Font Size: a A A

Based On The Application Of A Variety Of Network Transmission Of Information Security Technology Encryption System

Posted on:2009-09-01Degree:MasterType:Thesis
Country:ChinaCandidate:X H ZhuFull Text:PDF
GTID:2208360248952317Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with information age arrival, people's work, the study and the life has achieved the unprecedented degree to the information technology dependence. We are bigger to the information technology dependence, steal the risk which the information, the interpolation data, the hacker attack, the viral dissemination as well as the network attack of all forms create to be also bigger, network intelligence transmission security faced with huge challenge. The enhancement network information security already was an urgent matter, guaranteed the network transmission information the security kernel was must realize the information secrecy, the integrity and the status authentication. This article according to at present popular encryption algorithm and the financial enterprise actual service request, conducts the research to under many kinds of encryption system network intelligence transmission technology application, has carried on the outline to the classical cryptology and the modern cryptology, introduced three kind of different password systems. This article also to the DES algorithm, the RSA algorithm and the MD5 algorithm principle, the realization technology and the security carries on the elaboration and the analysis, proposed the combination encryption technology, through combines in the practical application uses the DES algorithm, the RSA algorithm, the MD5 algorithm, the guarantee network information security, the integrity and the status authentication. Carries on many kinds of encryption system network information security transmission system from the technical realization angle the design, has completed the system procedure development, the important information encryption transmission between Bank of Communications and enterprise customer has using this system. This article key technologies and innovation as follows:Information encryption technologyThe network information encryption through the use symmetrical key password system DES algorithm realization, the information which the transmitting end is going to transmit transmits after the DES algorithm encryption for the receiving end.Status authentication and DES key encryption technologyStatus authentication and DES key encryption uses the RSA algorithm to complete.Information integrity confirmation technologyThe network information complete confirmation uses the MD5 algorithm confirmation, the receiving end after the comparison receive MD5 value and the computation decipher the information MD5 value is whether consistent, may judge the receive the information integrityCombination encryption technologyThe combination encryption technology core is uses the RSA algorithm to encrypt the DES key, encrypts the main body information with DES, carries on the information integrity confirmation with the MD5 algorithm, outside the bank of communications Guiyang branch has applied this technology in the data encryption transmission system of other enterprise.
Keywords/Search Tags:Combination of encryption, Algorithm, RSA, DES, MD5
PDF Full Text Request
Related items