當前位置:學問君>學習教育>畢業論文>

密碼學綜合實驗系統的設計與實現

學問君 人氣:1.17W
畢業論文

密碼學綜合實驗系統的設計與實現
 
摘 要:密碼學是資訊安全研究領域最重要的研究課題之1,但密碼學知識本身既枯燥無味又晦澀難懂。爲了使初學者能夠快速輕鬆的學習並掌握密碼學知識,本文設計了1個密碼學綜合實驗系統。該系統實現的主要功能有:加解密原理介紹、加解密過程演示實驗、實驗報告自動生成與打印等,研究的主要加解密算法有:RSA算法、DES算法、AES算法、TEA算法。本系統主要實現對常用加解密算法進行理解性實驗,同時還可將該系統作爲實際的加解密工具使用。另外,本系統利用SQL數據庫實現用戶資訊管理,實現了幫助檔案檢視與更新的簡易性,實現了用戶介面與外部檔案相應權限的有效接口以及對代碼檔案、相關網站的連結。從教與學的角度來看,該系統的動手實驗部分採用了指引式操作,讓初學者能快速的瞭解並掌握各主要算法的加解密過程。本文共分爲8章:第1章介紹密碼學綜合實驗系統的開發背景與目標;第2章闡述了密碼學的主要加解密算法及原理;第3章爲該系統的.可行性研究報告;第4章是需求分析報告;第5章敘述了系統的概要設計;第6章介紹了系統的詳細設計及部分編碼;第7章爲該系統的軟件測試報告;第8章是對全文的總結。
關鍵詞:資訊安全;密碼學;加密;解密;實驗系統

密碼學綜合實驗系統的設計與實現

Design and realization of the synthetic Cryptography experimental system
 
Abstract:Cryptography is one of the most important research subjects in information security, but it is as dull as ditch water and hard to understand. In order to make the beginner to learn and master the cryptography knowledge more easily, the synthetic experimental system of cryptography is designed in this thesis. The primary functions include theory presentation of cryptography, process demo of encrypt or decrypt, automatic generation and print of experiment report etc. The key algorithms include RSA, DES, AES, TEA etc. The system mainly realizes the experiment for rapid comprehension of cryptography, meanwhile, it can act as encrypt or decrypt tool. In addition, the system can manage the users’ information with SQL Server database, can acquire simplification of help files’ viewing or updating, can realize a good interface to make the communication between the user’s dialog and the external files, and can link to the source code files or the web pages online. In the point of teaching and learning, this experimental system adopts guiding operation which can make the beginner to learn and master the encrypt process or decrypt process of each primary algorithm easily and quickly. This thesis includes eight chapters: chapter 1 introduces the development background and target; chapter 2 expatiates the primary algorithms of cryptography; chapter 3 explains feasibility research report; chapter 4 shows the requirement analysis report; chapter 5 summarizes the preliminary design report; chapter 6 includes detailed design report and partial source codes; chapter 7 discusses the software testing report; chapter 8 acquires a whole-length summarization.
Keywords:  information security; cryptography; encryption; decryption; experimental system

註釋:不含原始碼