Description: 《网络安全技术》
实验报告DES是Data Encryption Standard(数据加密标准)的缩写。它是由IBM公司研制的一种加密算法,美国国家标准局于1977年公布把它作为非机要部门使用的数据加密标准,二十年来,它一直活跃在国际保密通信的舞台上,扮演了十分重要的角色。DES是一个分组加密算法,分组长度为64b,密钥长度也为64b,但因为含有8个奇偶校验比特,所以实际密钥长度为56b。DES算法是迄今为止使用最为广泛的加密算法。
有关算法的详细介绍请参阅教材。- Network security technology, the report experimental DES is Data Encryption Standard (Data Encryption Standard) abbreviation. It is developed by IBM as a encryption algorithm, the United States National Bureau of Standards published in 1977 as the use of non-confidential data encryption standard, the last two decades, it has been active in the international arena and secure communication played a a very important role. DES is a block cipher algorithm, packet length 64b, key length for 64b, but because containing eight parity bits, so the actual length of the key 56b. DES algorithm is by far the most widely used encryption algorithm. Details on the algorithm please refer to materials. Platform: |
Size: 750592 |
Author:ssiy |
Hits:
Description: sd卡结构详细文件,你要的应该就是这个PDF文件了吧-The SD BUS Core with Avalon Interface allows the easy access of
SOPC Builder systems to standard Secure Digital Card (SD) flash based
memory devices. The SD cards are universal, low cost data storage and
communication media, which are generally available and widely used
in consumer products such as digital cameras or cellular phones. The
SD BUS Core is fully compliant with SOPC Builder and integrates easily
into any SOPC Builder generated system. Platform: |
Size: 684032 |
Author:zhangmm |
Hits:
Description: 文件传输协议FTP是基于TCP / IP的应用层协议,其主要功能是提供文件的共享、支持远距离计算机间接或直接连接、保护用户不因各类主机文件存储器系统的差异而受影响、进行可靠且有效的数据传输等,应用非常广泛。但是传统的FTP有不少的安全漏洞,例如明文传输、缺乏对数据的机密性和完整性保护,对通信双方也没有可靠的认证措施等。针对FTP的安全漏洞,近年来也出现了一些不需要对F IP协议自身做完全更改的协议扩展模块,如FTP SSL /TLS Extension。SSL ( Secure Sockets Layer)是用于对TCP / IP数据流进行加密的协议,同时还包括了身份认证和数据完整性校验等内容。显然,基于SSL /TLS的FTP克服了明文传输的致命弱点,但是无可否认的是,在开放式的互联网环境下FTP服务器受到恶意攻击的可能性还是很大,而且协议数据的安全性还是未得到保障。安全的本质是在信息的安全期内保证其在网络上流动的或
者静态存放时不被非授权用户非法访问,但授权用户却可以访问。基于这一概念,本文在SSL 的基础上设计了一个安全FTP系统,从认证、传输、存储三个方面大大提高了FTP的安全性。-FTP File Transfer Protocol is based on TCP/IP application layer protocol, its main function is to provide file sharing, remote computer support to connect directly or indirectly, to protect users from all types of hosts file memory system affected by the difference between, for reliable and effective data transmission and so on, a wide range of applications. Traditional FTP but there are a lot of security vulnerabilities, such as express delivery, lack of data confidentiality and integrity protection, the two sides of the communication did not credible certification measures. FTP for security vulnerabilities in recent years, there have been some F IP protocol does not need to completely change their agreement to do the expansion modules, such as FTP SSL/TLS Extension. SSL (Secure Sockets Layer) is used for TCP/IP data stream is encrypted agreement also includes authentication and data integrity checking and so on. Obviously, based on SSL/TLS for FTP transmission to overcome the Platform: |
Size: 304128 |
Author:Tom |
Hits:
Description: openssl客户端程序与服务器进行SSL安全通信,并传输简单数据-openssl client and server SSL secure communication and data transfer simple Platform: |
Size: 1522688 |
Author:xutao |
Hits:
Description: VPN是通过Internet建立一个临时的、安全的连接,进行数据信息的通信传输。VPN采用加解密技术和密钥管理技术保障数据传输的安全。-VPN through the Internet to build a temporary, secure connection for data communication transmission. VPN with encryption technology and key management technology to protect the security of data transmission. Platform: |
Size: 3671040 |
Author:YCLIU |
Hits:
Description: 随着计算机通信技术与Internet的飞速发展,用户对信息的安全存储、安全处理和安全传输的需求越来越迫切。本文首先论述了网络数
据加密技术,接着分析了网络数据安全研究的必要性,最后阐述了数据加密在网络通信中的应用-With the computer and communication technologies and the rapid development of Internet users about the security of storage, safe handling and secure transport needs more urgent. This paper discusses the network data encryption, and then analyzes the necessity of the research network data security, data encryption in the last described in the application of network communication Platform: |
Size: 1346560 |
Author:佳佳 |
Hits:
Description: 实现两个进程间的通讯,IPC(Inter-Process Communication)是共享"命名管道"的资源,通过提供可信任的用户名和口令,连接双方可以建立安全的通道并以此通道进行加密数据的交换,从而实现对远程计算机的访问。-Communication between two processes, IPC (Inter-Process Communication) is a shared resource of the " named pipes" by providing a trusted user name and password, to connect the two sides can establish a secure channel and channels for the exchange of encrypted data enabling access to the remote computer. Platform: |
Size: 3631104 |
Author:陈建 |
Hits:
