数据加密标准des的c++实现

上传人:bin****86 文档编号:38522117 上传时间:2018-05-03 格式:DOC 页数:2 大小:17KB
返回 下载 相关 举报
数据加密标准des的c++实现_第1页
第1页 / 共2页
数据加密标准des的c++实现_第2页
第2页 / 共2页
亲,该文档总共2页,全部预览完了,如果喜欢就下载吧!
资源描述

《数据加密标准des的c++实现》由会员分享,可在线阅读,更多相关《数据加密标准des的c++实现(2页珍藏版)》请在金锄头文库上搜索。

1、数据加密标准 DES 的 C+实现摘 要信息技术的飞速发展,使人们的生活面貌发生了很大改变,同时信息技术也促进了社会 的发展。在计算机网络深入普及的信息时代,信息本身就是时间,就是财富。如何保护信 息的安全使之不被窃取及不至于被篡改或破坏,已成为当今普遍关注的重大问题。密码是 有效且可行的办法。本文主要介绍 DES 加密与解密算法的 C+语言实现,从密钥生成、DES 加密原理、DES 解密原理 3 方面阐述了 DES 算法的整个过程。并在此基础上,在 windows 环境下,利用标 准 VC+6.0 实现 DES 加密与解密算法,以窗体界面方式完成 1 个本地的文件加解密演示 器。本论文共分为

2、 7 部分。第 1 章从现代电子技术的发展揭示密码学在科学领域的重要性, 从而说明选此课题作为毕业设计的原因。第 2 章讲述了密码学的基础知识。第 3 是本文的 重点,以 DES 的历史回顾为起点,逐 1 揭示 DES 算法的原理,并按密钥生成、DES 加密、 DES 解密的次序,利用 C+语言实现 DES 的加密与解密代码的设计。第 4 章对窗体界面 作简要的介绍,说明本演示器的工作过程。第 5 章对 DES 存在的安全性进行分析及可行的 解决方案。第 6 章对 DES 的工作模式进行简要的介绍,其中,重点介绍了本文所采取的 ECB 模式。第 7 章举例对代码进行测试,看是否符合标准的 DE

3、S 加密和解密。关键词:信息安全;密钥; DES;加密;解密;VC+6.0 AbstractThe information technology rapid development, caused peoples life appearance to have the very big change, simultaneously the information technology also promoted societys development. In the computer network thorough popularization information time, info

4、rmation itself is the time, is the wealth. How protects the information the security to cause it not to steal and as for not to tamper with or the destruction, has become the major issue which now generally pays attention. The password is the extremely useful one kind of laborThis article mainly int

5、roduces the DES encryption and the decipher algorithm C language realization, Decipher principle three aspects elaborated from key fresh room DES、 the encryption principle DES、 the DES algorithm entire has worked. And in this foundation, In windows environment, realizes the DES encryption and the de

6、cipher using standard VC+6.0 calculates, Completes a local document by the window contact surface way to add the decipher demonstration.The present paper altogether divides into seven to blow, First chapter promulgates the cryptology from the modern electronic technology development to be important

7、in the scientific domain, Thus explained chooses this topic to take the graduation project originally. Second chapter narrated the cryptology elementary knowledge, Third is this article key point, Take narrates the DES history as the beginning, A explanation DES algorithm original hollow piece of ja

8、de, Meanwhile how to make the encrypts key、 encrypts the DES decipher take key、 fresh room DES as the line, Realizes the DES encryption and the decipher code using the C+ language supposes discusses. Fourth chapter makes the simple introduction to the window contact surface, Explane how the ming dyn

9、asty printed books demonstration should use. Fifth chapter carries on the analysis to the DES existence security simultaneously to separate out the feasible solution, Sixth chapter carries on the brief introduction to the DES working pattern, Introduced with emphasis this article adopts ECB pattern. Seventh chapter gives an example to carry on the test to the code, Confirms whether conforms to the standard DES encryption to reconcile Laos.KeyWords:Information security; Key; DES; Encryption; Decipher; VC+6.0.

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 大杂烩/其它

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号