Font Size: a A A

Research On File Transfer Security Technology

Posted on:2015-10-26Degree:MasterType:Thesis
Country:ChinaCandidate:Z H XiaoFull Text:PDF
GTID:2298330467468535Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
Since entering the information age, human life has undergone enormous changes.Especially with the rapid development of information technology, the widespread useof the Internet, human life changing, changing. At the same time, transfer and accessfiles has become an important part of people’s online activities, people onlineactivities increasingly high security requirements. Network security is one of theimportant information security research, but also the current hot topic in the field ofinformation security. Data protection network system against accidental or maliciousreasons destruction, alteration, disclosure, one of the main contents of networksecurity. SMEs, the current transmission system network security is poor, to forcedata brought great security risk. In order to solve the problem of SMEs securetransmission of documents, design and implementation of a set of documents forSMEs secure transmission system.Currently more practical approach is to network data transmission is encrypted, anddata encryption to rely on sophisticated data encryption algorithm. From the ISOnetwork protocol layers of data security model to analyze the mechanisms discussedin detail typical of DES and RSA algorithm, and safety principles of the traditionalsystem and the public key cryptosystem; VisualC++platform in the design andimplementation of network data encryption decrypt the transmission system. Namelythe establishment of a secure data transmission system. Achieved RSA digitalsignature, DES and DES encryption, and data encryption RSA encryption modulemixture; achieve the data transmission between the client encrypted with the serverand key management, including key generation, storage, delete, modify, and query.
Keywords/Search Tags:encryption technology, DES algorithm, RSA aorithm, mixed dataencryption, security transmission
PDF Full Text Request
Related items