Font Size: a A A

Research On Transparent Encryption And Decryption Of Pseudo-random Variable Keys

Posted on:2018-04-07Degree:MasterType:Thesis
Country:ChinaCandidate:B TangFull Text:PDF
GTID:2348330512981425Subject:Information security
Abstract/Summary:PDF Full Text Request
In the era of rapid development of information technology,individuals need to deal with massive digital files.With the computer users on the privacy of data,core confidential data protection awareness of the growing,document information security issues become an unavoidable topic of today's era.In order to protect the security of confidential documents comprehensively,this paper designs a simple and easy-toimplement file system key management model.The model uses the symmetric encryption algorithm to achieve the "one-time-one-key" encryption effect.In this article we have done a technical development in the use of file keys.In the model,the same user uses different keys for each file to encrypt the protection;the same file after each use,are using different keys for encryption protection;different users according to their role to achieve confidentiality of confidential documents of the hierarchical access control.Through the formal analysis of the security of the model,the classification of the various means of adversarial attacks,proved that the model has the security,flexibility and efficiency of protecting the confidential documents,and by compare with other key system management model from the design security,use efficiency,access control function to give the superiority of this model.The use of the above key management model technology to build the file encryption and decryption system combined the pseudo-random variable key management technology,transparent encryption and decryption technology,distributed backup technology and system Hook technology to protect all aspects of confidential information confidential information.The file system can achieve the "one-time-one-key" encryption effect.The confidential documents saved by the user without changing the user's original habits.The system's access control is based on the user's access control Role RBAC access control form,compared to the access control list and access capacity list,with better scalability and portability.System using the distributed backup technology has a strong disaster recovery characteristics,can be effectively restored loss or damage to the file.There are early warning mechanism to avoid the user leak confidential documents of various dangerous behavior.The entire file system not only takes into account the key security and encryption and decryption operations to facilitate the characteristics,but also to prevent legitimate users in non-confidential place disclosure the file in the environment.
Keywords/Search Tags:pseudo-random sequence, key distribution, access control, transparent encryption and decryption
PDF Full Text Request
Related items