目 录
中文摘要
ABSTRACT
第一章 绪论......................................................................................................................1
§1.1 本课题的研究背景和意义........................................................................................................1
§1.2 研究现状与应用......................................................................................................................2
§1.3 主要工作..................................................................................................................................2
§1.3.1 研究内容
............................................................................................................................2
§1.3.2 本文的结构安排
................................................................................................................3
第二章 身份认证技术及密码学相关知识......................................................................4
§2.1 主流身份认证技术.....................................................................................................................4
§2.1.1
消息摘要
................................................................................................................................4
§2.1.2
数字信封
................................................................................................................................5
§2.1.3
数字签名
................................................................................................................................6
§2.1.4
数字证书
................................................................................................................................8
§2.2 身份认证方案及安全性分析.....................................................................................................9
§2.2.1
基于口令的传统认证机制
....................................................................................................9
§2.2.2
基于
PKI
的认证机制
...........................................................................................................10
§2.2.3 802.1X
认证协议
..................................................................................................................12
§2.2.4 Kerberos...............................................................................................................................13
§2.2.5
挑战
/
应答的认证机制
........................................................................................................14
第三章 嵌入式内网身份认证系统的方案设计............................................................18
§3.1 设计需求..................................................................................................................................19
§3.1.1
安全性能需求分析
..............................................................................................................19
§3.1.2
技术需求
..............................................................................................................................19
§3.2 方案详细设计..........................................................................................................................20
§3.2.1
设计思路
..............................................................................................................................20
§3.2.2
方案描述
..............................................................................................................................20
§3.3 方案综合评价分析..................................................................................................................24
§3.3.1
安全性分析
..........................................................................................................................24
§3.3.2
性能分析
..............................................................................................................................25
第四章 嵌入式内网身份认证系统的实现....................................................................26
§4.1 需求分析..................................................................................................................................26
§4.1.1
设计意义
..............................................................................................................................26
§4.1.2
功能需求
..............................................................................................................................26
§4.1.3
系统的性能需求分析
..........................................................................................................27
§4.1.4
接口的需求分析
..................................................................................................................27
§4.2 嵌入式内网身份认证系统设计...............................................................................................28
§4.2.1
服务器实现的功能模块
......................................................................................................28
§4.2.2
无线用户端的功能模块
......................................................................................................32
§4.3 嵌入式内网身份认证系统的实现...........................................................................................32
§4.4 系统测试..................................................................................................................................33