Font Size: a A A

Research On Two-Dimensional Code Security Based On PKI Technology

Posted on:2018-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:W J ShiFull Text:PDF
GTID:2348330518953999Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile Internet and the large-scale promotion of intelligent terminal equipment,electronic tag technology has been gradually used in all walks of life.Two-dimensional code as a carrier of information,but also information collection,data storage important methods and means,has been in the logistics management,industrial automation,e-commerce and other fields has been widely used,but also produced a series of information Security issues,especially in the field of e-commerce,how to prevent two-dimensional code information is forged or tampering and other issues,which has been related to the vital interests of each person,and two-dimensional code security research has become one of the hot research in the world.This paper analyzes in detail the development process,application field and security problem of two-dimensional code generation.Research on two-dimensional code codec algorithm,digital encryption and decryption algorithm.The coding and decoding of QR codes and the RSA algorithm in asymmetric public key system are studied emphatically.On the basis of this research,a two-dimensional code security algorithm based on PKI technology is proposed.The algorithm uses the private key to encrypt the two-dimensional code information,decrypts it with the public key,and changes the public key encryption in the traditional PKI technology The The algorithm solves the security problem of tampering and authenticity of two-dimensional code information.In this paper,we use C#programming language to design and implement RSA-based two-dimensional code encryption and decryption application system.The system platform includes public and private key generation module,encryption and decryption key management module,two-dimensional code design and generation module,two-dimensional code recognition and decryption module.Completed the PKI public key system CA certification center,service providers and users of the three roles.This system mainly solves the security risk that the two-dimensional code information flow may have in transmission.The key management module in the system is responsible for encryption,and the public key is responsible for decrypting,the key management scheme is closed,which not only solves the security of data transmission,but also guarantees the reliability of identity authentication.This encryption and decryption mode is more in line with OTO e-commerce model authentication and identification.
Keywords/Search Tags:QR two-dimensional code, PKI public key system, mobile terminal, e-commerce, RSA algorithm
PDF Full Text Request
Related items