用户名: 密码: 验证码:
基于PKI身份认证系统的研究与实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
网络安全是信息系统的一个重要研究方向,而身份认证技术是保护网络信息资源安全的第一道大门,在安全系统中的地位极其重要。公钥基础设施PKI作为一种认证技术的安全设施,能够在开放网络环境下提供身份认证与鉴别,并能保证信息的机密性、完整性及抗否认性,目前已经成为网络信息安全认证领域中的主流技术。
     本文围绕一个PKI认证中心的设计和开发,对实现安全、可靠、可扩展的系统所涉及的关键理论—公钥密码体制和数字证书进行了研究,主要的工作有:
     (1)阐述了PKI的相关技术。对PKI的组成和标准、PKI的核心组成部分—CA的结构以及PKl的基本元素数字证书进行了详细分析。
     (2)研究了公钥密码体制的算法。在对密码技术分析的基础上,从对称密钥体制和公钥密码体制入手,对公钥密码体制中基于不同难题的RSA算法、DSA算法和ECC算法进行了深入地剖析和比较研究。
     (3)实现了3个非对称密码算法。RSA算法中给出了一种安全大素数生成的方法,并采用了Montgomery算法提高模密运算速度的方法,DSA算法中采用了在验证过程消除逆元运算的方法,在此基础上,实现了改进的RSA算法、改进的DSA算法和ECC算法。
     (4)设计实现了数字认证中心系统。该系统将上述算法(RSA算法、DSA算法和ECC算法)应用在认证的加密和签名过程中,并可为用户签发两种类型的证书,完整的实现了证书颁发、证书撤销、证书查询和证书更新等主要功能。
     本课题来源于陕西省自然科学基金(2006F50)和航空科学基金项目(06ZC31001)。
Network security is an important field of study in information systems, while identity authentication technique, as the gateway to network information resources, dominates a significant position in the protection of network information resources. As an identity authentication technique, PKI can authenticate the identity in the open network environment, and at the same while protect the confidentiality, integrity, and non-repudiation of information. At present, PKI has already become the mainstream technique in net information security protection.
     Based on the design and development of a PKI certificate authority, this paper attentively focuses on the related key theoretical issues, namely public key cryptosystem and digital certificate, which of a safe, reliable and scalable system. The main work is as follows:
     (1) Expounding the related techniques of PKI——PKI's components and standards as well as its core CA structure and digital certificate.
     (2) Studying the algorithm of the public key cryptosystem. Based on the analysis of cryptography, this paper offers an in depth analysis and comparative study on the algorithms of RSA, DSA and ECC from the perspective of symmetric cryptosystem and public key cryptosystem.
     (3) Implementing three asymmetrical crypto-algorithms. In the algorithm, RSA offers a method to generate the great prime number and a method to improve the modular multiplication speed by employing the algorithm of Montgomery. In DSA, the method of offsetting seeking inversion in validation is employed, based on which improvement in RSA, DSA and ECC algorithms during programming.
     (4) Designing and implementing the digital certificate authority. The system uses the above algorithms (RSA algorithm, DSA algorithm and ECC algorithm) in encryption and signature and meanwhile issues two certificates for the users, perfectly making it feasible to issue, revoke, inquire and upgrade certificates etc.
     This paper is supported by Shaanxi Narural Science Funds (2006F50) and Aviation Science Funds (06ZC31001).
引文
[1]刘丽梅.电子商务信息安全问题探讨.http://info.feno.cn/2007/130204/c0000353.shtml.
    [2]Carlisle Adams Steve Lloyd著,冯国等译.公开密钥基础设计—概念、标准和实施[M].北京:人民邮电出版社,2001.
    [3]那什,张玉清,陈建奇著.公钥基础设施(PKI)实现和管理电子安全[M].北京:清华大学出版社,2002.
    [4]冯登国,周永彬,张振锋,李德全著.密码工程实践指南[M].北京:清华大学出版社,2001.
    [5]Rao K.PKI Revenues set to grow[J].Fraud&Security.2000,5:3-4.
    [6]江为强,陈波.PKI/CA技术的起源、现状和前景综述[J].西南科技大学学报.2003,18(4).
    [7]http://www.jokcn.com/read/31540.html.
    [8]http://media.ccidnet.com/media/ciw/1056/b3502.htm.
    [9]冯登国.PKI技术及其发展现状.http://www.nsc.org.cn/.
    [10]Zhang M.Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks[J].ICISC 2003,LNCS 2971.2004:66-183.
    [11]Yamazaki Y K N.A secure communication system using biometric identify[J].IEICE Trans on Information and Systems.2001:879-884.
    [12]schneier B.Biometrics:Uses and Abuses,Inside Risks 110[J].Communications of the ACM.1999,42(8):21-28.
    [13]International Biometrics Industry Association.http://www.ibia.org.
    [14]Neuman C.The kerberos network authentication service(V5).Internet RFC 4120.2005.
    [15]Neuman C.The kerberos network authentication service(V5).Internet RFC 1510.1993.
    [16]顾文刚,程朝辉,荆金华等.基于PKI的Kerberos跨域认证协议的实现与分 析[J].计算机科学.2001,28(10).
    [17]李国强,顾永跟,傅育熙.基于Spi演算的Kerberos认证协议形式化研究[J].计算机科学.2004,31(11).
