Font Size: a A A

A Study And Implementation On The Once A Secret Value Based On Free Mode Function

Posted on:2011-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:R ZhangFull Text:PDF
GTID:2178330332957313Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Through the rapid development of Network technique and the widespread use of electronic electronic commerce.How to better protect the confidentiality of information system, it has become a hot topic of research. So far, the network security solutions can be divided into a passive defence and a open defence. passive defence is represented in the firewall. The intranet security protection largely is depended on the network topology structure.Open defence solutions is to decrypt data and certification user authorization.There is no ask to network topology structure. But can directly protect the source data and make the end-to-end security. Encryption is the core technology to achieve the above purpose.Based on the in-depth analysis and studing in Public Infrastructure PKI ,RSA public-key crypto system, elliptic curve crypto system etc, research that through free modulus function to make key. The Key constantly updating realize encryption. Once a Secret enhance the key random,.Namely the same user or different users with the same key to encrypt the same file in different space or time, the file encryption is different, but does not affect the uniqueness of plaintext decrypted receiver. Increase security and prolong its life cycle.First, describes the public key cryptography pki technology research and technology, level studing of the over all world. Analyze its security.Then the paper analyzes and studies that make free modulus function to struct key because freedom value from mode function increases the conditions of randomness.Multi-layer freedom mode function structure public-key. Before encryption,through extending rows to realize encryption at a time. And by VB code realize and verify the algorithm.Makes a detailed explanation in the realization of the function module.Finally, give the corresponding experimental analysis results of the algorithm through safety, feasibility, performance, etc.
Keywords/Search Tags:encryption technology, one_time cryptography, random password, pki technology
PDF Full Text Request
Related items