国产伦乱,一曲二曲欧美日韩,AV在线不卡免费在线不卡免费,搞91AV视频

網(wǎng)絡(luò)系統(tǒng)安全中混合加密技術(shù)研究

發(fā)布時(shí)間:2019-05-17 18:20
【摘要】:隨著計(jì)算機(jī)網(wǎng)絡(luò)使用越來(lái)越廣,人們更加傾向用網(wǎng)絡(luò)系統(tǒng)方式來(lái)實(shí)現(xiàn)各種數(shù)據(jù)交換。尤其是在網(wǎng)絡(luò)文件傳輸范疇中更加頻繁出現(xiàn),阿里巴巴、騰訊等公司的虛擬支付已是為主流支付方式。由此帶來(lái)的安全問(wèn)題尤為嚴(yán)重。網(wǎng)絡(luò)系統(tǒng)攻擊手段千變?nèi)f化,防不勝防。網(wǎng)絡(luò)系統(tǒng)數(shù)據(jù)被截?cái)、修改、重新發(fā)送的事件經(jīng)常發(fā)生,這嚴(yán)重妨礙了網(wǎng)絡(luò)系統(tǒng)的推廣以及應(yīng)用。如何在計(jì)算機(jī)網(wǎng)絡(luò)中安全的傳遞數(shù)據(jù),認(rèn)證數(shù)據(jù)的正確性,確認(rèn)其完整性以及數(shù)據(jù)來(lái)源無(wú)法抵賴性變?yōu)榻陙?lái)各大算法研究機(jī)構(gòu)研究的關(guān)注熱點(diǎn)。基于上面需求,本文對(duì)加密技術(shù)來(lái)進(jìn)行了詳細(xì)的研究以及原理分析,提出用混合加密技術(shù)來(lái)保證網(wǎng)絡(luò)系統(tǒng)安全,并用到簡(jiǎn)單的文件傳輸系統(tǒng)模型中。本文首先介紹了國(guó)內(nèi)外針對(duì)網(wǎng)絡(luò)系統(tǒng)安全技術(shù)的研究現(xiàn)狀以及承受著的極大挑戰(zhàn),接著介紹了兩種加密知識(shí):對(duì)稱加密算法--非對(duì)稱加密算法。通過(guò)仔細(xì)分析各種密碼算法的性能特點(diǎn)后,找出各自的優(yōu)點(diǎn)和劣勢(shì),最后提取各種算法的優(yōu)點(diǎn)彌補(bǔ)各自不足,組合成新的混合密碼技術(shù)算法。針對(duì)對(duì)稱密碼技術(shù)、非對(duì)稱密碼技術(shù)以及摘要算法來(lái)進(jìn)行分析篩選,最終在混合加密技術(shù)中確定了三種密碼算法:DES(數(shù)據(jù)加密標(biāo)準(zhǔn))、ECC(橢圓曲線密碼算法)以及MD5(消息摘要算法),這樣既確保了計(jì)算機(jī)網(wǎng)絡(luò)上數(shù)據(jù)轉(zhuǎn)發(fā)傳送的正確性以及健壯性,又加大了數(shù)據(jù)的傳遞速率;谝陨先N算法結(jié)合而成的混合加密技術(shù),本論文最終提出設(shè)計(jì)了在簡(jiǎn)單文件傳輸系統(tǒng)中的使用方案,先介紹設(shè)計(jì)理念再提出詳細(xì)運(yùn)行方案再到針對(duì)系統(tǒng)的運(yùn)維都做了詳細(xì)描述,并構(gòu)造了一個(gè)網(wǎng)絡(luò)系統(tǒng)通信模型,用到此系統(tǒng)。本文在最后給出各模塊的算法選擇和編程流程圖并針對(duì)各個(gè)模塊的功能做出具體描述。通常在計(jì)算機(jī)網(wǎng)絡(luò)中傳輸數(shù)據(jù)是采用對(duì)稱加密算法,這導(dǎo)致密鑰分發(fā)以及管理會(huì)出現(xiàn)很多漏洞,若用人工分發(fā)密鑰的話,人力更不上。也會(huì)致使網(wǎng)絡(luò)系統(tǒng)上數(shù)據(jù)傳遞的簡(jiǎn)易迅速以及健壯性沒辦法兩全。DES和ECC兩種密碼算法是很優(yōu)秀的密碼算法,結(jié)合以上幾種密碼算法而成的混合加密密碼算法可以更好的保證計(jì)算機(jī)網(wǎng)絡(luò)中上信息傳遞的健壯性以及傳遞的效率。在當(dāng)今文件傳輸系統(tǒng)中基于混合加密密碼算法的應(yīng)用還未獲取很好的推廣,因此本文提出這種設(shè)想并設(shè)計(jì)系統(tǒng)方案最后實(shí)踐于文件傳輸系統(tǒng)中,到達(dá)保證在計(jì)算機(jī)網(wǎng)絡(luò)中數(shù)據(jù)傳遞的簡(jiǎn)易迅速、健壯及正確的要求,又能讓密鑰的分發(fā)以及處理變得簡(jiǎn)單,這個(gè)方向的研究是有著較大的前途的。
[Abstract]:With the increasing use of computer networks, people are more inclined to use network systems to achieve a variety of data exchange. Especially in the field of network file transmission, Alibaba, Tencent and other companies have become the mainstream payment method. The resulting security problems are particularly serious. Network system attack means are changeable and insurmountable. The events of truncation, modification and resend of network system data often occur, which seriously hinders the promotion and application of network system. How to transfer data safely in computer network, verify the correctness of data, confirm its integrity and unrepudiation of data sources has become the focus of attention of major algorithm research institutions in recent years. Based on the above requirements, this paper studies the encryption technology in detail and analyzes the principle, and proposes to use the hybrid encryption technology to ensure the security of the network system, and use it in a simple file transfer system model. This paper first introduces the research status and great challenges of network system security technology at home and abroad, and then introduces two kinds of encryption knowledge: symmetric encryption algorithm-asymmetric encryption algorithm. After carefully analyzing the performance characteristics of various cryptography algorithms, we find out their own advantages and disadvantages, and finally extract the advantages of each algorithm to make up for their shortcomings and combine them into a new hybrid cryptography algorithm. Aiming at symmetric cryptography, asymmetric cryptography and abstract algorithm, three kinds of cryptography: DES (data encryption standards are determined in the hybrid encryption technology. ECC (Elliptic Curve Cryptography) and MD5 (message Summary algorithm) not only ensure the correctness and robustness of data forwarding and transmission on computer network, but also increase the transmission rate of data. Based on the hybrid encryption technology combined with the above three algorithms, this paper finally proposes a scheme to use in a simple file transfer system. First, the design concept is introduced, then the detailed operation scheme is put forward, and then the operation and maintenance of the system are described in detail, and a network system communication model is constructed, which is used in this system. At the end of this paper, the algorithm selection and programming flow chart of each module are given, and the function of each module is described in detail. Usually, symmetric encryption algorithm is used to transmit data in computer network, which leads to many vulnerabilities in key distribution and management, even less manpower if the key is distributed manually. It will also lead to the simplicity, rapidity and robustness of data transmission on the network system. Des and ECC cryptography algorithms are very good cryptography algorithms. The hybrid encryption cryptography algorithm combined with the above cryptography algorithms can better ensure the robustness and efficiency of information transmission in computer networks. In today's file transmission system, the application based on hybrid encryption cryptography algorithm has not been well popularized, so this paper puts forward this idea and designs the system scheme, and finally practices it in the file transfer system. To ensure the simple, rapid, robust and correct requirements of data transmission in computer networks, and to make the distribution and processing of keys simple, the research in this direction has a great future.
【學(xué)位授予單位】:南京郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TP393.08

