期刊文献+

基于X.509的VPN的安全认证模型

Authentication Model of VPN Based on X. 509
下载PDF
导出
摘要 目前VPN广泛应用,但没有一个完善的认证体系,针对于此,提出了基于X.509技术的VPN安全认证模型。论述了确定怎样为VPN通道颁发X.509数字证书,怎样进行证书体系管理的问题,实现了CA系统的证书认证PKI体系在VPN中的安全认证模型。可用于使用公钥认证的VPN中。 Thousands of private network take use of VPN to protect their public network traffic, but secure authentication method lack for it. To fix this problem, this paper provides a new authentication model of VPN. This model solves how to provide certificates based on X. 509 for channels of VPN, and how to manage this certificate architecture, it's a new way for VPN authentication to use PKI architecture of CA system. It can be applied to VPN which need asymmetric cipher authentication.
出处 《科学技术与工程》 2005年第17期1320-1322,共3页 Science Technology and Engineering
基金 湖南省自然科学基金(JJY3098)资助
关键词 虚拟专用网 认证 证书X.509标准 公钥基础设施 VPN authentication X. 509 PKI
  • 相关文献

参考文献1

二级参考文献9

  • 1[1]Chaum D, van Antwerpen H. Undeniable signatures. In: Brassard G, ed. Proceedings of the Advances in Cryptology (CRYPTO'89). LNCS 435, Berlin: Springer-Verlag, 1990. 212~216.
  • 2[2]Chaum D. Designated confirmer signatures. In: De Santis A, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'94). LNCS 950, Berlin: Springer-Verlag, 1994. 86~89.
  • 3[3]Okamoto T. Designated confirmer signatures and public-key encryption are equivalent. In: Desmendt YG, ed. Proceedings of the Advances in Cryptology (CRYPTO'94). LNCS 839, Berlin: Springer-Verlag, 1994. 61~74.
  • 4[4]Michels M, Stadler M. Generic constructions for secure and efficient confirmer signature schemes. In: Nyberg K, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'98). LNCS 1403, Berlin: Springer-Verlag, 1998. 406~412.
  • 5[5]Camenisch J, Michels M. Confirmer signature secure against adaptive adversaries. In: Preneel B, ed. Proceedings of the Advances in Cryptology (EUROCRYPT 2000). LNCS 1807, Berlin: Springer-Verlag, 2000. 243~258.
  • 6[6]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21(2):120~126.
  • 7[7]Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proceedings of the Advances in Cryptology (CRYPTO'98). LNCS 1462, Berlin: Springer-Verlag, 1998. 13~25.
  • 8[8]National Institute of Standards and Technology. Digital signature standard. NIST FIPS PUB 186, Department of Commerce, NIST, 1994.
  • 9[9]National Institute of Standards and Technology. Secure hash standard. NIST FIPS PUB 180-1, Washington D.C.: Department of Commerce, NIST, 1995. http://csrc.nist.gov/cryptval/shs.html.

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部