Dissertation > Excellent graduate degree dissertation topics show

Research and Implemention of Information Security Encryption System Based on the RSA

Author: FengYe
Tutor: YuanPing
School: Northeastern University
Course: Computer technology
Keywords: computer network security RSA algorithms symmetry encrypt technique asymmetry encrypt technique
CLC: TP309.7
Type: Master's thesis
Year: 2009
Downloads: 25
Quote: 0
Read: Download Dissertation


With the continuous development of military technology, information operations are modern high-tech war is one of the most important operations, affecting every battle field joint campaign and space. Along with the computer technology progress, all of the network information system in military technology to emerge in endlessly, and against the development of new military revolution to make various combat resources dependence of military information system is growing, how to protect information system security has become the focus of research in the military field.Only do top design, unified regulation of information security system, and strengthen the framework of information security technology research, for various applications can provide information system construction, construction of information security and military informatization construction of synchronous development. first introduced network security technology, and the goal of information security and safety system, design principles and the safety design thought, and then discusses from the physical security, radiation safety, computer security,。According to the actual needs of military and improved the RSA algorithms, and finally in tactical Internet information security system, using the improved in many subsystem of RSA arithmetic combined with the most competitive price and in-depth analysis of encryption subsystem, established a new encryption system model. According to the high security and high-efficiency balance principle, plus determines the encryption system model of encryption algorithm, the security of the system of comprehensive analysis, and as such software for Delphi VB6.0 by use of encryption system development tool, programming model, and achieved good effect.

Related Dissertations

  1. The Research of Worm Virus’ Preventive Technique,TP393.08
  2. Research and Design on Security Evaluation Bases on Network,TP393.08
  3. Design of Classifier and Research of Fusion Technology for Intrusion Detection,TP393.08
  4. Research and Design of Distributed Firewall System,TP393.08
  5. Distributed Intrusion Detection System Based on Data Mining,TP393.08
  6. The Study of Distributed Firewalls Based on the Technology of Packet Filtering,TP393.08
  7. Research and Implementation of IKE Based on Windows2000,TP393.08
  8. Design and Implementation of Web Based Intrusion Detection System,TP393.08
  9. The Research of Worm Virus’ Preventive Technique,TP309.5
  10. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  11. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309
  12. Research on Iris Based Cryptography,TP309.7
  13. The Research of Dynamic Trust Model on Cloud Computing Platform,TP309
  14. Research of Sensitive Information Protection Techniques for Automated Trust Negotiation,TP309
  15. Study on the Access Control of the Court Information System,TP309
  16. Remote FPGA system design and implementation of security upgrades,TP309
  17. Research on the Application of Image Information Hiding Technique,TP309.7
  18. Research and Design on Asymmetric Encryption and Decryption Algorithm Based on FFTT,TP309.7
  19. Research and Embedded Implementation of Image Watermark Algorithm,TP309.7
  20. Research on Information Hiding Based on Images,TP309.7
  21. Nonlinear color image watermarking detection program of study,TP309.7

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption
© 2012 www.DissertationTopic.Net  Mobile