Font Size: a A A

Research On The Key Technologies Of Desktop Security System

Posted on:2007-08-27Degree:MasterType:Thesis
Country:ChinaCandidate:Z J LiFull Text:PDF
GTID:2178360182492476Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of Internet, from bank, telecommunication, insurance, stock to the governmental agency, from enterprise to personal, Internet has already become an essential part of people's routine work, study and live. People have already taken many essential measures to the network, but the network security case still presented the rising tendency, here is the very important reason: Lack of the safeguarding to personal computers. Therefore, researching on desktop security system, developing desktop security product, to the social development, national security, economical prosperity, all has the extremely vital significance.This article, focus on desktop security system key technologies, the main content is below.1. Summary present situation of desktop security system in domestic and oversea, researching background and significance.2. Introduce the basic theory of symmetrical encryption technology and asymmetrical encryption technology. Introduced DES, AES, and IDEA encryption algorithm, RSA, and ECC encryption algorithm, finally, produced the mix crypto-algorithm design proposal.3. In view of the email security, summarized its present situation, analyzed the factors of email be threatened, as well as the security email should have four kind of functions. Analyzes and proves PGP five services mode, key and key ring, including the conversation key production, key marking, PGP message format, transmits and accepts , the use in the messages which trades the key, key control. Meanwhile, as S/MIME stresses on the business standard, analyzed its content type and the enhancement secure service for email in short.4. Two implementation modes on personal file encryption: Establishes the virtual disk, carries on the encryption to the single file to store separately, carries on the detailed analysis and the proof.5. To the goal of desktop security system, personal file security, the email security,the real-time communication security and so on, the research has designed a desktop security system conceptual structure, the models and the various module functions, completed the desktop security system design from the whole.6. Using Microsoft Visual the C++ 6.0 development kits, with GnuPG security tool kit, the design has implemented the email security module functions. Using Outlook Express 6 demonstrated emails encryption/Signs and decipher/verification, analyzed the system email security module functions.
Keywords/Search Tags:Desktop security system, Email security, Personal file security, Real-time communication security, GnuPG
PDF Full Text Request
Related items