Font Size: a A A

Research And Implementation Of Encryption And Decryption System Based On Binary Stream

Posted on:2020-11-08Degree:MasterType:Thesis
Country:ChinaCandidate:J L ChenFull Text:PDF
GTID:2428330575981226Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the modern society,such as the Internet and the like,information dissemination and storage have become more and more important to the network,and the security of information becomes more and more important.In particular,after the Snowden incident,all countries have invested tremendous human and material resources in the field of information security in the country.Stream Cipher,also known as a stream cipher,is one of the most common cryptographic systems today because it has the advantage of many other passwords.The design of stream cipher is often targeted,and it is not necessary to pursue excellent performance in all aspects(this kind of stream cipher has not yet appeared),but to design the corresponding stream cipher according to the specific environment.For example,the eSTREAM program focuses on stream passwords used in resource-constrained and high-throughput environments.The general security strength of the stream cipher in this environment is not very high,as long as it has simple implementation,high speed and medium strength.The development of stream cipher in the future will pay more and more attention to practicability.If a stream cipher is only excellent in theory and poor in practicability,it will inevitably be eliminated.The system studied in this paper is based on a dynamic parasitic stream encryption algorithm.The encryption algorithm has high security and can be used in specific application scenarios.The disadvantage of this algorithm is that the time complexity of the algorithm is large.But basically accord with the development trend of stream cipher.This paper focuses on the analysis of the security of this dynamic parasitic encryption algorithm from the point of view of statistics.Using NIST to provide 15 kinds of statistical methods,and according to my experience,we propose that we should observe the chaotic degree of the encrypted images to get the security of the algorithm,and evaluate the security of the algorithm in an all-round way.According to my experience,I put forward some testing methods,such as generating image observation method,generating scatter graph,histogram method.The final verification results show that the encryption and decryption algorithm based on binary stream has excellent security and can scramble the plaintext at the sequence level.An approximate random ciphertext is obtained.The above test methods can directly prove this conclusion.In this paper,a feasible encryption and decryption system based on this algorithm,which is feasible on the Windows platform,is written in Java.This system provides a visual user interface to help ordinary people to encrypt and decrypt files.
Keywords/Search Tags:cipher stream, NIST, eSTREAM, encryption, decryption
PDF Full Text Request
Related items