Font Size: a A A

Application Of Electronic Signature Technology In Document Protection

Posted on:2014-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:J GuiFull Text:PDF
GTID:2298330434950998Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Abstract:With the development of electronics continuously improving the level of informationization, the paperless office has become the trend of social development, which has been used more and more. Word is often used to process document information in the paperless office, but how to ensure the security of Word file and how to be convenient to embed electronic seal in the document image become more and more urgent to solve the problem. The problems——the signature effect, verifying the authenticity of the document content, preventing its being tampered,need solving, which can promote the further application of the paperless office mode. Based on the above requirements, research and development of the electronic seal system are conducted and in this paper a detailed analysis of the design and implementation is given.The thesis analyses chaotic system and modern cryptography by using ATL COM technology combined with the Office Word two developments and COM component technologyand, realizes that the electronic seal system has a signature, authentication and other functions of the documents by applying the chaos encryption and hash algorithm. First,this thesis analyzes the research background of electronic signature in the Word document and the current application status, and then introduced the related theory and key technologies of this system, including the COM/ATL component technology, basic VBA, MFC, and MS Word two developments and interface technology.Second,in order to achieve the overall electronic signature scheme, design and analyse the overall design framework of the seal systemand the seal system signature tool, the seal image, document encryption authentication, document locking the main module, the tool inserting MS Word software,the signature function; Third, combining chaos theory with cryptography, achieve a both encryption and hash, encryption document content with ciphertext, the hash value to save and transfer, as the basis and security verification documents complete, in the receiver can achieve chaotic decryption plaintext content reduction; then this document encryption and hash algorithm is applied to the actual Word document protection, a detailed analysis of how to use the methods of chaotic encryption and decryption document content and how to use the chaotic hash verification document content integrity, the document security has been further strengthened; finally, using MS Word two development interface of the document is locked, to guarantee its contents safe; each module in detail after finally, the results show. Finally, the thesis summarizes the work and the next work.In the course of this study, the thesis successfully combines the chaos theory and cryptography.The preliminary application is achieve based on the electronic signature system, and the safety performance of MS Word is enhanced.
Keywords/Search Tags:Electronic Signature, ATL, Word compound file, ChaoticEncryption, Hash Recognition, Documents lock
PDF Full Text Request
Related items