Font Size: a A A

Research And Implementation Of File Encryption System Based On IOS Device

Posted on:2021-11-14Degree:MasterType:Thesis
Country:ChinaCandidate:W GuoFull Text:PDF
GTID:2518306104495694Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the coming of the 5G,mobile communication plays an inscreaseingly impoartant role in people's daily lives.As a mobile communication terminal,a mobile phone stores a large amount of important information such as pictures,videos or various important sensitive information.If the data on the mobile phone leaks,it is very likely to bring huge property losses to the users.Protecting data information on mobile devices is critical.The advantages of most mobile devices are portability,and there are significant limitations in performance due to their hardware.Based on the above two points,the choice of encryption method on the mobile terminal must consider the balance between computing performance and security.Compared with the traditional encryption algorithm,the content association key encryption algorithm has lower requirements on the encryption device,so it is more suitable for file encryption on mobile devices.Following the MVC design pattern,the system designs and implements a file encryption system based on the iOS system based on the content association key encryption algorithm,mainly for encrypting and decrypting resource files such as pictures and videos in the system.The most common MOV video format in the Apple system is parsed and the location of the keyframe in the video file is located.Combined with the content association key encryption algorithm,the key frames in the video file are extracted,and finally the key file is generated.At the same time,the encryption algorithm can also be applied to other inner files.According to the functions,it is mainly divided into user personal information function module,encryption module and shared key function module.Features such as image and video encryption,shared key,key rights management,and personal information management.After encrypting a file to generate a key in the system,the user transmits the key to the other through the system sharing function.After obtaining the decryption permission,the user can successfully decrypt and restore the original file.At the same time,on the system architecture,componentization of network library,user behavior and key management is realized.Optimized code structure.
Keywords/Search Tags:Content associated key, File encryption, iOS system
PDF Full Text Request
Related items