Font Size: a A A

Cryptographic Algorithm Automatic Evaluation System

Posted on:2011-12-25Degree:MasterType:Thesis
Country:ChinaCandidate:H X SuFull Text:PDF
GTID:2178330332488242Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the development of information technology and the emergence of various network applications, the information security is of great significance. The cryptographic algorithm is the essential basis of information security. To ensure the accuracy and availability of cryptographic algorithms, a large amount of data verification is necessary during the evaluation. Therefore, an automated evaluation system for cryptographic algorithms is urgently necessary.To achieve function scalability and customization, an automated evaluation system for cryptographic algorithms is proposed in this paper, which contains the component-based scalable and dynamic framework, common component, private component and design of XML files. The private component includes the evaluation component and the cryptographic algorithm component. The proposed system uses the component-based framework, and the cryptographic algorithms and evaluation methods are developed as different components. Therefore, the system may integrate different cryptographic algorithms and evaluation methods dynamically, and then the scalability is achieved. Unified interfaces for input and output in evaluation components are provided by common component to facilitate the data exchange between the system and evalution component. Data types in the proposed system are analyzed, and a unified data format for communications is designed. The data among the common component, evaluation component and cryptographic algorithm component are communicated using the unified format. In order to facilitate the description of the many-to-many relationship between evaluation methods and cryptographic algorithms, the automatic work pattern in evaluation is realized, and the XML files are formatted. The format include many elements, such as the specify work pattern, provide data, save data and so on. The evaluation situation can be described, and the automatic evaluation of the cryptographic algorithms is achieved. The work pattern includes manual and automatic ways. The manual way is that the data selected by users according to the indication of system, and then XML file is created by system. Automatic way is that the unformatted XML file is provided by user through other word processing softwares.
Keywords/Search Tags:Automatic Evaluation, Cryptographic Algorithm Evaluation, Data Exchange, XML
PDF Full Text Request
Related items