The Technical Implementation of WTLS in WAP Gateway
|School||Harbin Engineering University|
|Course||Applied Computer Technology|
|Keywords||WAP WTLS Gateway Key Safety certification|
In the 1990s, the field of information and communication the rapid popularization and application of two striking growth - the rapid development of the mobile phone and the Internet. The integration of Internet and mobile communications technology, a wireless Internet applications. To more suitable for this particular field, and rewrite the existing Internet protocol for wireless Internet applications, so the wireless application protocol (Wireless Application Protocol, WAP) technology to generate a. WAP is an open global standard, formulated by members of the WAP Forum (WAP Forum) to discuss. With the combination of WAP and e-commerce, mobile e-commerce can be achieved (such as mobile banking, mobile phone stocks, etc.), the user is no longer subject to the constraints of time and place, you can quickly and easily respond to market changes. Either the Internet or wireless networks, security is always an important issue. It can be said: there is no security, there is no network world prosperity. Transport Layer Security (Transport Layer Security, TLS)-based wireless transport layer security (Wireless Transport Layer Security, WTLS) is widely used for online transaction processing. In recent years, foreign, the WTLS technology has been rapid development. WTLS only in its infancy in the country. In this paper, based on elaborate WAP WAP gateway basic concepts and theory, through the introduction of WAP programming model introduced WTLS, and WTLS protocols constitute the explanation is given. WAP security, and discuss the advantages and limitations of the existing WTLS as well as the current state of development and the presence of security vulnerabilities, and proposed a solution based on these vulnerabilities, demonstrated in domestic construction based on WTLS WAP gateway may reality and necessity. On this basis, the authors combined the existing non-secure WAP gateway, application of key learning, digital encryption, digital signatures, security certification technology to achieve the WTLS ideal algorithm under existing economic and material conditions combination (select the Diffie-Hellman key exchange algorithm, DES block encryption algorithm, SHA MAC algorithm). Analog wireless operating environment, the choice of the Linux operating system GNU C programming environment, and strive to achieve efficient WTLS, successfully connect the client and server side safely.