Font Size: a A A

The Technology Of Encrypting The Files In USB Flash Disk

Posted on:2014-08-29Degree:MasterType:Thesis
Country:ChinaCandidate:M FanFull Text:PDF
GTID:2298330422469060Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of science and technology, people have certain requirements for files portability. Because of simplicity and portability, U disk naturally become the first choice for most people.Due to its universality, More and more people put some more important documents into the U disk. When the U disk lose, the files and privacy is more likely to be stolen. The missing files have a great impact on our life. It may make a futile effort on our work and study. Some privacy files, especially confidential documents can cause a lot of misunderstanding and tremendous loss. Consequently, encryption is the best answer to data security, and it is also the trend of the U disk security.This issue aims at implementing the cryptographic protection of U disk files, and preventing illegal operation.When the U disk is encrypted, the access speed of encrypted files also need consideration. The answer of this question is not only related to hardware, the algorithm selected for U disk encryption also has a direct relationship.In this issue, several well-known encryption algorithms are introduced. According to this, the algorithms are analysised to find the best matchied U disk files. The target of this paper is to make the U disk which has encryption software manage and operate the files in the U disk more efficiently, through the chose of encryption algorithmIn this issue, C++is applied, In the process of implementation, C++language is mainly used to program rows and MFC which is a class library has been used to implement the interface in the preparation. The technology of reading and writing U disk sector is applied, to implement the operation of U disk sectors.Based on the reasonable requirements analysis, the particular design and code is completed. with codes finshed, part of the description about the key function of the program has been achieved,as well as the process flow diagram of the system module.Finally, we get the conclusion and discuss the experiment resulting in the process of experiment.
Keywords/Search Tags:U disk, Encryption, Sector
PDF Full Text Request
Related items