Network Secure Transmission Based on Authentication for C/S Mode
Currently, network built with C/S model has been widely used in E-commerce, ERP and corporate intranets. Therefore, the security of network transmission in this model has become an increasingly important issue. In view of the low security of traditional DES algorithm and slow RSA encryption speed, t...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 37 |
---|---|
container_issue | |
container_start_page | 34 |
container_title | |
container_volume | 3 |
creator | Zang Mingxiang Chen Qiuzhi Jiang Jianguo |
description | Currently, network built with C/S model has been widely used in E-commerce, ERP and corporate intranets. Therefore, the security of network transmission in this model has become an increasingly important issue. In view of the low security of traditional DES algorithm and slow RSA encryption speed, this paper presented an Encryption Algorithms model of data packets on the basis of analyzing the methods of existing network transmission. The algorithm model realizes a simple Authentication Center which simulates Kerberos authentication service. Through improving Kerberos protocol, strengthening the secure of the authentication process and defending the attack of replay effectively, security Transmission by Network of C/S model is realized. The result of experimentation shows that the proposed algorithm has the advantages of fast encryption (decryption) speed, high efficiency, strong safety. Furthermore; it can guarantee integrity in network transmission. |
doi_str_mv | 10.1109/IFITA.2010.238 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5634727</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5634727</ieee_id><sourcerecordid>5634727</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-70c1fe455c4ef458df9a237b69cc898950a9b7767721627a8ff74829f9801de33</originalsourceid><addsrcrecordid>eNo1jj1PwzAYhI1QJWjJysLiP5DWX_Frb4SIQqQCQ7NXbvJaGGiC7FSIf08qYLp7TqfTEXLN2ZJzZlf1um7KpWATC2nOSGbBcCWUAi0EOyfzf-B6RuannhUGCrggWUpvjDFuNWimLsntM45fQ3ynW2yPEWkTXZ8OIaUw9PTOJezoZMrj-Ir9GFo3nnI_RFqttvRp6PCKzLz7SJj96YI06_umesw3Lw91VW7yYNmYA2u5R1UUrUKvCtN564SEvbZta6yxBXN2D6ABpssCnPEelBHWW8N4h1IuyM3vbEDE3WcMBxe_d4WWCgTIH7vPSnU</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Network Secure Transmission Based on Authentication for C/S Mode</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Zang Mingxiang ; Chen Qiuzhi ; Jiang Jianguo</creator><creatorcontrib>Zang Mingxiang ; Chen Qiuzhi ; Jiang Jianguo</creatorcontrib><description>Currently, network built with C/S model has been widely used in E-commerce, ERP and corporate intranets. Therefore, the security of network transmission in this model has become an increasingly important issue. In view of the low security of traditional DES algorithm and slow RSA encryption speed, this paper presented an Encryption Algorithms model of data packets on the basis of analyzing the methods of existing network transmission. The algorithm model realizes a simple Authentication Center which simulates Kerberos authentication service. Through improving Kerberos protocol, strengthening the secure of the authentication process and defending the attack of replay effectively, security Transmission by Network of C/S model is realized. The result of experimentation shows that the proposed algorithm has the advantages of fast encryption (decryption) speed, high efficiency, strong safety. Furthermore; it can guarantee integrity in network transmission.</description><identifier>ISBN: 1424476216</identifier><identifier>ISBN: 9781424476213</identifier><identifier>EISBN: 9781424476220</identifier><identifier>EISBN: 1424476224</identifier><identifier>DOI: 10.1109/IFITA.2010.238</identifier><identifier>LCCN: 2010928757</identifier><language>eng</language><publisher>IEEE</publisher><subject>Algorithm design and analysis ; Algorithm model ; Authentication ; C/S ; Encryption ; network transmission ; Public key ; Servers</subject><ispartof>2010 International Forum on Information Technology and Applications, 2010, Vol.3, p.34-37</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5634727$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5634727$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zang Mingxiang</creatorcontrib><creatorcontrib>Chen Qiuzhi</creatorcontrib><creatorcontrib>Jiang Jianguo</creatorcontrib><title>Network Secure Transmission Based on Authentication for C/S Mode</title><title>2010 International Forum on Information Technology and Applications</title><addtitle>ifita</addtitle><description>Currently, network built with C/S model has been widely used in E-commerce, ERP and corporate intranets. Therefore, the security of network transmission in this model has become an increasingly important issue. In view of the low security of traditional DES algorithm and slow RSA encryption speed, this paper presented an Encryption Algorithms model of data packets on the basis of analyzing the methods of existing network transmission. The algorithm model realizes a simple Authentication Center which simulates Kerberos authentication service. Through improving Kerberos protocol, strengthening the secure of the authentication process and defending the attack of replay effectively, security Transmission by Network of C/S model is realized. The result of experimentation shows that the proposed algorithm has the advantages of fast encryption (decryption) speed, high efficiency, strong safety. Furthermore; it can guarantee integrity in network transmission.