Description: 软件采用Eclipse3.5+Android SDK 2.1集成环境,应用程序编程语言采用Java高级语言开发。通过对通讯录中的联系人的管理,来方便用户通讯更加便捷,联系人的数据保存更加安全。在对Android手机通讯管理软件进行详细的系统设计时,对功能进行详细的划分并对其功能做了详细的介绍,列出了一些主要功能流程图。本软件以ContactsManager命名,主要以创新和简约的概念来设计ContactsManager的UI界面和SQLite数据库,编写一个友善界面的通讯录平台工具,实现对信息组和联系人的管理,以及工具常用功能。-The software adopts Eclipse3.5+ the Android SDK 2.1 integrated environment,the application programming language using the Java language development. Management of contacts in the address book, user-friendly communication is more convenient and more secure contact data saved. Detailed system design of the Android mobile communications management software, detailed division of functions and its function described in detail and lists some of the main functions of flowchart. This software is named ContactsManager to the concept of innovation and simplicity to design ContactsManager UI interface and SQLite databases, writing a friendly interface contacts platform tools to achieve the management of the group and contact information, as well as tools commonly used functions. Platform: |
Size: 832512 |
Author:zhiheng |
Hits:
Description: 本书第一部分讲述的是传统的网络接口N e t B I O S、重定向器以及通过重定向器进行的各类网络通信。尽管本书大部分内容均围绕 Wi n s o c k编程这一主题展开,但是, A P I比起Wi n s o c k
来,仍然具有某些独到之处。其中,第 1章探讨的是N e t B I O S接口,它和Wi n s o c k类似,也是
一种与协议无关的网络A P I。N e t B I O S提供了异步调用,同时兼容于较老的操作系统,如 O S / 2
和D O S等等。第2章讨论了重定向器的问题,它是接下去的两个新主题—邮槽(第3章)和
命名管道(第4章)的基础。重定向器提供了与传输无关的文件输入/输出方式。邮槽是一种
简单的接口,可在Wi n d o w s机器之间实现广播和单向数据通信。最后,命名管道可建立一种双向信道,这种信道提供了对Wi n d o w s安全通信的支持。-The first part of the book tells the story of a traditional network interface N et BIOS, redirector and a variety of network communication conducted via redirector. Although most of the book revolves around the themes Wi nsock programming, however, API compared to Wi nsock years, still has some unique. Which is discussed in Chapter 1, N et BIOS interface, and Wi nsock similar, but also a network protocol independent API. N et BIOS provides asynchronous calls, while compatible with older operating systems such as OS/2 and DOS, and so on. Chapter 2 discusses the redirector problem, it is the next two new themes- Mail Slot (Chapter 3) and named pipes (Chapter 4) foundation. Redirect provides a transport-independent file input/output. The mail slot is a simple interface that enables broadcast and one-way data communication between Wi ndows machines. Finally, the named pipe can create a two-way channel, this channel provides support for Wi ndows secure communication. Platform: |
Size: 9951232 |
Author:周舟 |
Hits:
Description: Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. In order to solve the security issues there are number of solutions proposed. This paper focuses on integrity assurance strategy for remote data. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The analysis and simulation results show that our proposed auditing protocols are secure and it reduce the computation load and communication cost of the auditor. Platform: |
Size: 148480 |
Author:Opencvresearcher |
Hits:
Description: The capability of selectively sharing encrypted data with different users via public cloud storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key challenge to designing such encryption schemes lies in the efficient management of encryption keys. The desired flexibility of sharing any group of selected documents with any group of users demands different encryption keys to be used for different documents. However, this also implies the necessity of securely distributing to users a large number of keys for both encryption and search, and those users will have to securely store the received keys, and submit an equally large number of keyword trapdoors to the cloud in order to perform search over the shared data. The implied need for secure communication, Platform: |
Size: 139264 |
Author:Maddy |
Hits:
Description: 加密短信源码TextSecure是Whisper Systems(现已经被Twitter收购)出品的一个为Android设备的短信提供加密服务的工具,TextSecure可以使用流量数据(WiFi/3G/4G)或短信进行安全通信,所有TextSecure消息都可以在设备上本地加密。-Encrypted SMS source textsecure is whisper systems (now is twitter acquisitions) produced a cryptographic service tool for Android devices of SMS and textsecure can use SMS or data flow (WiFi/3G/4G) for secure communication, all textsecure messages can encrypt locally on the device. Platform: |
Size: 2445312 |
Author:神禄 |
Hits:
Description: Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. cryptography is about constructing and analyzing protocols that prevent third parties or the public reading private messages various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography.-Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. cryptography is about constructing and analyzing protocols that prevent third parties or the public reading private messages various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. Platform: |
Size: 10075136 |
Author:Nisha Pal |
Hits: