Font Size: a A A

The Design And Implementation Of Catholic Management Software Encryption System

Posted on:2017-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:Q H LiFull Text:PDF
GTID:2428330596956768Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid spreading of Catholicism in China,electronic computerization of the church affairs is the path of development.However,in management system,information security problems for the whole management operation has a great impact on the church.The introduction of the software encryption system effectively avoids the illegal using of software,and illegal accessing of data,and solves the potential hazard safety.By studying the current relatively popular encryption method,this paper chooses the hardware to realize he software encryption protection based on the characteristics of the software.By studying a large number of encryption algorithms,AES,the present advanced encryption standard,was served as the key encryption algorithm,and the algorithm of key extension is improved.Adding a one-way strategy reduces the correlation between the child and the adjacent keys,and cuts the key internal correlation by the cyclic shift.Considering the appearance of the encryption lock,this paper adopts a system hardware design based on C8051F320 which has the high integration level,and develops the system hardware,software and device driver according to the requirement of equipment.The Encryption Model that is designed according to the characteristics of the Catholic churches management system includes authentication,the protection of random number and the key parameters.Combining with the characteristics of Catholic management software and analyzing the need of encryption protection,this paper chose three layer encryption for software point and combined it with encryption model to achieve high strong protection.Finally,it made multiple authentication to the encryption system,and analyzes the safety of the can decode method.This paper proves that is reasonable whatever to the choice of encryption point or to encryption model design.
Keywords/Search Tags:Encryption lock, AES algorithm, Man-machine interface device, Encryption system, Key extension algorithm
PDF Full Text Request
Related items