is not resolved on the network.The authentication system is establishing trust system of proof system for e-commerce, e-government network activities. Authentication system’s core is to set up effective and reasonable signature mechanism. But realization of signature mechanism also relies on reasonable secret key control. This article aims at the two main topics of authentication system that to solve: large-scale secret keys production and secret keys distribution that based on identification. It is doing study for the CPK technology of basing on elliptic curve which has China proprietary intellectual property rights.The CPK technology of basing on ECC is the new technology of Chinese independent researching. It developed fast in resent years. This technology mainly through elliptic curve cryptography’s relevant operation generate the secret keys matrix and then through using the image on secret keys matrix of user identification to get the corresponding user secret keys. CPK technology solves many difficult problems in authentication system research at present: large-scale secret keys production, secret keys distribution that based on identification, off-line authentication, and cross-domain authentication and so on. This article firstly introduces the development and current situation of authentication system. And it introduces ECC technology and current most general PKI authentication system relation technologies at the same time.Then, it does the in-depth research to aim at authentication technology and secret keys management technique of CPK. It designed and realized CPK secret keys large-scale generation technology based on ECC, and it gave a management system structure model of secret keys. It also gave the process of off-line authentication and cross-domain authentication at the same time.Finally, comparative analysis with the PKI technology, describes the CPK in terms of performance and safety of the advantages.This topic root in“Eleven Five”State 863 project: preventing distort electron secret classification identification technology research (topic number 2007AA01Z458).

Related Dissertations

  1. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  2. Region-based wireless sensor network key management scheme for research,TP212.9
  3. Group Key Management in Wireless Sensor Networks,TN918.82
  4. Study on Production Process Quality Control of Feicheng Mining Group Machinery Factory,TH186
  5. The Improvement of CPK and the Design and Analysis of Electronic Payment Protocols Based on CPK,TP393.08
  6. Identity-based Key Management and Secure Routing Protocols Design in Wireless Mesh Networks,TN929.5
  7. Intensification Production Technique and Experimental Reserch,TG335.1
  8. Secure Group Communication Based on Combined Publie Key and Threshold Secret Sharing,TP393.08
  9. Research on Broadcast Encryption Scheme Based on Master Key,TN918.4
  10. Clustering key management for wireless sensor networks,TP212.9
  11. Shaanxi Provincial Government rent intranet CA certificate security design and implementation support platform,TP393.18
  12. Research on Key Management for Mobile Ad Hoc Networks,TN929.5
  13. PKI-based Web single sign-on system design and implementation,TP393.08
  14. Design and implementation of online electronic payment system based on the SSL protocol,TP393.08
  15. Research on Key Management Technology in Identity-based Cryptography,TN918.2
  16. E-government network security instant messaging system design and implementation,TP393.08
  17. Research and Application on Intellectual Property Protection Methods of Witkey,TP393.08
  18. Combination of public key cryptosystem key management center Research and Implementation,TP393.08
  19. Design of Distributed PKI Framework Based on P2P and Application in Instant Messaging,TP393.08
  20. Research on Key Management for Multicast in Mobile IP,TN929.5
  21. Research on Key Management and Authentication in Mobile ad hoc Network,TN918.82

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile