信息加密算法分析及在文件中加解密的应用.doc
约57页DOC格式手机打开展开
信息加密算法分析及在文件中加解密的应用,摘 要信息技术的飞速发展,使人们的生活面貌发生了很大的变化,同时信息技术也促进了社会的发展。在计算机网络深入普及的信息时代,信息本身就是时间,就是财富。如何保护信息的安全使之不被窃取及不至于被篡改或破坏,已成为当今普遍关注的重大问题。密码是有效且可行的办法。本论文主要是介绍了文件加密以及一个小程序,从密钥生成、des加...
内容介绍
此文档由会员 wanli1988go 发布
摘 要
信息技术的飞速发展,使人们的生活面貌发生了很大的变化,同时信息技术也促进了社会的发展。在计算机网络深入普及的信息时代,信息本身就是时间,就是财富。如何保护信息的安全使之不被窃取及不至于被篡改或破坏,已成为当今普遍关注的重大问题。密码是有效且可行的办法。
本论文主要是介绍了文件加密以及一个小程序,从密钥生成、DES加密原理、DES解密原理三方面阐述了DES算法的整个过程。并在此基础上,在windows环境下,利用java实现DES加密与解密算法,以窗体界面方式完成一个本地的文件加解密演示器。
本论文共分为七部分。第一章从现代电子技术的发展揭示密码学在科学领域中的重要性,从而说明选此课题作为毕业设计的原因。第二章讲述了密码学的基础知识。第三章是本文的重点,以DES历史回顾为起点,逐一揭示DES算法原理,并按密钥生成、DES加密、DES解密的次序,利用java语言实现DES的加密与解密代码的设计。第四章对窗体界面作简要的介绍,说明本演示器的工作过程。第五章对DES存在的安全性进行分析及可行的解决方案。第六章对DES的工作模式进行简要的介绍。第七章举例对代码进行测试,看是否符合标准的DES加密和解密。
关键词:信息安全;密钥;DES;加密;解密
Abstract
The information technology rapid development, caused people’s life appearance to have the very big change, simultaneously the information technology also promoted society development. In the computer network thorough popularization information time, information itself is the time, is the wealth. How protects the information security to cause it not to be stole and as for not to tamper with or destruction, has become the major issue which now generally pays attention . The password is useful and effectible method.
This article mainly introduces the DES encryption and decipher algorithm java language realization, three aspects elaborated from key fresh、the encryption principle DES、the decryption principle DES algorithm entire has worked. And in this foundation, in windows environment, realizes the encryption and decryption algorithm using java, completes a local document by the window contact surface way to add the decipher demonstration.
The article divides into seven to blow. First chapter promulgates cryptology from the modern electronic technology development to be important in scientific domain, thus explained chooses this topic to take the graduation project originally. Second chapter narrated the cryptology elementary knowledge. Third chapter is this article key point, take narrates the DES history as the beginning, explain the DES algorithm principle, meanwhile how to make the encryption key、encrypts the DES、decrypts the DES as the line, realizes the DES encryption and decipher code using java language supposes discusses. Fourth chapter makes the simple introduction to the window contact surface, explain the working process of the decipher demonstration. Fifth chapter carries on the analysis to the DES existence security simultaneously to separate out the feasible solution. Sixth chapter carries on the brief introduction to the DES working pattern. Seventh chapter gives an example to carry on the test to the code, confirms whether conforms to the standard DES encryption and decryption.
KEYWORDS:Information security; key; DES; Encryption; Decipher
目录
摘 要 I
Abstract II
第一章 引 言 1
1.1本课题的研究意义 2
1.2 攻击 3
第二章 密码学的基础知识 5
2.1对称密码的模型 5
2.2密码编码学 6
2.3公钥密码学 6
2.4 Caesar密码 7
2.5单表代换密码 8
2.6 Playfair密码 9
2.7 Hill密码 10
2.8 多表代换密码 11
2.9 一次一密 13
2.10 置换技术 14
2.11 转轮机 15
2.12 隐写术 16
第三章 数据加密标准DES 17
3.1简化DES 17
3.1.1 S-DES的密钥产生 17
3.1.2 S-DES加密 18
3.1.3 简化DES的分析 19
3.2 DES 19
3.2.1 密钥产生 22
3.2.2 DES解密 23
3.3 JAVA实现JCE中DES的加密和解密 23
3.3.1 JCE中DES加密 24
第四章 窗体界面 28
4.1界面视图 28
4.2演示器工作工程 28
第五章 DES的安全性分析 29
5.1 DES的安全性 29
5.2 相关解决方案 29
第六章 DES工作模式 30
6.1电子密码本模式ECB 30
6.2密码分组链模式CBC 30
6.3 密码反馈模式CFB 30
6.4 输出反馈模式OFB 30
6.5 计数模式CTR 31
第七章 代码测试 32
致 谢 33
参考文献 34
附录 35
附录A:外文资料翻译-原文部分 35
附录B:外文资料翻译-译文部分 38
附录C:程序代码 40
参考文献
Barker,W.Introduction to the Analysis of the Data Encryption Standard
(DES).Laguna Hills,CA:Aegean Park Press,1991
Biham,E.,and Shamir,A.Diffrential Cryptanalysis of the Data Encryption Standard.New York:Springer-Verlag,1993.
Blake,I.,Seroussi,G.,and Smart,N.Elliptic Curves in Cryptography. Cambridge:Cambridge University press,1999.
