Font Size: a A A

Research And Implemention Of Information Security Encryption System Based On The RSA

Posted on:2010-07-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y FengFull Text:PDF
GTID:2218330371450306Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the continuous development of military technology, information operations are modern high-tech war is one of the most important operations, affecting every battle field joint campaign and space. Along with the computer technology progress, all of the network information system in military technology to emerge in endlessly, and against the development of new military revolution to make various combat resources dependence of military information system is growing, how to protect information system security has become the focus of research in the military field.Only do top design, unified regulation of information security system, and strengthen the framework of information security technology research, for various applications can provide information system construction, construction of information security and military informatization construction of synchronous development. first introduced network security technology, and the goal of information security and safety system, design principles and the safety design thought, and then discusses from the physical security, radiation safety, computer security,。According to the actual needs of military and improved the RSA algorithms, and finally in tactical Internet information security system, using the improved in many subsystem of RSA arithmetic combined with the most competitive price and in-depth analysis of encryption subsystem, established a new encryption system model. According to the high security and high-efficiency balance principle, plus determines the encryption system model of encryption algorithm, the security of the system of comprehensive analysis, and as such software for Delphi VB6.0 by use of encryption system development tool, programming model, and achieved good effect.
Keywords/Search Tags:computer network security, RSA algorithms, symmetry encrypt technique, asymmetry encrypt technique
PDF Full Text Request
Related items