    [18]刘克龙,卿斯汉,蒙杨.一种利用公钥体制改进Kerberos协议的方法[J].软件学报.2001,12(6).
    [19]Internet X.509 Public Key Infrastructures.RFC 2459.1999.
    [20]孟博,熊丽,陈浩然.基于PKI的电子商务安全研究[J].计算机工程与应用.2002,38(11):152-155.
    [21]李冬梅.CA系统中RA中心的设计与实现[J].计算机科学.2004,31(4).
    [22]Bertin M.Smart card matches fingerprint data for PKI[J].Biometric Technology.2000,1(2-3).
    [23]李彦,王柯柯.基于PKI技术的认证中心研究[J].计算机科学.2006,33(2).
    [24]李建华,张爱新著.现代密码技术[M].北京:机械工业出版社,2007.
    [25]卢开澄著.计算机密码学[M].北京:清华大学出版社,2003.
    [26]蒋波.一种基于三重DES和RSA的综合加密方案[J].微计算机信息.2007,23(6-3).
    [27]马兆丰,宋擒豹,刘丹莹,冯博琴.一种基于IDEA和ECC算法的数字化防伪认证新方案的研究与实现[J].小型微型计算机系统.2003.
    [28]Joan Daemen V R.AES Proposal:The Rijndael Block Cipher.http://www.n ist.gov/aes.
    [29]Gladman B.A Specification for Rijndael,the AES Algorithm.http://www.cryp to.rub.de/praktika/escm/aesspec.pdf.
    [30]Diffie W H M.New directions in cryptography[J].IEEE Transactions on Information Theory.1976,22(6):644-654.
    [31]R.l.rivest,a.shamir L A.A method for obtaining digital signatures and public key cryptosystems[J].Communications of the ACM.1978,21(2).
    [32]knuth D E.The Art of Computer Programming:Seminumerical Algorithms[M].Volume2.Addtion-Wesley Third edition,1998.
    [33]rose K H.Elementary Number Theoryand Its Application[M].Addision-Wesley, 1984.
    [34](加)斯廷森著,冯登国译.密码学的原理与实践[M].北京:电子工业出版社,2003.
    [35]朱文余,孙琦著.计算机密码应用基础研究[M].北京:科学出版社,2000.
    [36]李荣森,秦杰,窦文华.RSA系列算法在工程中的应用研究[J].计算机科学.2007,34(2):86-90.
    [37]M R.Probabilistic Algorithms for Testing primality[J].Journal of Number Theroy.1980(12).
    [38]齐晓虹,刘冬,赵岳松.RSA公开密钥密码体制的密钥生成研究[J].武汉理工大学学报.2001,23(6):37-40.
    [39]D.E.Knuth.The Art Computer Programming:Seminumerical Algorithms[M].Volume 2.Addition-Wesley,Third edition,1998.
    [40]姬东耀,王育民.一种基于中国剩余定理的双重认证存取控制方案[J].计算机研究与发展.2000,27(4)
    [41]孙宇.慎用中国剩余定理提高RSA算法效率[J].计算机工程与应用.2004.
    [42]L M P.Modular Multiplication Without Trial Division[J].Mathematics of Computation.1985,44(170):519-521.
    [43]王冕,周玉洁.分割式Montgomery模乘运算的线性高基心动阵列新结构[J].计算机科学.2006,33(1):184-187.
    [44]李占才,王许书,涂序彦.RSA快速硬件实现研究[J].计算机研究与发展.2001,38(11).
    [45]Shao Z.Batch verafying multiple DSA-type digital signatures.Computer Networks[J].2001,37(3-45):383-389.
    [46]Don B.Johnson A J M.Elliptic curve DSA(ECSDA):an enhanced DSA[J].ACM.1998,13.
    [47]洪方.基于SSL协议的表单数字签名软件构架研究[D].南京航空航天大学硕士学位论文,2006.
    [48]Koblitzn.Elliptic curve cryptosystems[J].Mathematics of Computation.1987,48(177):203-209.
    [49]Sm V.Uses of elliptic curves in cryptography,advances in cryptology CRYPTO'85[J].Lecture Notes in Computer Science.1986,21(8):417-426.
    [50]吴世忠著.密码编码和密码分析原理与方法[M].北京:机械工业出版社,2001:22-45.
    [51]M C.Elliptic curves and application in cryptography[J].IEEE Trans Electromagn Compat.2001,49(10):985-1003.
    [52]Kobayashi K,morita H H M.Multiple scalar-Multiplication algorithm over elliptic curve[J].IEEE Transaction on Antennas and Propagation.2001,84(2):45-48.
    [53]华大芳,刘声雷.椭圆曲线加密算法与FPGA硬件实现[J].合肥工业大学学报.2007.
    [54]夏先智,赵毅.基于椭圆曲线加密算法技术优势的探讨[J].计算机科学.2003,30(10).
    [55]Current Public-key Cryptographic System Certicom Corp.1997.http://www.cert i.com/ecc/wecc2.html.
    [56]加密算法介绍及如何选择加密算法.2007.http://news.csdn.net/n/20070425/103328.html.
    [57]高志权.PKI体系中密钥管理技术的研究[D].山东大学硕士学位论文,2007.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700