Font Size: a A A

Date Encryption Technology Research Based On E-Business Security

Posted on:2012-11-14Degree:MasterType:Thesis
Country:ChinaCandidate:H X DaiFull Text:PDF
GTID:2248330362966429Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
E-business is brought out as a result of the excellent combination of computer,mobile communication and internet technology and so on. The reasons why e-businessis popular among the large number of the users are that it provides them for moreabundant information, the simple transaction ways and the cheaper cost. However, inthe present time the safety is a most important barrier to the development of E-business.As we know, data encryption is a core technology to ensure the e-business security, atthe same time it is also an essential part of its safety technics.The information transmitted by internet is encrypted by Data encryption, because itcan satisfy the need of the e-business safety and data integrity. What’s more, digitalsignature can also prevent repudiation.Nowadays there are two kinds of encryption techniques that we call themsymmetric and asymmetric encryption techniques. Symmetric encryption techniquesadopt the same keys to encrypt and decrypt information. Its traits are that the encryptionspeed are fast, furthermore it can apply to the large sum of data and information.However, it has some shortcomings, including the loss of keys’ management andsecurity.Two keys are made use of by asymmetric encryption techniques. We can callthem public keys and private key, and what is important is that they should be usedtogether. Otherwise nobody can open the files. It is said that public keys can be inpublic and it is unnecessary to be afraid of it is be known by others. Meanwhile it isconvenient for addressee to decrypt their files. After that it can avoid the problems ofthe transmission safety. Although it is safe, it brings about the matters that the files areencrypted at a slower than normal speed. It is hard to satisfy the demands of theinformation’s high safety and speed if we just simply use symmetric and asymmetricencryption techniques for the sake of better development of e-business. Therefore thisassay adopts to an encrypted and unencrypted mixture after it fully discusses theirthoughts, methods and character.1、It introduces many kinds of main encryption algorithms, including the basic idea,ways and characters of symmetric encryption algorithm and asymmetric cryptography.2、The principles and performance of AES, ECC are also discussed in this thesis.3、It introduces the concept and trait of digital signature, mainly introduces theimplementation principle,method and safety of MD5used in digital signature. 4、It proposes a mixed encryption system based on AES, ECC and MD5;Combineing with the characteristics of secure transaction in E-business, The mixedencryption system can apply to SET protocal in order to protect the security ofinformation transmission and realize dual digital signature.
Keywords/Search Tags:date encryption, symmetric encryption, asymmetric encryption, mixed encryption
PDF Full Text Request
Related items