Font Size: a A A

The Desing And Implementation Of Staff Attendance Management System Based On The Data Encryption

Posted on:2015-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:T W JuFull Text:PDF
GTID:2308330473454865Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid develop ment of China’s banking business, inform ation system to promote banks to improve work efficiency, improve service levels, expand the scope of business is more and more obvious. In the in formation system brings convenience, but also brings certain risk. Bank inform ation system takes the business services and data are very important, once destroyed, the bank and its customer interests caused serious damage. Therefore, the stability of banking security requirements of information system is very high. Electronic co mmerce services electronic payment, online banking in the banking business increased, m ore and m ore customers with th e help of com puter network information exchange fund. Therefore, to ensure the network transfer funds information security, preventing illegal th eft and m odify, become an im portant basic banking network in the construction of information.But with the rapid developm ent of business, type and quantity o f the bank information system is rapidly increasing. These information systems requires a different language, platform and architecture to im plement, the relation and the technology is more and more com plex. Provides security using computer encryption technology for the development of banking business. Inform ation system security has become a focus of bank internal, external s upervision. The risks of research in inform ation system development is the security problem s, leading to the r isk of information system. Development risk management work is a wo rk of overall managem ent of information system security design, implementation from the security and risk perspective, aim to protect and improve the safety of new research and development information system.Encryption technology is divided into tw o classes: symmetric encryption and asymmetric encryption technology. Asymmetric encryption is encrypted and decrypted with a dif ferent key, the outstanding re presentative of non symm etric encryption algorithms are RSA. Symmetric enc ryption is encrypted and decrypted using the same key, is a ty pical representative of the DES algorithm. The encryption and decryption process is identical, the only difference is the order of encryption and decryption subkey sequences on the contrary.This thesis is mainly discussed the important position of encryption in the software industry development, applications of the future Internet will be more and more close to public life, and safety of various types of data, personal and corporate inform ation is more important, so the encryption is the key link in the whole security. This paper from the key generation, encryption, decryption principle of DES principle of DES from three aspects: the whole pro cess of DES algorith m. And on this basis, in the general environment, to achieve the DES encryption and decryption algorithm, using Java tools such as Oracle, finished the dem onstration is a local key encryption system to form interface mode. This procedure can be extended in the future to the use of other systems, but also can be used as a good blueprint for a basic program for encryption system professional.
Keywords/Search Tags:Bank, encryption, DES
PDF Full Text Request
Related items