A Virtual Private Network for Virtual Enterprise Information Systems

2000 
The security requirements of a virtual enterprise information system are investigated and a virtual private network (VPN) is designed to ensure the security, taking the advantages of the integrated functionality of encryption, key management, user authentication, firewall, and certificate authority with low cost. Several novel techniques are adopted in the VPN: 1) An effective chaotic encryption algorithm by using Logistic chaotic mapping; 2) a chaos theory based user's "fingerprint" authentication algorithm by using mixed optically bistable chaotic model; 3) a reliable authentication mechanism by integrated Guillou-Quisquater digital signature with RSA encryption; 4) an efficient Certificate Authority (CA) and digit certificate mechanism. The details of the VPN are also presented, including a cryptography server, an auditing server, a digital signature server and an authenticating server.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    8
    References
    1
    Citations
    NaN
    KQI
    []