Font Size: a A A

Design And Implementayion Of The Information Security System For Bank

Posted on:2013-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:X H HeFull Text:PDF
GTID:2248330374499203Subject:Software engineering
Abstract/Summary:PDF Full Text Request
This paper describes the basic concepts of data encryption, data encryption key encryption method, and data encryption techniques, analysis of data encryption techniques in the status quo in the banking system, given the reasonable suggestions, and information security systems designed to meet the bank’s information confidentiality requirements.With the gradual development of digital information technology, human beings increasingly dependent on the network. In this context, information security is particularly important, especially banks and other financial institutions, information security, related to citizens’property, privacy and other sensitive information, the development of information security systems for banks is very urgent. The issue of encryption technology and through key management systems research, develop and complete the banking information security system design. Personal information to enhance safety of the information age has an important positive significance.The subject used a combination of theory and practice of the method, comparative analysis from multiple perspectives the advantages and disadvantages of various encryption algorithms, standing on the feasibility of system implementation point of view gives the rationalization proposals, the final design and implementation of information security in banking system. The system involves software, hardware, deployment and some physical, which the author made a major contribution in the software level. The software encryption/decryption, key system with the mainstream3DES, RSA algorithm, other algorithms are also described and deeper levels of varying degrees of implementation.Author is responsible for the design and implementation of3DES algorithm based on the bank counter information security modules, tested to meet the system design features and performance objectives, the actual effect is very good.The author also completed the process involved in system design and implementation of several key technologies, including system security, password-based keyboard (PINPad) of the3DES hardware encryption key management, key exchange, password, keyboard-driven commands, encryption algorithm programming test program code to write, and write code for simulation demo work.Again, the completion of the corresponding system server platform design, implementation of the system server deployment and implementation. While completing the application services software functional design, each functional module of the system carried out a detailed design, implementation and gives some examples of renderings and the core code.The subject of research on information transmission in the security system design has a certain significance, the results have been the subject of reality in a number of enterprise applications. Since the actual use of specialized hardware products are more involved, more difficult to deploy, the overall operation of the system demanding, for the convenience of the reader to understand the system is running, the authors specifically developed simulation demo, to show the system’s core logic.In this article, on the forward-looking assessment of biometric technology, to achieve some functionality, set aside room for expansion and improvements made based on the actual application of ideas.Implementation of the system, solve the problems of the financial industry private information secure transmission, storage, put that to improve enterprise security, has made some social benefits. This paper designed and implemented a variety of encryption methods, other companies can, through the platform, coupled with the appropriate transformation to apply.
Keywords/Search Tags:information security, data encryption, key managementsymmetric-key, asymmetric-key
PDF Full Text Request
Related items