Font Size: a A A

The Research Of Mixed Data Encryption Method

Posted on:2002-04-28Degree:MasterType:Thesis
Country:ChinaCandidate:L C XuFull Text:PDF
GTID:2168360032954597Subject:Operational Research and Cybernetics
Abstract/Summary:PDF Full Text Request
For the nonce, IT is the important components of the society production and lives, which including computer technology, communication technology and controlling technology. Information security becomes most important for its secretive, unanimous and undeniable in storage, exchange and usage.Because of the popularity of the Internet, especially, the arising e-business, the traditional access control method could not fulfill the current information security requirements. Up to now, data encryption technology is the best method to obtain information security undoubtedly.In terms of the difference between encryption key and decryption key, it can divide into symmetry cryptogram and public key cryptogram. Because of the unsuitable of using only symmetry cryptogram or public key cryptogram, it could hardly fulfill the information security requirement.In this thesis, we propose a thread and flow of mixed cryptogram in allusion to the shortfall in applying data encryption, and we give a better strategy with identity validation, then we discuss the management and distribution of key. The main work of this thesis is listed bellow: ? Reciting the situation of the information security, and recommending the basic notionof data encryption technology;Researching and assaying the methodology, characteristic and applied field of many kinds of data encryption technology, and giving mathematics description to symmetry cryptogram and public key cryptogram;Proposing the thread of mixed cryptogram, and discussing the management anddistribution of key; Setting out a simulative PKI system framework, in which the basic workflow of themixed cryptogram is discussed.The improvement and the innovation of the thesis is given bellow: Giving mathematics description to symmetry cryptogram and public key cryptogram;Proposing the thread of mixed cryptogram;Giving a method of laving abstract to signature;Designing and achieving a Demo PKI system, giving an applying model of mixed cryptogram and public key.
Keywords/Search Tags:Mixed cryptogram, Data encryption, Symmetry cryptogram, Public key cryptogram, Data signature, Abstract function, PKI
PDF Full Text Request
Related items