資源描述:
《基于DES和ECC混合加密算法的數(shù)字簽名研究與應(yīng)用》由會(huì)員上傳分享,免費(fèi)在線閱讀,更多相關(guān)內(nèi)容在學(xué)術(shù)論文-天天文庫。
1、基于DES和EOO混合加密算法的數(shù)字簽名研究與應(yīng)用學(xué)科:計(jì)算機(jī)軟件與理論研究生簽字:巷乃青指導(dǎo)教師簽字:泐/陟摘要隨著人類社會(huì)生活對(duì)Intemet需求的日益增長,網(wǎng)絡(luò)安全逐漸成為Intemet及各項(xiàng)網(wǎng)絡(luò)服務(wù)和應(yīng)用進(jìn)一步發(fā)展的關(guān)鍵問題。目前網(wǎng)絡(luò)攻擊手段有數(shù)千種之多,網(wǎng)絡(luò)信息被截取、篡改、重發(fā)的事時(shí)有發(fā)生,這對(duì)網(wǎng)絡(luò)的進(jìn)一步推廣和應(yīng)用構(gòu)成了巨大威脅。如何安全地在網(wǎng)絡(luò)上傳輸數(shù)據(jù)信息,鑒別數(shù)據(jù)信息來源的真實(shí)性,確保信息的完整性和不可抵賴性成為近年來相關(guān)研究的熱點(diǎn)。為有效地提高網(wǎng)絡(luò)的安全性,對(duì)傳輸內(nèi)容進(jìn)行加密及數(shù)字
2、簽名成為關(guān)鍵技術(shù)。本課題全面分析現(xiàn)有密碼理論體系中的現(xiàn)狀,對(duì)目前信息安全的現(xiàn)狀和數(shù)據(jù)加密技術(shù)的基本概念及數(shù)學(xué)模型做了簡單的概述,分析了對(duì)稱密鑰密碼理論和公鑰密碼理論的優(yōu)缺點(diǎn),對(duì)公鑰和私鑰加密算法的典型代表DES和ECC算法的數(shù)學(xué)模型分別進(jìn)行了討論。結(jié)合兩種算法優(yōu)點(diǎn),提出了二種基于DES和ECC算法的復(fù)合加密方案。同時(shí),開發(fā)了一個(gè)仿真軟件,進(jìn)行該混合算法的加密解密及數(shù)字簽名的模擬。DES加密速度快,適合加密較長明文,而ECC可以很好的實(shí)現(xiàn)數(shù)字簽名,能夠保證數(shù)據(jù)真實(shí)、完整,這樣整體的提高了數(shù)字簽名過程中的速
3、度與安全問題,提高了數(shù)字簽名的實(shí)用性。最后對(duì)所采用的加密算法進(jìn)行比較,在安全性和加密速度等方面做出對(duì)該算法的評(píng)價(jià)。關(guān)鍵詞:加密;數(shù)字簽名;DES算法;ECC算法DigitalsignatureresearchandapplicationBasedonDESandECCmixencryptionalgorithmDiscipline:ComputerSoftandTheroystudentSignature:石醌咖,SupervisorSignature:3AbstractAshumansociallif
4、eofthegrowingdemandforInteract,thenetworksecuritybecomesthekeyquestionwhichInternetandeachnetworkserviceandtheapplicationfurtherdevelopment.Thecurrentnetworkattacksmeansasmanyasseveralthousands,networkinformationbeingintercepted,altered,re-issuedthingsha
5、ppenfromtimetotime,forthenetworktofurtherpromotetheapplicationandposesamajorthreat.HowsecurityinthetransmissionofdatainformationnetworktOidentifytheauthenticit),ofdatasourcesofinformationtoensurethattheintegrityoftheinformationandnon—repudiationinrecenty
6、earsbecomeahotresearch..Toenhancethenetworkeffectivelythesecurity,carriesontheencryptionandthedigitalsignaturetothetransmissioncontentbecomesthekeytechnologies..nesubjectofacomprehensiveanalysisofexistingpasswordsystemofthestatus,hasmadethesimpleoutlinet
7、othepresentinformationsecurity’Spresentsituationandthedataencryptiontechnology’Sbasicconceptandthemathematicalmodel,hasanalyzedthesymmetricalkeypasswordtheoryandthepublickeypasswordtheorygoodandbadpoints,analyzethemathematicmodesofECC&DESwhicharetypicale
8、ncryptionalgorithmsforPublicandPrivatcKey,themeritanddemeritofthealgorithmsagecomparedinfullscale.Then,developsasimulationsoftware,carriesonthismixalgorithmtheencryptiondecipherandthedigitalsignaturesimulation.TheDESencryp