如果您需要專業(yè)的計(jì)算機(jī)類dissertation代寫服務(wù),您可以聯(lián)系本站QQ: 923678151,咨詢熱線電話:13917206902
First network communication system analysis
一、網(wǎng)絡(luò)通信系統(tǒng)分析
Current network protocols are used in communication systems TCP / IP protocol , therefore, the network communication system, the data transmitted is encrypted session key of the application layer . The initial formation of the data will not only enable the encryption of data transmitted through the network more secure process , but also to avoid the transmission encryption process requires tedious . Thus , the design must first be encrypted during the entire network communication system to figure out , then the network system structure according to design the most appropriate for the network encryption system .
到現(xiàn)在為止網(wǎng)絡(luò)通信系統(tǒng)認(rèn)為合適而使用的協(xié)議都是TCP/IP協(xié)議,因?yàn)檫@個(gè),在對(duì)網(wǎng)絡(luò)通信系統(tǒng)中傳道輸送的數(shù)值施行加密時(shí)主要研討的就是對(duì)話應(yīng)用層。在數(shù)值形成的起初就將其加密不止可以使數(shù)值在經(jīng)過(guò)網(wǎng)絡(luò)傳道輸送的過(guò)程中更加的安全,還能夠防止在傳道輸送過(guò)程中需求施行加密的繁雜瑣碎。
Second, based on the data encrypted network communication system design
二、基于數(shù)值加密網(wǎng)絡(luò)通信系統(tǒng)的預(yù)設(shè)
To ensure the security of network communication system , data encryption has been widely put into use, but also to ensure the security of network communication system . However, the original data encrypted network communication system is inevitable , there are some loopholes, therefore , we are in the original data encrypted network communication system on a number of designs , ensuring data transfer more secure and reliable.
為了保證網(wǎng)絡(luò)通信系統(tǒng)的安全,數(shù)值加密已經(jīng)存在廣泛的投入運(yùn)用,也保證了網(wǎng)絡(luò)通信系統(tǒng)的安全。不過(guò)原有的數(shù)值加密網(wǎng)絡(luò)通信系統(tǒng)難以避免存在一點(diǎn)破綻,因?yàn)檫@個(gè),我們就在原有的數(shù)值加密網(wǎng)絡(luò)通信系統(tǒng)向上行了一點(diǎn)預(yù)設(shè),因此保證數(shù)值的傳道輸送更加的安全、靠得住。
( one ) encryption and decryption module design . This system is the symmetric ciphers and public key cryptography algorithm combine to make the advantages and disadvantages of the two combined to make up for their shortcomings . Symmetric ciphers with encryption speed, encryption strength characteristics of high efficiency to meet the large amounts of data encryption and decryption ; while the public key cryptography algorithm is slow with encryption , encryption , high strength, easy to manage key features , so that it can express keys for encryption . This will make up the symmetric key cryptography algorithm is not easy to pass the defect . Combination of both, the advantages of whichever make complementary , can be more easily encrypted network communication system .
( Two ) model with an external CBC triple IDEA algorithm encryption and decryption. Triple IDEA block cipher algorithm is in relatively good algorithm key length is 128bit, but it also has good resistance to the phase difference between the analysis and analytical, and easy hardware and software implementations.
Triple IDEA algorithm IDEA algorithm that is used under the action of the three key several times to encrypt a plaintext , the encryption algorithm used in the system must ensure that the three keys are independent . Assuming three keys are used to K1, K2, K3, the plaintext P, the ciphertext C, the key is encrypted with the EK after said decrypting means after the use DK . Therefore , the algorithm description of the process is as follows :
Encryption : C = EK3 (DK2 (EK1 (P))); decryption : P = DK1 (EK2 (DK3 (C)))
CBC is not an encryption algorithm, but the implementation of an algorithm is a cipher mode . Password mode will not damage the security of cryptographic algorithms , and applications in CBC mode is mainly in the plaintext before it is encrypted with the previous ciphertext XOR . In a group of plaintext block is encrypted later , the result will be stored in the feedback register inside , and then the next group when the plaintext block cipher , CBC mode will be the first of this group after the plaintext block with the previous ciphertext encrypted XOR or operation, and then save the results and the feedback register and turn it with the next set of XOR plaintext block , has been circulated to encrypt plaintext block end . CBC mode using such a method is intended primarily for the exact same message to different ciphertext encrypted messages , so you can avoid eavesdroppers way again using packet replay attack . Whole encryption process is not difficult to achieve , but must ensure that the key used to encrypt the mutually independent , and the system is the key used by the system generated random function .
Third, using the RSA algorithm for key encryption
RSA algorithm is the decomposition of large numbers of security and difficulty are closely related. Strike a key using the RSA algorithm method is as follows: First, we randomly choose two large prime numbers P and Q; then calculated by multiplying the two modulus, the two numbers were multiplied by subtracting a calculated the Euler function Φ (n); calculated Euler function and select its positive integers coprime d, which must satisfy gcd (d, Φ (n)) = 1 condition ; the final calculation of the key e, but it must satisfy the conditions d * e = 1mod (Φ (n)). These keys in e, n is open, and p, q, d is the secret , e is the public encryption key , d is the secret decryption key .
Fourth, the network communication system based on data encryption application
The encryption system is based on the Internet in C / S model of communication , it is mainly used in the model . It is mainly in the application layer for data encryption , authentication and digital signature or operation , and then the data sender is encrypted with a triple IDEA algorithm , the one-way hash function SHA-1 digital signature , and the triple of IDEA keys K1, K2, K3 and other information using the RSA encryption algorithm , the encryption is complete the final ciphertext to the recipient . The recipient receives the message will be in accordance with the sender encrypted manner to decrypt the data , get the sender to send the original, and then further verification. Thus, between the client and server can communicate normally carried out in order to protect the security of communication between the two .
Based on data encrypted network communication system in many areas can be used , it is mainly to avoid information being intercepted during transmission or tampered with, in the field need to use communication systems require the use of encryption systems , which can protect the network in information security. Network communication encryption system is an essential part of the system , but also network communication system and its role will be to play the most .
V. Conclusion
In the rapid development of the information age, network communication systems is very important , but also by a great deal of attention. In order to ensure the security of network communication system , research and the use of the encryption system , it is very necessary. We discussed in the text encryption system during the testing process does implement data encryption, and digital signature functions. The network communication system in constant development , the encryption system will also continue to develop . Encryption systems in the network communication system will also play out its role , and with the development of network communication system will provide better security.
References:
[ 1 ] Meng Yanhong , Qin Weijia , Xinyi Zhong based on data encrypted network communication system design and implementation [J]. Shenyang University of Technology , 2004,26 ( 1 ) :93 -95
[ 2 ] Xiamei Feng , Shi Hongbao based on data encrypted network communication system security model and design [J]. Computer Engineering, 2001,27 ( 10 ) :117 -126
[ 3 ] Wang Zhichao based on data encrypted network communications copper research [D]. ??Hebei University of Technology , 2006,11
相關(guān)文章
UKthesis provides an online writing service for all types of academic writing. Check out some of them and don't hesitate to place your order.