如果您需要专业的计算机类dissertation代写服务,您可以联系本站QQ: 923678151,咨询热线电话:13917206902
First network communication system analysis
一、网络通信系统分析
Current network protocols are used in communication systems TCP / IP protocol , therefore, the network communication system, the data transmitted is encrypted session key of the application layer . The initial formation of the data will not only enable the encryption of data transmitted through the network more secure process , but also to avoid the transmission encryption process requires tedious . Thus , the design must first be encrypted during the entire network communication system to figure out , then the network system structure according to design the most appropriate for the network encryption system .
到现在为止网络通信系统认为合适而使用的协议都是TCP/IP协议,因为这个,在对网络通信系统中传道输送的数值施行加密时主要研讨的就是对话应用层。在数值形成的起初就将其加密不止可以使数值在经过网络传道输送的过程中更加的安全,还能够防止在传道输送过程中需求施行加密的繁杂琐碎。
Second, based on the data encrypted network communication system design
二、基于数值加密网络通信系统的预设
To ensure the security of network communication system , data encryption has been widely put into use, but also to ensure the security of network communication system . However, the original data encrypted network communication system is inevitable , there are some loopholes, therefore , we are in the original data encrypted network communication system on a number of designs , ensuring data transfer more secure and reliable.
为了保证网络通信系统的安全,数值加密已经存在广泛的投入运用,也保证了网络通信系统的安全。不过原有的数值加密网络通信系统难以避免存在一点破绽,因为这个,我们就在原有的数值加密网络通信系统向上行了一点预设,因此保证数值的传道输送更加的安全、靠得住。
( one ) encryption and decryption module design . This system is the symmetric ciphers and public key cryptography algorithm combine to make the advantages and disadvantages of the two combined to make up for their shortcomings . Symmetric ciphers with encryption speed, encryption strength characteristics of high efficiency to meet the large amounts of data encryption and decryption ; while the public key cryptography algorithm is slow with encryption , encryption , high strength, easy to manage key features , so that it can express keys for encryption . This will make up the symmetric key cryptography algorithm is not easy to pass the defect . Combination of both, the advantages of whichever make complementary , can be more easily encrypted network communication system .
( Two ) model with an external CBC triple IDEA algorithm encryption and decryption. Triple IDEA block cipher algorithm is in relatively good algorithm key length is 128bit, but it also has good resistance to the phase difference between the analysis and analytical, and easy hardware and software implementations.
Triple IDEA algorithm IDEA algorithm that is used under the action of the three key several times to encrypt a plaintext , the encryption algorithm used in the system must ensure that the three keys are independent . Assuming three keys are used to K1, K2, K3, the plaintext P, the ciphertext C, the key is encrypted with the EK after said decrypting means after the use DK . Therefore , the algorithm description of the process is as follows :
Encryption : C = EK3 (DK2 (EK1 (P))); decryption : P = DK1 (EK2 (DK3 (C)))
CBC is not an encryption algorithm, but the implementation of an algorithm is a cipher mode . Password mode will not damage the security of cryptographic algorithms , and applications in CBC mode is mainly in the plaintext before it is encrypted with the previous ciphertext XOR . In a group of plaintext block is encrypted later , the result will be stored in the feedback register inside , and then the next group when the plaintext block cipher , CBC mode will be the first of this group after the plaintext block with the previous ciphertext encrypted XOR or operation, and then save the results and the feedback register and turn it with the next set of XOR plaintext block , has been circulated to encrypt plaintext block end . CBC mode using such a method is intended primarily for the exact same message to different ciphertext encrypted messages , so you can avoid eavesdroppers way again using packet replay attack . Whole encryption process is not difficult to achieve , but must ensure that the key used to encrypt the mutually independent , and the system is the key used by the system generated random function .
Third, using the RSA algorithm for key encryption
RSA algorithm is the decomposition of large numbers of security and difficulty are closely related. Strike a key using the RSA algorithm method is as follows: First, we randomly choose two large prime numbers P and Q; then calculated by multiplying the two modulus, the two numbers were multiplied by subtracting a calculated the Euler function Φ (n); calculated Euler function and select its positive integers coprime d, which must satisfy gcd (d, Φ (n)) = 1 condition ; the final calculation of the key e, but it must satisfy the conditions d * e = 1mod (Φ (n)). These keys in e, n is open, and p, q, d is the secret , e is the public encryption key , d is the secret decryption key .
Fourth, the network communication system based on data encryption application
The encryption system is based on the Internet in C / S model of communication , it is mainly used in the model . It is mainly in the application layer for data encryption , authentication and digital signature or operation , and then the data sender is encrypted with a triple IDEA algorithm , the one-way hash function SHA-1 digital signature , and the triple of IDEA keys K1, K2, K3 and other information using the RSA encryption algorithm , the encryption is complete the final ciphertext to the recipient . The recipient receives the message will be in accordance with the sender encrypted manner to decrypt the data , get the sender to send the original, and then further verification. Thus, between the client and server can communicate normally carried out in order to protect the security of communication between the two .
Based on data encrypted network communication system in many areas can be used , it is mainly to avoid information being intercepted during transmission or tampered with, in the field need to use communication systems require the use of encryption systems , which can protect the network in information security. Network communication encryption system is an essential part of the system , but also network communication system and its role will be to play the most .
V. Conclusion
In the rapid development of the information age, network communication systems is very important , but also by a great deal of attention. In order to ensure the security of network communication system , research and the use of the encryption system , it is very necessary. We discussed in the text encryption system during the testing process does implement data encryption, and digital signature functions. The network communication system in constant development , the encryption system will also continue to develop . Encryption systems in the network communication system will also play out its role , and with the development of network communication system will provide better security.
References:
[ 1 ] Meng Yanhong , Qin Weijia , Xinyi Zhong based on data encrypted network communication system design and implementation [J]. Shenyang University of Technology , 2004,26 ( 1 ) :93 -95
[ 2 ] Xiamei Feng , Shi Hongbao based on data encrypted network communication system security model and design [J]. Computer Engineering, 2001,27 ( 10 ) :117 -126
[ 3 ] Wang Zhichao based on data encrypted network communications copper research [D]. Hebei University of Technology , 2006,11
相关文章
UKthesis provides an online writing service for all types of academic writing. Check out some of them and don't hesitate to place your order.