期刊文献+

基于服务端密钥存储的网络计算机数字证书系统 被引量:5

CA system in network computer environment based on server-end private-key storage mechanism
原文传递
导出
摘要 为了解决在网络计算机系统中部署数字证书系统时存在的终端实体对私钥数据的存储需求和网络计算机无本地存储特性的矛盾,提出一种基于服务端密钥存储的网络计算机数字证书应用系统的设计与实现方案。该方案基于公钥基础设施体系架构,采用了随机数、"盐"和多轮迭代等手段保证系统的安全性,并且通过在客户端进行密钥生成和加解密操作的方式实现了系统的可扩展性。系统实现的结果表明:由于无需借助外部密钥存储设备,该系统在保证安全性和可扩展性的同时,实施复杂度和成本均降低。 A design and implementation scheme was devised for a certificate authority (CA) system in network computer environments based on a server-end private-key storage mechanism to solve the conflict between private-key storage demands of the end-entity and the nonstorage character of network computer systems. The scheme was based on the public key infrastructure (PKI) architecture with system security achieved by various means such as random numbers, salt, and multiple round iterations. The scheme also ensures system scalability by assigning key derivation and encryption/decryption operations to the client-end. System implementation tests show that the system complexity and cost are reduced without impairing system security and scalability because external private-key storage equipment is not needed.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第7期1208-1211,共4页 Journal of Tsinghua University(Science and Technology)
基金 国家"八六三"高技术项目(2005AA114160)
关键词 数字证书系统 公钥基础设施 网络计算机 安全性 certificate authority (CA) system public key infrastructure (PKI) network computer (NC) security
  • 相关文献

参考文献7

  • 1Oracle,IBM,Sun,et al.Network Computer Reference Profile[EB/OL].(1996)[2006-04-10] http://www.sun.com/smi/Press/ sunflash/mncrs-profile.html.
  • 2胡春光.网络计算机系统中的安全[J].微电子学与计算机,2002,19(10):47-50. 被引量:4
  • 3"863"计划联合办公室."十五"期间国家高技术研究发展计划("863"计划)计算机软硬件技术主题课题申请指南[EB/ OL].(2002)[2006-04-05] http://www.863.org.cn/863-105/applygu-ide/guide-infotech/200406010036.html.
  • 4谢东青,冷健.PKI原理与技术[M].北京:清华大学出版社,2004.
  • 5安德鲁,威廉,西莉亚,等.公钥基础设施:实现和管理电子安全[M].张玉清,陈建奇,杨波,等,译.北京:清华大学出版社,2002.
  • 6RFC2898.The Public-Key Cryptography Standards-PKCS #5:Password-Based Cryptography Specification[S].MA,USA:RSA Laboratories,2000.
  • 7张尧学,彭玉坤,周悦芝,方存好.可管理多媒体网络计算机(MMNC)[J].电子学报,2003,31(z1):2054-2058. 被引量:21

二级参考文献13

  • 1[1]Bruce Schneier. Secrets and Lies:Digital Security in a Networked World. John Wiley & Sons,Inc.,2000.
  • 2[2]R L Rivest. The MD5 Message Digest Algorithm. RFC1321,Apr 1992.
  • 3[3]S P Miller,B C Neuman,J I Schiller,and J H Saltzer. Section E.2.1:Kerberos Authentication and Authorization System. MIT Project Athena,Dec 1987.
  • 4[4]URL. Public- Key Infrastructure (X.509). http:∥ www.ietf.org/html.charters/pkixcharter.html.
  • 5[5]S C Kothari. Generalized Linear Threshold Scheme. Advances in Cryptology:Proceedings of CRYPTO 84,Springer- Verlag,1985:231~ 241.
  • 6[1]M Revett, I Boyd, C Stephens. Network computing: a tutorial review[ J ]. Electronics & Communication Engineering Journal, 2001,13 ( 1 ): 5- 15.
  • 7[2]Apple,IBM,Netscape,Oracle,Sun. Network computer reference profile[ S/OL ]. http://www. sun. com/smi/Press/sunflash/mncrs-profile.html, 1996.
  • 8[3]Microsoft, Intel Corporation. Microsoft and Intel Launch NetPC with Industry Leaders [Z]. http://www. microsoft. com/presspass/press/1996/Oct96/NETPCpr. asp, 1996 - 10.
  • 9[4]http://www.novell.com/ [Z/OL].
  • 10[5]Wyse Technology Inc, Compaq Computer Corporation. Windows-Based Terminals, PCs, and NetPCs [ Z ]. http://www dpi. net. ir/PC/thinclients/articles/TechDocs/whitepaper. PDF, 1999 - 02.

共引文献28

同被引文献35

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部