共查询到19条相似文献,搜索用时 93 毫秒
1.
分析了基于大随机数的字符串加密算法原理,给出了一个具体的加密、解密算法并利用VFP实现。利用该算法对一个具体实例进行了加密,实验结果表明,基于大随机数的字符串加密算法完全可以满足VFP数据库应用系统保密的要求。 相似文献
2.
基于混沌加密算法的VFP文件加密 总被引:1,自引:0,他引:1
由于Logistic映射具有初始条件敏感性、随机性、相关性等优良的密码学性能而广泛应用于混沌加密。本文分析了基于Logistic混沌映射的加密算法原理;给出了一个基于该算法的具体加密解密算法;并将已设计的加密算法应用于VFP数据库中的字符串加密和文件加密。 相似文献
3.
4.
5.
6.
郭恒川 《电脑编程技巧与维护》2007,(8):76-78
介绍了在Visual Basic下使用用户口令字符串产生的伪随机数序列和图像中各像素点的二进制位数组,采用Xor运算和位移运算两种加密方法进行图像加密的原理及其实现方法,将加密、解密变换建立在二进制位数组基础上,实现了完整的图像加密、解密程序. 相似文献
7.
郭恒川 《数字社区&智能家居》2007,2(8):411-413
介绍了在Visual Basic下使用用户口令字符串产生的伪随机数序列和图像中各像素点的二进制位数组,采用Xor运算和位移运算两种加密方法进行图像加密的原理及其实现方法,将加密、解密变换建立在二进制位数组基础上,实现了完整的图像加、解密程序。 相似文献
8.
9.
10.
魏嘉银 《计算机与数字工程》2011,39(6):93-97
文章将AES算法应用于对字符串与文件的加密与解密,并提出了"加密包"的概念。在对AES算法实现时,采用了预先计算查找表、密文挪用等技术,使该算法的运行更加快速且合理地解决了等处理数据长度不是数据块分组长度的整数倍这一特殊情形;在对文件读写的优化实现上采用了多线程、多缓冲区及内存映射文件三种技术相结合的方式,极大地提高了软件的文件读写效率。实验结果表明,该软件具有很高的运行效率且操作灵活便捷。 相似文献
11.
本文分析DES加密算法和RSA签名算法。作者采用DES算法和RSA算法相结合的密码方案,引用摘要,提出了一种基于DES和RSA的新的数字签名方案,并给出了它的应用实例。 相似文献
12.
介绍了NAS的工作原理与优点,根据网络存储实际应用中的安全隐患,提出了加密NAS的应用需求.研究了以MPC8379E为主控芯片的AES加密NAS的解决方案,并详细论述了NAS加密密钥管理的实现方法.该方案能够很好地实现加密NAS的访问控制与算法密钥管理,保证了数据加密存储的安全性. 相似文献
13.
Automated String Constraints Solving for Programs Containing String Manipulation Functions 下载免费PDF全文
The ability to solve various constraints is a principal factor of automatic constraint solvers. Most object-oriented languages treat a character string as a primitive data type which is manipulated by string library functions. Most constraint solvers have limitations on their input constraints, such as strong restrictions on the expressiveness of constraints or lack of the ability to solve hybrid constraints. These limitations hinder applying automated constraint solvers on program analysis techniques for programs containing strings and string manipulation functions. We propose an approach to automatically solve program constraints involving strings and string manipulation functions. Based on the character array model, we design a constraint language which contains primitive operations to precisely describe the constraints of commonly used string manipulation functions. The translated string constraints together with numeric constraints are then solved by a two-phase test generation procedure: firstly, a partial solution is obtained to satisfy the arithmetic constraints of the position variables, and the solution is utilized to simplify the string constraints into pure character array constraints; secondly, the pure array constraints are solved by an off-the-shelf array-specific theory based constraint solver. We integrate the approach into an automated testing tool to support the generation of string test cases, and then perform experiments. The results of the experiments prove that the integration of the proposed approach promotes the testing coverage of the existing testing tool, and the integrated tool has an advantage of handling specific string manipulation functions compared with an existing string solver. 相似文献
14.
动态网页源码安全性研究及实现 总被引:4,自引:0,他引:4
余连新 《网络安全技术与应用》2006,(2):51-53
本文在研究了动态网页源码特性的基础上,针对动态页面的源码安全性特点,设计了在开发动态页面的过程中如何加密源码的方法,即将动态页面编译后要向客户显示的内容保存在相应的字符串变量,将其加密,并自动生成静态文件,最后用页面自动跳转的方法将动态页面跳转到该静态页面,以保护源码的安全. 相似文献
15.
混沌系统对初始值的极端敏感,使得它呈现出类随机性和数据难以预测的特点,因此在安全通信和算法加密设计方面得到了许多应用.数字签名技术是网络信息传输过程中经常应用的加密技术,不同于多数系统中经常采用的非对称加密技术,提出了一种基于超混沌强化对称加密算法的数字签名技术,通过对DES算法的入口参数进行混沌加密,而使得对称算法得到了进一步的增强,给出了数字签名算法的实现过程并给出了该方法在局域网信息安全传输中的应用. 相似文献
16.
Suleiman H. 《Computer Standards & Interfaces》2002,24(5):473-481
This paper presents the results of investigating the impact of variations found in character coding schemes on the performance of string hashing. The investigation involved three types of Arabic strings (single words, personal names, and document titles) and four different Arabic coding schemes. The results were examined in three different respects: collision rates, arithmetic code redundancy, and the contribution of arithmetic redundancy to the collision rate. Two items are considered arithmetically redundant, if they have the same numerical coding value. Even though the mathematical properties of coding schemes showed some impact on the hashing results, coding scheme variation was basically reflected in the results of hashing on single dictionary words. Where a difference was noted in the rates of arithmetic redundancy, it was accompanied by different growth patterns of collision. The results seem to indicate that the arithmetic properties of the collating sequence of a given coding scheme are likely to have some impact on the performance of string hashing. 相似文献
17.
《IEEE transactions on pattern analysis and machine intelligence》1976,(3):176-185
Many languages, including Fortran, and machines such as most minicomputers have little or no built-in character manipulation capability and yet are often required to process character information. This paper discusses the programming of character processing in such integer environments. Character representation, string-to-word coordinate transformation, packing, and unpacking using several arithmetic schemes are discussed with special attention to program portability. Several Fortran subroutines are presented culminating in BYTRAN, a set of portable Fortran subroutines that simulate the string structures and operators of the PL/I language. 相似文献
18.
随机数在保密传输中的应用 总被引:1,自引:0,他引:1
当今世界已经是信息的世界,有了信息就有了交换,在Internet已经得到了广泛普及的今天,信息的保密传输还是Internet中的一个难题。于是便产生了数据加密,有了加密就肯定有解密,加密和解密是层出不穷的。作为现在流行的采用密钥加密解密的算法,无非分为对称密钥和非对称密钥两种类型。本文将着重讨论一下利用随机数作为密钥,采用现有的加密技术达到比较高的数据传输的保密性。 相似文献
19.
南航网上售票系统基于微软的.NET技术,数据库连接信息存放在Web.config配置文件中.通过使用3DES算法对数据库连接字符串进行加密,增强系统的安全性.首先分析.NET Framework提供的密码类,然后设计了具体的3DES的应用类.管理员设置数据库连接信息,并用3DES加密后,放置于Web.config配置文件中.应用程序从Web.config中取出连接字符串,解密后,用其创建ADO.NET数据库连接. 相似文献