您好,欢迎访问三七文档
当前位置:首页 > IT计算机/网络 > 电子商务 > 密钥分散管理系统密钥确认算法实现毕业设计论文
大学毕业设计(论文)题目:密钥分散管理系统——密钥确认算法实现专业:信息安全学生姓名:班级学号:指导教师:指导单位:计算机学院硬件基础教学中心日期:2009年3月12日至2009年6月15日摘要随着人类社会进入信息时代,信息的产生、处理及安全保密已成为大家都关心的事情。为了实现信息的安全保密,人们可以采用密钥加密信息,从而使不拥有秘密钥的非法人员无法窃获信息。这使得信息的安全保密主要维系于秘密钥的安全,而不是对加密算法的保密。所以保证秘密钥的安全及如何有效地管理密钥成了密码学中十分重要的课题。本论文主要介绍了多用户口令分散管理系统的口令确认算法及界面。该程序能够迅速、准确地对n个用户中的任意k个或k个以上合法用户的口令进行确认,并对用户码和上机时间等有关信息进行记录,可在一定时间内屏蔽连续多次口令输入错误的合法用户,对非法用户的恶意攻击具有较强的抗攻击能力,所编软件应具有通用性。界面设计合理、友好,具有检错和出错提示功能,界面同时应能适应系统内部参数的变化,保持相对稳定性。将密钥s∈S分成n个子密钥vi∈V,1≤i≤n。它们满足:已知任意不少于k(1≤k≤n)个子密钥vi,可容易恢复密钥s;若仅知任意不多于k-1个子密钥vi,则关于密钥s就完全不能确定。称这种方案为(k,n)门限方案。利用这样的方案,可以将用户输入的子密钥合成后与原系统生成的密钥进行对比,当输入的k个子密钥合成后的主密钥与原系统生成的主密钥相同时,可判定为完全通过。否则,若用户多次输入错误口令,将对其进行一定时间的屏蔽。关键词:密码学;密钥;分散管理;线性方程组;加密ABSTRACTAshumansocietyenteredtheinformationage,informationgeneration,processingandsecurityhasbecomeamatterofinteresttoeveryone.Inordertoachievethesecurityandconfidentialityofinformation,peoplecanencryptinformationwithkey,sothatpeoplewhodon’tpossessthesecretkeycannotstealillegalpersonnelinformation.Thismakesthesecurityandconfidentialityofinformationmainlydependingonthesecurityofsecretkeys,ratherthanthesecrecyoftheencryptionalgorithm.Therefore,ensuringthesafetyofthesecretkeyandhowtoeffectivelymanagekeyhasbecomeaveryimportantissueincryptography.Thispapermainlyintroducestheconfirmationalgorithmandinterfaceofadecentralizedmulti-userpasswordmanagementsystem.Theprogramcanquicklyandaccuratelyconfirmanykormorethankofnlegitimateuser'spassword.Andrecordtheusercodeandthetime.Itcanshieldthelegitimateuserswhoinputthewrongpasswordmanytimeswithinacertainperiodoftime.Itcanstronglycounteractmaliciousattacksofillegalusers.Thesoftwareshouldbeuniversal.Theinterfacedesigningshouldbereasonableandfriendly.Itshouldbewithprompterroranderrorfunctions.Theinterfaceshouldbeabletoadapttochangesofsystemparametersandtokeepstable.Keys∈Swillbedividedintonsub-keysvi∈V,1≤i≤n.Theymeet:nolessthananyknownk(1≤k≤n)sub-keyvi,couldeasilyresumethekeys;ifonlyknowinganymorethank-1sub-keyvi,thekeyscannotbeidentifiedcompletely.Thatprogramisnamedthe(k,n)thresholdscheme.Usingsuchprograms,wecancomparethesub-keysthatusersenteredwiththeoriginalsystem-generatedkeys.Whenthekeythatcomposedbythekinputtingsub-keysissametotheoriginalsystem-generatedprimarykey,itcanbejudgedtobecompletelythrough.Otherwise,iftheusersenterthewrongpasswordseveraltimes,thereisacertainperiodoftimefortheirshield.Keywords:Cryptography;Key;Decentralizedmanagement;Systemoflinearequations;Encryption目录第一章绪论....................................................61.1研究的背景.............................................................61.2研究的目的.............................................................6第二章密钥分散管理相关理论....................................82.1(,)门限方案.........................................................82.2防止子密钥窜改的一般方法...............................................92.3高斯消元法.............................................................92.3.1简介...............................................................92.3.2在信息学方面的应用................................................102.4MD5加密算法..........................................................122.4.1简介..............................................................122.4.2算法描述..........................................................122.5密钥分配与管理........................................................162.5.1密钥分配方案......................................................162.5.2密钥的管理........................................................17第三章相关技术...............................................213.1MFC简介..............................................................213.2VC++6.0..............................................................22第四章需求分析...............................................244.1需求分析的任务........................................................244.2系统功能分析..........................................................244.3系统需求分析的步骤....................................................24第五章总体设计...............................................255.1设计目标..............................................................255.2设计原理..............................................................255.3密码确认系统的实现....................................................265.4系统配置..............................................................265.5流程设计..............................................................275.5.1密钥分散..........................................................275.5.2密钥确认..........................................................28第六章详细设计...............................................296.1代码设计..............................................................296.1.1文件列表..........................................................296.1.2核心代码..........................................................306.1.3程序界面..........................................................31结束语.........................................................33致谢.........................................................34参考文献.......................................................35附录A........................................................
本文标题:密钥分散管理系统密钥确认算法实现毕业设计论文
链接地址:https://www.777doc.com/doc-2465000 .html