Font Size: a A A

The Design And Implementation Of Military Chat System

Posted on:2014-10-08Degree:MasterType:Thesis
Country:ChinaCandidate:G H SuFull Text:PDF
GTID:2268330425462260Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, network communication has gradually become an important means of information exchange. Information security problem is getting people’s attention. In particular is the special fields of data confidentiality and information security has become more important. Information as a resource, its universality, sharing, value-added, and can handle multi-utility, making it especially important for human significance.Network information security, refers to the network system and save the data flow, are not subject to accidental or malicious destruction, disclosure, alteration continuous system work properly, the network service is not interrupted, so that the information is correct, complete, unobstructed transmission to the specified location. Broadly speaking, all related to the network information confidentiality, integrity, availability, authenticity and control technologies and theories are related to network security areas to be studied.Information security has attracted increasing attention, the encryption algorithm directly determines the quality of information security. Encryption algorithm has gone from simple to complex, from private to public, from the traditional theory of encryption to have a huge support rapid development of new encryption process.Military secrets is confined within a certain time to a range of human knowledge, is not open to the public and is directly related to the interests of national security and military matters. For example, national defense and fighting forces construction planning and its implementation; military deployment, combat and other important military action plans and their implementation; readiness exercises, military training programs and their implementation.To ensure the security of data is often used for data encryption, an encryption algorithm can be divided into symmetric and asymmetric encryption algorithm encryption algorithm, symmetric encryption algorithm commonly used to sensitive information is encrypted data; asymmetric encryption algorithms are different encryption and decryption keys for data encryption and decryption. Wherein the symmetric encryption algorithm AES encryption algorithm most used, AES algorithm-based arrangement and replacement operations.Military chat system used by Microsoft Visual Studio2008as a development tool, MySQL database as a database, the system uses the C/S system architecture. C/S structure is characterized by a high security, efficiency and other characteristics, the system can achieve safe and efficient performance, but also conducive to post-maintenance and upgrades.This system is mainly around for the majority of soldiers in the army to build practical internal network chat system. Uses encryption technology to encrypt data transmission and processing, to prevent the disclosure of information within the army chat.In this thesis, chat system from military encryption algorithm selection and on the face of the system design and implementation conducted in-depth analysis. Demand on the system design, outline design, detailed design and the realization of the above for a detailed description. Using professional structure diagram, class diagram flow chart drawing tools and other professional image of the specific function of the system structure has been described in detail.
Keywords/Search Tags:information security, encryption, chat systems, network communicatio
PDF Full Text Request
Related items