Font Size: a A A

Data Encryption And Decryption Applying System Based On File

Posted on:2003-07-04Degree:MasterType:Thesis
Country:ChinaCandidate:X Q YangFull Text:PDF
GTID:2168360092466508Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Information is a sort of resource and a fortune also. Today, with the progress of information processing and communicate technology, it has been attended by internal researchers and international that protect the security of the information, especially important information. Recently, the loss that every country in the world has been sustained is tremendous because of the lack of the measure of protecting information. Now, There are many safety precautions on the Internet, such as Fire Wall etc. But these are safety measure based on system or net site. Using information encryption technology is more direct and more available to users. Encryption technology is an applied subject. It has very long history. In the past, this technology are used only by military affairs > spy and large corporation. Encryption is profound respect to math. There are few people who can research encryption. That is the reason that it isn't be used widely.The content of information safety includes: confidentiality, integrity, availability, controllability and non-deny. The encryption technology is the key to assuring information safety.After earnest studying code system, the theory of encryption, decryption algorithm, oil fieldwork, I adopt "Liu's High Intensity Public Encryption Algorithm" and Public Key Encryption RSA. We have designed and developed the "data encryption and Decryption Applying System Based on File". This system according to the real text file of oilfield scene and image file of AutoCAD, We have finished the integration of system and have lay a foundation in order to resolve the problem of data security.This applying system has a lots of advantage, such as: process fast, safe and trusty, key management simple, key can be make automatically or manually, interface good and cost low. It can satisfy the need to protecting the important data in oilfield.In this paper, the design idea, the system composition, the theory of the primary algorithm and the function composition of every sub system are introduced mainly. Because there is lots of encrypt algorithm in the world, this paper elaborates the core idea, the theory of several algorithm that are more popular at present, and analyzes the resist-cipher-attacking ability of the main algorithm adopted in this applying system.
Keywords/Search Tags:Data Encryption, Decryption, Encryption Algorithm, DBS, Network Safety
PDF Full Text Request
Related items