Font Size: a A A

The Design And Implementation Of IOS Data Encryption Software Based On The Certificate

Posted on:2015-01-20Degree:MasterType:Thesis
Country:ChinaCandidate:J R NieFull Text:PDF
GTID:2298330467963549Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The extensive application of information technology and the increasing popularity of the internet, intelligent mobile phone and tablet computer becomes an indispensable part of people’s daily life and much important information stored on these devices.Thus, not only such as address book, photos, text messages and other private information is stored, some valuable data, including the user’s bank account, credit card password and username will be stored in the device memory cards. If the device is lost or stolen, users will face the risk of privacy data leakage.With the rapid development of mobile internet technology in the global scope, more and more attention is paid to the issue of privacy data security storage. In order to solve the problem of personal data safe storage, reasonable protective measures should be taken and appropriate effective data access control strategy must be established. Under such background, digital certificate because of its advantages of identification and verification, as well as can access multiple applications, has very broad prospects for development. In order to solve the security risk issues from the internet data information, one of a major application for digital certificate in computer network communication is the verification of legal status and the corresponding permissions. Based on the basic principle of digital certificate and popular encryption algorithm, data encryption software which running on the iOS, was designed and implemented in this paper. This encryption software set identity authentication, access control, data encryption and secure transmission as a whole, can be used on mobile terminal for individual. For the purpose of implementing digital signature and verification work well, in the authentication phase, an improved identity authentication technology based on public key certificate mechanism was proposed. In the stage of data encryption, this study proposes an improved symmetric encryption algorithm combined with asymmetric encryption algorithm scheme to ensure the data security, which better solves the safety problem caused by traditional single encryption algorithms.Based on the user terminal mode, the encryption system framework was designed and demand analysis was finished. Besides, this paper also completed the work of identity authentication module and encryption-decryption module design, as well as software development and testing work.
Keywords/Search Tags:mobile terminal equipment, digital certificate, identityauthentication, encryption algorithm
PDF Full Text Request
Related items