【參考文獻(xiàn)】

相關(guān)期刊論文 前3條

1 肖凌,李之棠;公開密鑰基礎(chǔ)設(shè)施(PKI)結(jié)構(gòu)[J];計(jì)算機(jī)工程與應(yīng)用;2002年10期

2 孟桂娥,董瑋文,楊宇航;公鑰基礎(chǔ)設(shè)施PKI的設(shè)計(jì)[J];計(jì)算機(jī)工程;2001年06期

3 馮登國(guó);PKI技術(shù)及其發(fā)展現(xiàn)狀[J];計(jì)算機(jī)安全;2001年01期

相關(guān)博士學(xué)位論文 前1條

1 劉小紅;PKI:證書狀態(tài)信息分發(fā)方法研究和系統(tǒng)設(shè)計(jì)[D];浙江大學(xué);2001年

,

本文編號(hào):2479308

資料下載
論文發(fā)表

本文鏈接:http://lk138.cn/guanlilunwen/ydhl/2479308.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶41df1***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com
98AV精品久久久久| 日本免费一区二区三区最新vr| 偷拍 亚洲 中文字幕| 少妇下面被入欧美| 97免费观看视频| 日韩欧美一级高清一区| 国产日本欧美在线一区二区| 欧美视频精品一区| 欧美a免费在线观看| 亚洲AV西一区二区三区| 老湿机午夜网| 欧美一区7区| 五十路熟妇高龄视频免费观看| 大鸡巴骚逼66| 大黑逼干大黑逼| 久久激情射| 亚洲av成人黄色| 高清无码人妻一区二区三区| 亚洲伊人久久久亚洲伊人网| 亚洲人妻第2页| 久www人人爽人人爽| 日韩中文3区| AVT2014国产中文字幕| 美女插开腿让男人插进来的网站| 成人网免播放器在线观看日韩欧美| 日本产品一区一区三区有限在线| 久久精品国产av无码中文字幕| 欧美日韩亚洲天堂领品| 96内射少妇| 加勒比AV中文一区二区三区| 欧美视频一一区二区| 日本人妻中文字幕在线一区| 美女露出骚逼无遮挡| 无码a网址| 91精品国产99re| 欧美日本韩国人妻| 不卡二区| 欧美综合在线深爱| AV电影网站一区二区| 看亚洲人毛片| 一级黄色片香蕉视频在线|