Font Size: a A A

Data Encryption Technology And Its Application In Transmission In Network

Posted on:2009-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:H M HuangFull Text:PDF
GTID:2178360272490585Subject:Systems Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer industry, more and more people become Computer users, and the Network get a further prosperity, indicating that the mankind has entered the information age. Although Network gives people convenience of the exchangying information, it also brings an endless stream of security issues, which draws people's attention to research of network security.As a result , a variety of security technologies get an unprecedented development:Authentication and Access control technology, Encryption/Decryption technology, Antivirus, Firewall technology, and other security technologies. As the core technology of information security, Cryptographic draws more and more people's attention. The application of cryptographic techniques are no longer confined to the military, political and diplomatic fields, its commercial and social values began to be widely recognized.This Paper has done a lot of research and analysis to encryption technology, particularly AES and ECC system. Against using only one cipher system in traditional way ,which brings some shortcomings,such as easy to decipher, ineffective encryption, difficulty to manage keys, this Paper brings forward using a variety of encryption technology to protect information security, which fully integrate the advantages of symmetric key cryptography and public key cryptography in the latest, the two highest security encryption system:AES and the ECC.Meanwhile , by making use of Information-Abstract algorithm,the system can validate the integrity and the authenticity of the information, and achieve the objective to make digital signature . Practice has proved that the programme,which can make the transmission in network safe and prompt, is a an effective method to send the confidential documents in Network, consequently ,it has a resplendent prospect.
Keywords/Search Tags:Cryptology, Encryption, ECC system, AES ststem, Digital Signature
PDF Full Text Request
Related items