网络教育学院
本 科 生 毕 业 论 文(设 计)
题 目:数据加密技术的研究综述(模板)
学习中心: 层 次: 专科起点本科 专 业: 网络工程 年 级: 2009年秋季 学 号: 20110391CCXX 学 生: XXXX 指导教师: XXX 完成日期: 2013年 03 月 18 日
深圳学历教育www.szstudy.com.cn深圳成人高考 数据加密技术的研究综述
内容摘要
随着计算机网络技术的飞速发展,数据加密技术将成为信息网络安全技术中的核心技术,本文介绍了网络与信息安全技术体系结构,对目前信息加密技术进行了分析,阐述了各类加密算法的优缺点,同时对加密技术的发展趋势进行了描述从最初的保密通信发展到目前的网络信息加密。数据加密技术是指将一个信息经过加密钥匙及加密函数转换,变成无意义的密文,而接收方则将此密文经过解密函数、解密钥匙还原成明文。在竞争激烈的信息时代,客观上需要一种强有力的安全措施来保护机密数据不被窃取或篡改,因此数据加密技术就应运而生。
关键词:信息安全 ;数据加密;加密钥匙;解密钥匙;加密算法
I
深圳学历教育www.szstudy.com.cn深圳成人高考 数据加密技术的研究综述
目 录
内容摘要··························································································································· I 引 言····························································································································· 1 1 概述····························································································································· 2
1.1 背景·················································································································· 2 1.2 本文的主要内容及组织结构·········································································· 3 2 数据加密和加密系统································································································· 4
2.1 数据加密技术原理·························································································· 4 2.2 数据加密技术的分类及其应用······································································ 4 2.3 加密系统体系·································································································· 5
2.3.1 加密系统的分类··················································································· 5 2.3.2 加密体制存在的问题··········································································· 6 2.4 对称加密、非对称加密和数字签名······························································ 7 3 DES加密标准·············································································································· 9
3.1 DES介绍和DES算法框架··············································································· 9 3.2 DES实例分析··································································································· 9 3.3 DES的安全性和应用误区············································································· 12 3.4 DES的拓展····································································································· 12
3.4.1 3DES····································································································· 12 3.4.2 AES算法······························································································ 13
4 公开加密算法RSA···································································································· 14
4.1 RSA的简介····································································································· 14 4.2 RSA算法的结构····························································································· 14 4.3 RSA算法的案例····························································································· 14 4.4 RSA探索········································································································· 22 5 其他加密技术··········································································································· 25
5.1 MD5·················································································································· 25 5.2 可变长密钥块Blowfish加密技术······························································ 26 5.3 椭圆曲线密码体制························································································ 27
II
深圳学历教育www.szstudy.com.cn深圳成人高考 数据加密技术的研究综述
5.4 伪随机数加密技术························································································ 28 6 结论··························································································································· 32 参考文献························································································································· 33 附录一 伪随机数加密法的加密和解密程序······························································· 33
III
深圳学历教育www.szstudy.com.cn深圳成人高考 数据加密技术的研究综述
引 言
随着网络技术的发展,网络安全也就成为当今网络社会的焦点中的焦点,几乎没有人不在谈论网络上的安全问题,病毒、黑客程序、邮件炸弹、远程侦听等这一切都无不让人胆战心惊。病毒、黑客的猖獗使身处今日网络社会的人们感觉到谈网色变,无所适从。
用户必需清楚地认识到,这一切一切的安全问题不可一下全部找到解决方案,况且有的是根本无法找到彻底的解决方案,如病毒程序,因为任何反病毒程序都只能在新病毒发现之后才能开发出来,目前还没有哪能一家反病毒软件开发商敢承诺他们的软件能查杀所有已知的和未知的病毒,所以用户不能有等网络安全了再上网的念头,因为或许网络不能有这么一日,就象“矛”与“盾”,网络与病毒、黑客永远是一对共存体。
现代的电脑加密技术就是适应了网络安全的需要而应运产生的,它为用户进行一般的电子商务活动提供了安全保障,如在网络中进行文件传输、电子邮件往来和进行合同文本的签署等。其实加密技术也不是什么新生事物,只不过应用在当今电子商务、电脑网络中还是近几年的历史。
加密作为保障数据安全的一种方式,它不是现在才有的,它产生的历史相当久远,它是起源于要追溯于公元前2000年(几个世纪了),虽然它不是现在所讲的加密技术(甚至不叫加密),但作为一种加密的概念,确实早在几个世纪前就诞生了。当时埃及人是最先使用特别的象形文字作为信息编码的,随着时间推移,巴比伦、美索不达米亚和希腊文明都开始使用一些方法来保护他们的书面信息。
近期加密技术主要应用于军事领域,如美国独立战争、美国内战和两次世界大战。最广为人知的编码机器是German Enigma机,在第二次世界大战中德国人利用它创建了加密信息。此后,由于Alan Turing和Ultra计划以及其他人的努力,终于对德国人的密码进行了破解。当初,计算机的研究就是为了破解德国人的密码,人们并没有想到计算机给今天带来的信息革命。随着计算机的发展,运算能力的增强,过去的密码都变得十分简单了,于是人们又不断地研究出了新的数据加密方式,如利用ROSA算法产生的私钥和公钥就是在这个基础上产生的。
本文主介绍究各种加密算法以及各类加密算法的优缺点,以及各类加密技术在军事、科学等多方面的应用。
1