Font Size: a A A

Research And Implementation Of Mes System Security Modules Are Based On Encryption And Decryption Algorithm

Posted on:2014-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:X C QiuFull Text:PDF
GTID:2348330473951285Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
MES software is located between the upper enterprise production plan and underlying industrial control. It is a software for the production management technology in the workshop and the real-time information system. With the growing dependence on the MES system of each enterprise, the MES system exposed its vulnerability increasingly, due to the loss and damage of the important data in the system, the data leaked during transmission, it caused irreparable loss, the attack on the MES system makes incidents which negatively affected its operation appears constantly. MES system security management has become an increasingly critical part in the industry and the enterprise management. This paper is used to improve and package mainstream encryption and decryption algorithm to realize defense of information and protection of the MES software, it ensures the confidentiality and integrity of the information and so on, in addition, it assembled the digital certificates?public key cryptography and the CA collection to be a complete enterprise-class architecture system through PKI.Firstly, combine the 3DES Algorithm and the RSA Algorithm to realize the confidentiality, integrity, repudiation and can increase the encryption speed effectively, combine the digital certificate authentication system and user name with password, it makes a better protection of the management of the software users and makes the system more security. When asking the server for data exchange, it should firstly verify the certificate which was issued by the CA system to the client to avoid the situation third-party attacker steal the password to distort data. Additionally, from the perspective of software protection, when the RSA used during the software registration, registered locally under the case of non-networked computers realized secure registration and each cycle time to re-register, registration code is not in the memory, it avoid the situation of software crackers gained license through decompilation. creatively apply the image hiding data technology to the software registration machine. This encryption mode research finally applied in the practical business development and achieved a good safety results under the trial operation.The significance of this paper is combining theory with practice, applying knowledge computer cryptography in enterprise security module development, constructing a safe and efficient enterprise security architecture, and good module extensibility is convenient for follow-up development.
Keywords/Search Tags:The RSA asymmetric encryption algorithm, The 3DES symmetric encryption algorithm, PKI public key infrastructure, digital certificate, Non network registration
PDF Full Text Request
Related items