Font Size: a A A

Research And Aggregate Of Game Data Mixed Encryption Based On AES And ECC

Posted on:2019-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:J N LiFull Text:PDF
GTID:2428330596462435Subject:Engineering
Abstract/Summary:PDF Full Text Request
The rapid development of network informatization has brought about the emergence of online games,and traditional games have begun to transform to online games.Online games can break the time and space constraints,from different groups of people from all over the world together to build a virtual world,it is based on this Internet connecting players around the world,with the development of online games have begun to move towards the mobile side.At present,the network game mainly combines the PC end with the mobile end,and transmits the virtual information,such as money and other information to the client side through the Internet,which leads to the problem of information leakage and theft and other illegal game property information.However,the current online game industry does not form unified safety standards and principles.This paper mainly analyzes the network game communication architecture,finds out its security problems,and builds the network game security evaluation model based on the analysis results,and eliminates the security risks of the game,replaces the original communication architecture with a more secure and reliable communication architecture,in combination with cryptography correlation.Security theory protects game data transmission.According to the actual situation and needs,construct a suitable network game security communication engine,in order to protect the security of network data transmission,improve transport efficiency.The problem of data protection of elliptic curve in general is studied.This calculation is actually a scalar multiplication with a finite field.The general calculation of scalar multiplication is usually the addition and operation of binary.The disadvantage is that if the value of the variable continues to increase,the calculation effect is not satisfactory,which will hinder the whole process of ECC(Elliptic Curve Cryptography)calculation.In this paper,the Frobenius elliptical curve encryption technology in the general sense and the application of Frobenius format are fully studied,and a more perfect new Frobenius elliptical curve encryption technology,which is mainly based on wireless sensor technology,is constructed.While combining the benefits of two more mature computing methods,such as ECC and AES(Advanced Encryption Standard),the co-encryption method of ECC and AES is constructed.The key of symmetric encryption algorithm is managed by ECC algorithm with higher security,plaintext is encrypted by AES algorithm with faster encryption speed,and message authentication algorithm is added by HMAC(cryptographic hash operation authentication code,Keyed-Hashing for Message Authentication).In order to verify the feasibility of the algorithm,this paper uses VC++ programming language to write the algorithm program,and in Windows environment simulation.Experiments on different sizes of wireless sensor network packets using hybrid encryption algorithm show that the performance of hybrid encryption algorithm is better than that of traditional elliptic curve algorithm and RSA hybrid encryption algorithm.In addition,this paper also tested the engine,and began to prepare relevant test cases,research and development of a data encryption and transmission efficiency test procedures,whether banks,securities and e-commerce and other fields,have used the relevant cryptography theory,mainly because cryptography can effectively protect data.At present,with the continuous study of academia,cryptography has shown a more prosperous situation,so it is feasible to introduce cryptography into online games,which can promote the security of data transmission.As a new industry,online game develops rapidly,mainly because it has a huge market,so it is urgent to solve the security problems in its game data transmission.
Keywords/Search Tags:AES, ECC, Hybrid encryption, Message authentication, Game data
PDF Full Text Request
Related items