Font Size: a A A

Research And Implementation Of Encryption And Decryption Method In E-commerce Based On CFB Mode

Posted on:2012-07-29Degree:MasterType:Thesis
Country:ChinaCandidate:J W SunFull Text:PDF
GTID:2178330332499542Subject:Computer
Abstract/Summary:PDF Full Text Request
In recent years, computer network technology has been growing rapidly, and knowledge about the network application has been constantly popular, which make people increasingly aware of convenience of the network. At the same time, the business system is also undergoing significant change, there is growing hope to achieve purchase, sale and other dealings remain within doors through the network, which makes traditional trade patterns change to electronic form. This led to the formation of e-commerce, and in the world set off a new upsurge of trade.As a new trade instrument, e-commerce will be a new milestone in the development of transaction and management model. It will be bound to the socio-economic implications; in addition, it will bring a great impact and new opportunities to employment, legal systems and cultural education and so on. The smooth development and promotion of E-commerce symbolizes that the humanity has welcomed the information society truly.In our country, e-commerce is still a new area with opportunity and challenges, the challenges will to a large extent come from the trust about the safety technology. Processing transactions on an open network (such as the Internet), how to ensure the security of data transfer becomes one of the most important factors whether e-commerce can be universal or not.A large number of facts show that it is necessary to attach great importance to security issues in order to ensure the normal operation of e-commerce. E-commerce security involved kinds of aspects, which is not a simple problem that can be solved by a firewall or an electronic signature.Network security and cryptography is the basis for e-commerce security, without secure network infrastructure and high-strength encryption technology, all the e-commerce transactions are castles in the air, without roots of the country. In this paper, encryption technology was used to ensure the security of e-commerce.the main content can be summarized as follows:(1) On the implementation of the system needs to be analyzed. Under the current market research, carried out a feasibility analysis, and system development goals. Encryption algorithm on a detailed study to determine the use of this system to the CFB mode. Determine the operating environment of system development needs, and system performance requirements and system programming language used to achieve the demand.(2) System requirements according to the system code. The system uses eight key to encrypt the data and use the link technique to reduce the repeated pattern ciphertext appears to enhance strength of the algorithm. Writing implements the encryption module, the decryption module, browse to select the file module, the module opens the file and exit the module. And prepared to achieve a file encryption, file decryption, encryption transformation, key transformation algorithms such as the character move cycle.(3) Functional testing of the system. Details of each function module used for testing and interface description, including encryption module testing, decryption module testing, and open the files test. Confirm the system's utility.This system mainly uses encryption technology to ensure security of data. In this system symmetric encryption algorithm was used to encrypt information. If the key is not known, the message can not be decrypted and the plaintext can not be known so as to ensure the security and confidentiality of the message during transmission, and protect the rights of the senders and receivers.There are two methods of designing cryptographic algorithms with strong density. One is to study all possible cryptanalysis methods and then design a set of rules in order to defeat any one of these solution algorithms, so an algorithm to resist these solutions will be able to be constructed. Another is to construct such a number of algorithms which are allowed to be cracked unless some problems are solved, but these problems are considered to be unsolvable.Use a key to encrypt sensitive information. Then send the data encrypted and the key to receiver (through a secure manner). Recipient can use the same algorithm and key delivered to decrypt the data, thus obtain sensitive information and ensure that the network data is confidential.In the system, eight keys were used to encrypt the data, and the link technology was used to reduce the emergence of repeated patterns in the ciphertext, thereby the strength of the algorithm was enhanced.In this paper, from the perspective of symmetric cipher algorithm, information transmitted between two sides of E-commerce was encrypted and decrypted. In the transmission channel the text sent is ciphertext, even if the ciphertext is intercepted, without the key, the information can be known, so the protect the confidentiality and security of message are protected.In this paper, algorithms of the realizing the system were described, the key was transformed into the suitable form by key transform, and the key transformed was used to encrypt data. The CFB mode was used in file encryption and decryption. Cyclic shift, XOR, multiplication and addition operations and others are used in encryption transformation.In addition, the system was achieved by using VC + + programming. This is a simple encryption and decryption system. It was helpful to protect the confidentiality and security of information to a certain extent, and ensure security of data during transmission.
Keywords/Search Tags:E-commerce, encryption algorithm, decryption algorithm, public key, private key
PDF Full Text Request
Related items