古典密码学原理演示器的程序设计.doc

上传人:文库蛋蛋多 文档编号:2401847 上传时间:2023-02-17 格式:DOC 页数:2 大小:15KB
返回 下载 相关 举报
古典密码学原理演示器的程序设计.doc_第1页
第1页 / 共2页
古典密码学原理演示器的程序设计.doc_第2页
第2页 / 共2页
亲,该文档总共2页,全部预览完了,如果喜欢就下载吧!
资源描述

《古典密码学原理演示器的程序设计.doc》由会员分享,可在线阅读,更多相关《古典密码学原理演示器的程序设计.doc(2页珍藏版)》请在三一办公上搜索。

1、古典密码学原理演示器的程序设计 摘要随着计算机和通信技术的飞速发展,密码学已经渗透到了政治、经济、文化乃至个人隐私等领域,使用加密技术来保护信息的安全变得越来越重要。这篇论文的重点是介绍几个古典密码体制、古典密码加密解密演示器及其用C+的实现。 论文主要分为两大部分,理论部分和应用部分。理论基础部分包括正文的“1 概述”和“2几种密码体制的原理及加解密算法的描述”:“1 概述”简单介绍了几种古典密码的基础知识;“2几种密码体制的原理及加解密算法的描述”较详细地介绍了几种古典密码加密算法的叙述和解密,而其中算法的内容为第4章的算法运用内容做准备。应用部分为“3 软件的实现”:“3 软件的实现”包

2、括几种密码的C实现及加密解密器界面的C+实现和几种密码功能的执行、测试和使用。最后是“4 软件设计小结”以及“致谢”和列出了1些参考的文献。 这篇论文通过对加密系统的比较以及对加密算法的运用为密码学中加密算法在日常生活中的运用范围及其运用方法提供了1些有用的参考。 关键词密码学,密码体制,加密算法,解密算法,密钥。AbstractAlong with the computer and the communication rapid development, the cryptology already seeped domain and so on politics, economy, cul

3、ture and even individual privacy, the use encryption technology protects the information the security to change more and more importantly. This paper key point is introduced several classical passwords systems, the classical password encryption decipher demonstration and its uses C+ the realization.

4、 The paper mainly divides into two major parts, the theory part and the application part. The rationale partially “1 outline” and “2 several kind of passwords systems principle and adds the decipher algorithm including the main text the description”: “1 outline” simply introduced several kind of cla

5、ssical passwords elementary knowledges; “2 several kind of passwords systems principle and added the decipher algorithm the description” in detail to introduce several kind of classical passwords encryption algorithm narration and the decipher, but algorithm content prepared for the fourth chapter o

6、f algorithm using the content. Applies the part is “3 software realizations”: “3 software realizations” including several kind of passwords C realizations and encryption decipher contact surface C+ realization and several kind of passwords functions execution, test and use. Finally was “4 software d

7、esigns subtotal” as well as “expresses thanks” and has listed some references literature. This paper through the encryption algorithm has provided some useful references to the cryptographic system comparison as well as to the encryption algorithm utilization for the cryptology in the daily life utilization scope and its using the method. Keywordcryptology, password system, encryption algorithm, decipher algorithm, key.

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 建筑/施工/环境 > 项目建议


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号