</description><subject>Algorithm design and analysis</subject><subject>Algorithm model</subject><subject>Authentication</subject><subject>C/S</subject><subject>Encryption</subject><subject>network transmission</subject><subject>Public key</subject><subject>Servers</subject><isbn>1424476216</isbn><isbn>9781424476213</isbn><isbn>9781424476220</isbn><isbn>1424476224</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1jj1PwzAYhI1QJWjJysLiP5DWX_Frb4SIQqQCQ7NXbvJaGGiC7FSIf08qYLp7TqfTEXLN2ZJzZlf1um7KpWATC2nOSGbBcCWUAi0EOyfzf-B6RuannhUGCrggWUpvjDFuNWimLsntM45fQ3ynW2yPEWkTXZ8OIaUw9PTOJezoZMrj-Ir9GFo3nnI_RFqttvRp6PCKzLz7SJj96YI06_umesw3Lw91VW7yYNmYA2u5R1UUrUKvCtN564SEvbZta6yxBXN2D6ABpssCnPEelBHWW8N4h1IuyM3vbEDE3WcMBxe_d4WWCgTIH7vPSnU</recordid><startdate>201007</startdate><enddate>201007</enddate><creator>Zang Mingxiang</creator><creator>Chen Qiuzhi</creator><creator>Jiang Jianguo</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201007</creationdate><title>Network Secure Transmission Based on Authentication for C/S Mode</title><author>Zang Mingxiang ; Chen Qiuzhi ; Jiang Jianguo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-70c1fe455c4ef458df9a237b69cc898950a9b7767721627a8ff74829f9801de33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Algorithm design and analysis</topic><topic>Algorithm model</topic><topic>Authentication</topic><topic>C/S</topic><topic>Encryption</topic><topic>network transmission</topic><topic>Public key</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Zang Mingxiang</creatorcontrib><creatorcontrib>Chen Qiuzhi</creatorcontrib><creatorcontrib>Jiang Jianguo</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zang Mingxiang</au><au>Chen Qiuzhi</au><au>Jiang Jianguo</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Network Secure Transmission Based on Authentication for C/S Mode</atitle><btitle>2010 International Forum on Information Technology and Applications</btitle><stitle>ifita</stitle><date>2010-07</date><risdate>2010</risdate><volume>3</volume><spage>34</spage><epage>37</epage><pages>34-37</pages><isbn>1424476216</isbn><isbn>9781424476213</isbn><eisbn>9781424476220</eisbn><eisbn>1424476224</eisbn><abstract>Currently, network built with C/S model has been widely used in E-commerce, ERP and corporate intranets. Therefore, the security of network transmission in this model has become an increasingly important issue. In view of the low security of traditional DES algorithm and slow RSA encryption speed, this paper presented an Encryption Algorithms model of data packets on the basis of analyzing the methods of existing network transmission. The algorithm model realizes a simple Authentication Center which simulates Kerberos authentication service. Through improving Kerberos protocol, strengthening the secure of the authentication process and defending the attack of replay effectively, security Transmission by Network of C/S model is realized. The result of experimentation shows that the proposed algorithm has the advantages of fast encryption (decryption) speed, high efficiency, strong safety. Furthermore; it can guarantee integrity in network transmission.</abstract><pub>IEEE</pub><doi>10.1109/IFITA.2010.238</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1424476216 |
ispartof | 2010 International Forum on Information Technology and Applications, 2010, Vol.3, p.34-37 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5634727 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Algorithm design and analysis Algorithm model Authentication C/S Encryption network transmission Public key Servers |
title | Network Secure Transmission Based on Authentication for C/S Mode |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T12%3A45%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Network%20Secure%20Transmission%20Based%20on%20Authentication%20for%20C/S%20Mode&rft.btitle=2010%20International%20Forum%20on%20Information%20Technology%20and%20Applications&rft.au=Zang%20Mingxiang&rft.date=2010-07&rft.volume=3&rft.spage=34&rft.epage=37&rft.pages=34-37&rft.isbn=1424476216&rft.isbn_list=9781424476213&rft_id=info:doi/10.1109/IFITA.2010.238&rft_dat=%3Cieee_6IE%3E5634727%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424476220&rft.eisbn_list=1424476224&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5634727&rfr_iscdi=true |