云题海 - 专业文章范例文档资料分享平台

当前位置:首页 > 文件加密解密论文 - 图文

文件加密解密论文 - 图文

  • 62 次阅读
  • 3 次下载
  • 2026/1/9 12:53:49

五、综合设计(课程设计)Abstract(英文): Chaperonage network technique of development, people's network activity be also more and more multifarious and follow of safety of request also more and more Gao, application the information encrypt a technique, assurance people are in the network activity to oneself of keep secret of information and some related data of request, assurance the safety and confidentiality of network.Pass design 1 to encrypt to decrypt tool to encrypt any document to reach agreement to the realization here airtight solve a life thus in of some relevant information safety problem. Encrypt the technique is the most in common use of safety keep secret means, main in the design make use of symmetry encrypt calculate way importance of the data change into disorderly code(encrypt) transmission, after arriving destination use again homology or dissimilarity of means revivification.(decrypt)The comprehensive usage face to an object method to learn, the software system set up a mold, software system structure, software engineering knowledge, and GUI, MD5, the CHECKSUM is symmetry to encrypt read and write of calculate way(DES AES) and document etc. knowledge to carry on an encrypt of document to decrypt tool of design, among them, the MD5 calculate way be one-way to encrypt of encrypt calculate way, DES calculate way namely the data encrypt calculate way, but AES is cent set airtight key.Program design be over juniors line the data encrypt to decrypt test, should the tool pass to the read of document, from customer oneself choice keep of path and calculate way, basis choice of dissimilarity of calculate way creation dissimilarity of airtight key.Same make use of that tool to decrypt document is to pass to the read of document, at according to the airtight key and the rightness should of the calculate way carry on decrypt to the target document, creation decrypt a document. Keywords: DES;AES;File encryption; Declassified documents

武汉工程大学计算机科学与工程学院 综合设计报告

目 录

摘 要 .......................................................... II Abstract ......................................................... III 第一章 绪论 ........................................................ 1 1.1设计背景 ........................................................ 1 1.2设计目的 ........................................................ 1 1.3 设计基本原理 ................................................... 2 第二章 设计简介及设计方案论述 ..................................... 3 2.1 需求分析 ....................................................... 3 2.2 总体设计框架 ................................................... 3 2.3信息加密技术简介 ................................................ 4 2.3.1加密解密技术摡述 .............................................................................................. 4 2.3.2 加密算法 ............................................................................................................. 4 第三章 详细设计 ................................................... 5 3.1 界面设计 ....................................................... 5 3.1.1 加密解密界面设计 ........................................................................................... 5 3.1.2 加密密钥界面设计 ........................................................................................... 7 3.1.2 解密密钥界面设计 ........................................................................................... 8 3.2实现代码设计 .................................................... 9 3.2.1 DES的加密设计 ................................................................................................ 9 3.2.2 DES解密设计 .................................................................................................. 11 第四章 设计结果及分析 ............................................ 12 4.1 设计结果展示 .................................................. 12 4.2 设计结果分析及说明 ............................................ 15 总 结 .......................................................... 16 致 谢 .......................................................... 17 参考文献 .......................................................... 18 日 记 .......................................................... 19

- I -

武汉工程大学计算机科学与工程学院 综合设计报告

摘 要

伴随着网络技术的发展,人们的网络活动也越来越频繁,随之而来的安全性的要求也就越来越高,应用信息加密技术,保证了人们在网络活动中对自己的信息和一些相关资料的保密的要求,保证了网络的安全性和保密性。在这里通过设计一个加密解密工具来实现对任何文件的加密和解密从而解决生活中的一些有关信息安全问题。

加密技术是最常用的安全保密手段,在设计中主要利用对称加密算法把重要的数据变为乱码(加密)传送,到达目的地后再用相同或不同的手段还原(解密)。综合运用面向对象方法学,软件系统建模,软件体系结构,软件工程知识,以及GUI ,MD5,CHECKSUM 对称加密算法(DES AES)和文件的读写等知识来进行文件的加密解密工具的设计,其中MD5算法就是单向加密的加密算法,DES算法即数据加密算法,而AES是分组密钥。程序设计结束后进行数据加密解密测试,该工具通过对文件的读取,由用户自己选择保存的路径和算法,根据所选择的不同的算法产生了不同的密钥。同样利用该工具对文件的解密是通过对文件的读取,在根据密钥和对应的算法对目标文件进行解密,产生解密文件。

关键词:面向对象方法学;DES;AES;文件加密解密

- II -

武汉工程大学计算机科学与工程学院 综合设计报告

Abstract

Chaperonage network technique of development, people's network activity be also more and more multifarious and follow of safety of request also more and more Gao, application the information encrypt a technique, assurance people are in the network activity to oneself of keep secret of information and some related data of request, assurance the safety and confidentiality of network.Pass design 1 to encrypt to decrypt tool to encrypt any document to reach agreement to the realization here airtight solve a life thus in of some relevant information safety problem.

Encrypt the technique is the most in common use of safety keep secret means, main in the design make use of symmetry encrypt calculate way importance of the data change into disorderly code(encrypt) transmission, after arriving destination use again homology or dissimilarity of means

revivification.(decrypt)The comprehensive usage face to an object method to learn, the software system set up a mold, software system structure, software engineering knowledge, and GUI, MD5, the CHECKSUM is symmetry to encrypt read and write of calculate way(DES AES) and document etc. knowledge to carry on an encrypt of document to decrypt tool of design, among them, the MD5 calculate way be one-way to encrypt of encrypt calculate way, DES calculate way namely the data encrypt calculate way, but AES is cent set airtight key.Program design be over juniors line the data encrypt to decrypt test, should the tool pass to the read of document, from customer oneself choice keep of path and calculate way, basis choice of dissimilarity of calculate way creation dissimilarity of airtight key.Same make use of that tool to decrypt document is to pass to the read of document, at according to the airtight key and the rightness should of the calculate way carry on decrypt to the target document, creation decrypt a document.

Keywords: DES;AES; File encryption; Declassified documents

- III -

搜索更多关于: 文件加密解密论文 - 图文 的文档
  • 收藏
  • 违规举报
  • 版权认领
下载文档10.00 元 加入VIP免费下载
推荐下载
本文作者:...

共分享92篇相关文档

文档简介:

五、综合设计(课程设计)Abstract(英文): Chaperonage network technique of development, people's network activity be also more and more multifarious and follow of safety of request also more and more Gao, application the information encrypt a technique, assurance people are in the network activity to oneself of keep secret of information and some related data of request, assurance the safety and confidentialit

× 游客快捷下载通道(下载后可以自由复制和排版)
单篇付费下载
限时特价:10 元/份 原价:20元
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219
Copyright © 云题海 All Rights Reserved. 苏ICP备16052595号-3 网站地图 客服QQ:370150219 邮箱:370150219@qq.com