当前位置:文档之家› 数据加密技术的研究综述(模板)-大工论文(通过)

数据加密技术的研究综述(模板)-大工论文(通过)

网络教育学院
本 科 生 毕 业 论 文(设 计)

题 目: 数据加密技术的研究综述
学习中心:
层 次:
专 业:
年 级:
学 号:
学 生:
指导教师:
完成日期:
数据加密技术的研究综述

I
内容摘要

Internet的迅猛发展,信息共享程度的日益增高,导致信息安全问题日渐突
出。有人提出的解决办法是降低信息共享程度,这显然是不可取的。唯一的方法
就是通过数据加密。
本文首先介绍了数据加密技术的基本原理,数据加密技术的分类及其应用,
然后说明了数据加密系统的结构。之后介绍几种常见的数据加密技术,包括DES
加密、公开加密算法RSA、MD5、可变长密钥块Blowfish加密技术、椭圆曲线密码
体制、伪随机数加密技术等。

关键词:
数据加密;信息安全;密钥 ;加密算法
数据加密技术的研究综述

I
目 录

内容摘要 ····························································································· I
引 言 ······························································································· 1
1 概述 ······························································································· 2
1.1 背景 ······················································································ 2
1.2 本文的主要内容及组织结构 ························································ 3
2 数据加密和加密系统 ········································································· 4
2.1 数据加密技术原理 ···································································· 4
2.2 数据加密技术的分类及其应用 ····················································· 4
2.3 加密系统体系 ·········································································· 5
2.3.1 加密系统的分类 ······························································· 5
2.3.2 加密体制存在的问题 ························································· 5
2.4 对称加密、非对称加密和数字签名 ··············································· 6
2.4.1 对称加密技术 ·································································· 6
2.4.2 非对称加密技术 ······························································· 7
2.4.3 数字签名 ········································································ 7
3 DES加密标准 ··················································································· 9
3.1 DES介绍和DES算法框架 ···························································· 9
3.2 DES实例分析 ··········································································· 9
3.3 DES的安全性和应用误区 ·························································· 12
3.4 DES的拓展 ············································································ 12
4 公开加密算法RSA ··········································································· 14
4.1 RSA的简介 ············································································ 14
4.2 RSA算法的结构 ······································································ 14
4.3 RSA算法的案例 ······································································ 16
4.4 RSA探索 ··············································································· 17
5 其他加密技术 ················································································ 19
5.1 MD5 ······················································································ 19
5.2 可变长密钥块Blowfish加密技术 ·············································· 19

相关主题