Font Size: a A A

The Application Of Hybrid Encryption Algorithm In Software Security

Posted on:2012-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:Q XiaoFull Text:PDF
GTID:2178330338997613Subject:Operational Research and Cybernetics
Abstract/Summary:PDF Full Text Request
Because of the defect of only the single data encryption and the use of famous encryption algorithm, which was not improved in traditional methods of the registration process, a combined encryption algorithm is proposed in this thesis. That is, the algorithm security is greatly improved, through researching several famous data encryption algorithms, and improving some data encryption algorithms, and arranging encryption algorithms in some order. First, by the definition of an initial encryption algorithm, the information of users is encrypted. That is, the user's information is splinted a character string array, and the new character is made by calculating ASCII values of different characters. This operation is not only for the encryption algorithms had prepared, but also enhance the security of the information.Second, based on the basic principle of the famous Micro Genard encryption algorithm, the algorithm is optimized. That is, Micro Genard square's level is from 26, based on 26 uppercase letters, to 36, based on 26 uppercase letters and 10 Arabic numbers.Finally, the combined encryption algorithm is successfully made by using the initial encryption algorithm, Micro Genard encryption algorithm and the famous Base64 encryption algorithm. That is, in accordance with the order of the initial encryption algorithm, the improved Micro Genard encryption algorithm and the famous Base64 encryption algorithm, the user's information is gradually encrypted, and the algorithm security is greatly enhanced. Besides, to video surveillance software system for instance, which is widely used in the field of the traffic security management, the combined encryption algorithm is completely validated, and its security is very high.
Keywords/Search Tags:Micro Genard encryption algorithm, Base64 encryption algorithm, Combined encryption algorithm, Software security
PDF Full Text Request
Related items