Font Size: a A A

Research And Application Of Information Encryption Technology In Public Data Center

Posted on:2011-04-25Degree:MasterType:Thesis
Country:ChinaCandidate:B Q MaFull Text:PDF
GTID:2178360302480111Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Currently, all the government functional departments have established independent information system with its own data center. The separate database and operating systems thus established make it possible to develop independently application software and user interface without interoperability. The lack of unified plan and standard for these free standing systems reduces the separately-built systems and networks into "Information Islands" , whose poor interconnection poses a serious restriction on the further development of the government administration informationization. To solve this problem and improve the development and use of information resource, information resource sharing, or the establishment of government common data center is the only way. Since there is large amount of sensitive information that needs network transmission in the government common data center, the security of the sensitive information determines the system integrity and stability. Securing information in encryption constitutes the core technology in achieving network information security.Cryptosystem includes two categories : symmetrical and asymmetrical. The former requires the same key for both encryption, which is usually fast, and decryption. Public key cryptosystem, on the other hand, has public key and private key, the process of encryption differs from that of decryption. In spite of its merits, the public key cryptosystem is slow in encryption and decryption. It is not practical when a to-be-transmitted message needs encryption and decryption.Featuring simple realization, fast encryption and super anti-aggressivity, the round function of AES algorithm is regarded as an ideal symmetric key cryptographic algorithm; tested and acknowledged as a safe public key cryptographic algorithm, RSA algorithm can be applied both to data encryption and digital signature.Based on the application of information system of government common data center of Shanghai, this paper carries out a detailed research on core algorithm and other key issues of information encryption techniques. To remove the security risk in network transmission caused by session key of symmetric key cryptographic algorithm, the AES algorithm and RSA algorithm are combined as encryption technique in system design. The symmetric key cryptographic algorithm AES is adopted to encrypt and decrypt information transmitted on internet, and asymmetric key cryptographic RSA is employed to encrypt and decrypt the key of AES, thus making the best of the fast encryption of the former and good privacy of the latter.
Keywords/Search Tags:Data Center, Information Encryption, AES, RSA, Conjoint Encryption
PDF Full Text Request
Related items