您好,欢迎访问三七文档
当前位置:首页 > 商业/管理/HR > 项目/工程管理 > ERP模式下人事管理系统的加密设计与实现
河北工业大学硕士学位论文ERP模式下人事管理系统的加密设计与实现姓名:王利琴申请学位级别:硕士专业:计算机应用技术指导教师:武金木20070101iERPERPERPERPERPERPERPRSAERPERPERPERPRSAVC6.0ERP――RSA4RSAERPRSARSAERPiiENCRYPTIONDESIGNANDREALIZATIONOFPERSONALMANAGEMENTSYSTEMBASEDONERPMODEABSTRACTTheERP(EnterpriseResourcePlanning)isanenterpriseresourcemanagementsystemwhichconformitiesbusinessmanagementideaserviceflow,foundationdata,manpower,physicalresource,andthecomputerhardwareandsoftware.Itiswidelyadoptedinthecurrententerprise.So,thesecurityofERPisalsoarousingthemoreandmorepeople'sinterest.HowtotakethepowerfulsecuritymeasuretosafeguardtheinformationsecurityofenterpriseisbecomingthequestionwhichERPsystemmustsolve.ThemainpointoftheissueistheinformationsecuritybasedontheERPsystem.AfteranalyzingthesecuritycharacteristicsofERPsystem,securitytechniqueappliedintheERPandsecurityquestionintheERPsystem,weputforwardthemixedmethodthatadoptsRSAandpermutationcodetoensurethesafetyofenterpriseinformation.Firstofall,thispaperintroducesthebackgroundandpracticalsenseofERPencryption.ThenintroducestheconceptanddevelopmentofERPsimply,andanalysesthesecurityproblemofERPatpresent,themeasurewhichneedstoadoptisalsoputforward.Afterthat,explaintheRSAalgorithmandthepermutationcodealgorithm,anddiscusstherealizationofthetwoalgorithmsindetail.Atlast,weusecaseanalysesanddesignaccordingtothesoftwaredevelopmentunderVC6.0integrateddevelopmentenvironmenttodesignthesubsystemofERP-personnelmanagementsystem.Weapplythemixedalgorithmsuccessfullyintothesystem.Consideringtherespondspeedofthesystem,thispaperusesRSAtoencryptthecustomerinformation.Thecustomerlogsonthesystemusingtheregisterednameandthepasswordwhichcangenerateapairedkeyrandomly.Thispairedkeyencryptsthecustomerinformation.Weadoptn=4permutationcodetoencryptthesystemdata.Theexcellenceofpermutationcodeistheencryptionspeediness,encryptionintensityetc.Onthekeymanagementside,weadoptthetwo-levelkeymanagementsystemwhichusestheRSAtoencryptthekeyofpermutationcode.AccordingtotheencryptiondesignandrealizationofthepersonalmanagementsystemofERP,themixedmethodbasedonRSAandpermutationalgorithmhassuchcharacteristicassimplerealization,highintensityencryption.So,wecanmakeaconclusionthatthemixedmethodhasacertainappliedforeground.KEYWORDS:encrypt,RSA,permutationcode,ERP,personnelmanagement1§1-1ERPERP(EnterpriseResourcePlanning)PICSERPERPAccounting-OrientedERPInternetERPERPERPERPERPERPERPERP[1,2]ERP1ERP2,,,3,,4,2§1-2――ERP21ERPERPERPERPERPERP§1-3ERPRSAERPERPERPVC++SQLServer2000ERPERPRSARSAERPRSAERPERPVC6.0SQLServer20003ERP§2-1ERP2-1-1