Campbell,K.,and Wiener,M.”Proof that DES is not a Group.” Proceedings,Crypto’92,1992;New York:Springer-Verlag.
Coppersmith,D.”The Data Encryption Standard(DES) and Its Strength
Against Attacks.”IBM Journal of Research and Development,May 1994.
Denning,D.Cryptography and Da..
信息技术的飞速发展,使人们的生活面貌发生了很大的变化,同时信息技术也促进了社会的发展。在计算机网络深入普及的信息时代,信息本身就是时间,就是财富。如何保护信息的安全使之不被窃取及不至于被篡改或破坏,已成为当今普遍关注的重大问题。密码是有效且可行的办法。
本论文主要是介绍了文件加密以及一个小程序,从密钥生成、DES加密原理、DES解密原理三方面阐述了DES算法的整个过程。并在此基础上,在windows环境下,利用java实现DES加密与解密算法,以窗体界面方式完成一个本地的文件加解密演示器。
本论文共分为七部分。第一章从现代电子技术的发展揭示密码学在科学领域中的重要性,从而说明选此课题作为毕业设计的原因。第二章讲述了密码学的基础知识。第三章是本文的重点,以DES历史回顾为起点,逐一揭示DES算法原理,并按密钥生成、DES加密、DES解密的次序,利用java语言实现DES的加密与解密代码的设计。第四章对窗体界面作简要的介绍,说明本演示器的工作过程。第五章对DES存在的安全性进行分析及可行的解决方案。第六章对DES的工作模式进行简要的介绍。第七章举例对代码进行测试,看是否符合标准的DES加密和解密。
关键词:信息安全;密钥;DES;加密;解密
Abstract
The information technology rapid development, caused people’s life appearance to have the very big change, simultaneously the information technology also promoted society development. In the computer network thorough popularization information time, information itself is the time, is the wealth. How protects the information security to cause it not to be stole and as for not to tamper with or destruction, has become the major issue which now generally pays attention . The password is useful and effectible method.
This article mainly introduces the DES encryption and decipher algorithm java language realization, three aspects elaborated from key fresh、the encryption principle DES、the decryption principle DES algorithm entire has worked. And in this foundation, in windows environment, realizes the encryption and decryption algorithm using java, completes a local document by the window contact surface way to add the decipher demonstration.
The article divides into seven to blow. First chapter promulgates cryptology from the modern electronic technology development to be important in scientific domain, thus explained chooses this topic to take the graduation project originally. Second chapter narrated the cryptology elementary knowledge. Third chapter is this article key point, take narrates the DES history as the beginning, explain the DES algorithm principle, meanwhile how to make the encryption key、encrypts the DES、decrypts the DES as the line, realizes the DES encryption and decipher code using java language supposes discusses. Fourth chapter makes the simple introduction to the window contact surface, explain the working process of the decipher demonstration. Fifth chapter carries on the analysis to the DES existence security simultaneously to separate out the feasible solution. Sixth chapter carries on the brief introduction to the DES working pattern. Seventh chapter gives an example to carry on the test to the code, confirms whether conforms to the standard DES encryption and decryption.
KEYWORDS:Information security; key; DES; Encryption; Decipher
目录
摘 要 I
Abstract II
第一章 引 言 1
1.1本课题的研究意义 2
1.2 攻击 3
第二章 密码学的基础知识 5
2.1对称密码的模型 5
2.2密码编码学 6
2.3公钥密码学 6
2.4 Caesar密码 7
2.5单表代换密码 8
2.6 Playfair密码 9
2.7 Hill密码 10
2.8 多表代换密码 11
2.9 一次一密 13
2.10 置换技术 14
2.11 转轮机 15
2.12 隐写术 16
第三章 数据加密标准DES 17
3.1简化DES 17
3.1.1 S-DES的密钥产生 17
3.1.2 S-DES加密 18
3.1.3 简化DES的分析 19
3.2 DES 19
3.2.1 密钥产生 22
3.2.2 DES解密 23
3.3 JAVA实现JCE中DES的加密和解密 23
3.3.1 JCE中DES加密 24
第四章 窗体界面 28
4.1界面视图 28
4.2演示器工作工程 28
第五章 DES的安全性分析 29
5.1 DES的安全性 29
5.2 相关解决方案 29
第六章 DES工作模式 30
6.1电子密码本模式ECB 30
6.2密码分组链模式CBC 30
6.3 密码反馈模式CFB 30
6.4 输出反馈模式OFB 30
6.5 计数模式CTR 31
第七章 代码测试 32
致 谢 33
参考文献 34
附录 35
附录A:外文资料翻译-原文部分 35
附录B:外文资料翻译-译文部分 38
附录C:程序代码 40
参考文献
Barker,W.Introduction to the Analysis of the Data Encryption Standard
(DES).Laguna Hills,CA:Aegean Park Press,1991
Biham,E.,and Shamir,A.Diffrential Cryptanalysis of the Data Encryption Standard.New York:Springer-Verlag,1993.
Blake,I.,Seroussi,G.,and Smart,N.Elliptic Curves in Cryptography. Cambridge:Cambridge University press,1999.
Campbell,K.,and Wiener,M.”Proof that DES is not a Group.” Proceedings,Crypto’92,1992;New York:Springer-Verlag.
Coppersmith,D.”The Data Encryption Standard(DES) and Its Strength
Against Attacks.”IBM Journal of Research and Development,May 1994.
Denning,D.Cryptography and Da..