Font Size: a A A

Redundancy Encrypt And Application Study

Posted on:2005-11-14Degree:MasterType:Thesis
Country:ChinaCandidate:H Y LiuFull Text:PDF
GTID:2168360122487690Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Recently, more and more people do transaction online using the TCP/IP networkand technology. As a result, it requires quicker and more accuracy transmission ofmessages. ELECTRONIC COMMERCE has two aspects: one is electronic aspect andthe other is transaction activity, which can serve a lot of people in all fields. With thewide use of internet technology, people more depend on the internet for their transactionactivity, and so need higer and higer transaction security. Thus the imformation securityis very important. However, we often meet some animus attacks and the attackers wantto get some important files. To improve security, scientist provide many kinds of theways of the encryption technology to resolve these problems. Because differenttechnology has different properties, and so the people must analyze them and chooseone of them. In this thesis, we analyze the current encryption methods' problems, and explainthe necessary of the designing the encryption according to the peculiarity of thequotation system. Futhermore, we have designed a new encryption method using thecorrection wrong code in order to meet the requirements of the Hamaeman SystemCompany for its quotation system. In our method design, we use the several correctingwrong codes to replace one correcting wrong code, and so many redundancyinformation are filled in the file so that it can strengthen the security. This methodmakes the attacker work more and more time. Now this method is used in not only the quotation system, but also in the other ECfiles.
Keywords/Search Tags:ELECTRONIC COMMERCE, encryption technology, correction code
PDF Full Text Request
Related items