ERPERP--EnterpriseResourcePlanningERP1ERPGarterGroupInc.ERPMRPIIManufacturingResourcePlanning,“”SupplyChain2ERP/4GL3ERPERP2-1-2ERPERPMRPMRPMaterialRequirementPlanningMRPMRPMRPMRPMRPManufacturingResourcePlanningMRPMRPMRPII9080MRP90ERPERPMRP-2.1ERP2.1Fig.2.1DevelopmentPhaseofERP§2-2ERP2-2-1ERP1981MRPIIMRPII/ERP20MRPII/ERPMRPII“”19901996MRPII/ERP“”1997ERPERP“”2-2-2ERPERPInternet/Intranet45ERPOLTPOLAPClient/ServerWebInternet/Intranet1ERPInternete-ERPERPInternetERP――e-ERP2ERPERPCRMCustomerRelationshipManagementSCMSupplyChainManagementERPCRMSCM“”3ERP4ERPERP§2-3ERP2-3-1ERPERP2-3-2ERPERP12364562-3-3ERPERPERP1(message)(replication)TCP/IP(DBLUW)(redolog)(backupandrecovery)2C2LevelUNIXWindowsNTServerOracleInformixC23IC()4UNIX5ERP(transaction)(field)(value)7§2-4ERPERPERP8§3-13-1-1[41]1949ENIGMA1919--194919751949Shannon“”1967KahnCodebreakers196719761976DaffieHellman“”“”“”(cryptography)(cryptanalysis)[4]3-1-2TranspositionandSubstitutionCiphers1,265*5,IJ,3.1lc,l,c,B12,r423.1Table3.1ChessboardCipherABCDEFGHIJKLMNOPQRSTUVWXYZ2kk=5:ABCDEFGHIJKLMNOPQRSTUVWXYZFGHIJKLMNOPQRSTUVWXYZABCDEk26025,c=m+kmod26,m,c,k,3(),HAPPYNEWYEAR,,HAPYNEWR,,3.23.2Table3.2Single-TablePermutationCipherABCDEFGHIJKLMHAPYNEWRBCDFGNOPQRSTUVWXYZIJKLMOQSTUVXZ,pension,knodbho,41(Vigenere)[42]16BlasisedeVigenerc,,,,:,n,12K=k...dkk12...mmm=,12...ccc=,(mod)itditdicmk++n=+t:(n=26),K=somuchm=amanliberalinhisviews,c=samhnptsdunpfvunxpwke2(Vernam):,.,,12K=k...ikk12M=m...imm12C=c...icc(i=0,1,2,…)iicmk=⊕i93HilliiK12M=m...imm12()c...KiCEMcc==11111221221122221122...(mod)...(mod)......(mod)iiiiiiiiiickmkmkmnckmkmkmnckmkmkmn=+++=+++=+++K1K−3-1-33.1[6]103.1Fig.3.1EncryptionandDecryption(algorithm)(restricted)(key)KKK(keyspace)K/EK(M)=CDK(C)=MDK(EK(M))=MK1K2EK1(M)=CDK2(C)=MDK2(EK1(M))=M[3]1[40]3.2K3.2Fig.3.2SymmetryEncryptionAlgorithmKnn(n1)/2[5]DESAES()IDEA2,3.3[3]11K1K23.3Fig.3.3UnsymmetryEncryptionAlgorithmn2nRSAMITRonRivestAdiShamirLeonardAdleman1978RSA§3-2RSA3-2-1RSA·1m12…mmϕ()mmϕ(m)=-1m·2m1(a,)=1(3-1)da()≥mmmδa·1(a,)=1amm)(maϕ≡)(mod1mam-1≡1(mod)mpa≡pa)(modpa·2,m=1d1≥ma)(mod1mad≡3-1d0(3-1)(3-1)dd0|dd≡0(modd0)·3m≥1(,m)=1cc*aa≡1(modm)cam)(mod1ma−1−a3-2-2RSARSA1978RivestShamirAdleman12RSARSA[8]pqn=p*qϕ()=(np-1)(-1)qd(dϕ())=1nee*d≡1(modϕ())e=dn-1(modϕ())nendpqϕ(n)RSAlog2nmcc=E(m)=memodnD(c)=cdmodn3-2-3RSARSA1n2e3d4RSA1RSA200123RSA,nn,n,,,10,,1320,2,50100,1036[14]nppp357,1150%N“”N“”N1/ppp1“”NNrN1/prr1/prNRSA2030100Solovay-StrassenLehmannMiller-RabinLehmannppaS1i=1S2{2…p-1}aJ=(1)pa−/2modpS3J1-1,pS4J=1-1,p50%.S5i=i+1t
本文标题:ERP模式下人事管理系统的加密设计与实现
链接地址:https://www.777doc.com/doc-11031 .html