| Modern encryption technology and digital signature technology, as important methods to prevent copyright infringement and data piracy in the digital age, has been widely used in all file of digital communications. These methods can effectively guarantee the authority of the data sources, data integrity and authorized data propagation.Due to the lack of appropriate data protection scheme, the unofficial distribution of nautical information gives rise to significant economic impact. Also it gives rise to significant safety concerns because the ENC data can’t be updated in time and data integrity may be destructed during transfer process. To solve this problem, the International Hydrographic Organization launched the S-63data protection schemes. The major works in this article are as follows:(1) Gives a detailed explanation of the principle of methods that involved in the S-63data protection scheme, such as Blowfish encryption and decryption algorithm, DSA digital signature and authentication algorithm, SHA-1Secure Hash Algorithm. In this scheme, Blowfish is a block cipher algorithm, it has a64-bit block size and a variable key length from32bits up to448bits; DSA digital signature and authentication algorithm built on the basis of the public key algorithm, it belongs to a kind of asymmetric algorithms; secure hash algorithm is used to produce a piece of message digest, the algorithm is extremely sensitive to the input.(2) Gives an overview of the overall S-63data protection scheme, divide S-63data protection scheme into four parts:scheme administrator (SA), data service (DS), data client (DC), original equipment manufacturer (OEM), discusses the main duties of the four parts and their workflow in detail. The Scheme Administrator (SA) is solely responsible for maintaining and coordinating the scheme. Data Servers are responsible for the encrypting and signing ENC data in compliance with the procedures and processes defined in the scheme. OEMs must build a software application according to the specifications set out in IHO data protection scheme. Data Clients are the end users of ENC information.(3) Gives a complete description of the duties and workflow of software developers in the perspective of OEM, gives some example code involving the main algorithm in Java and C++. In addition, this paper points out the inadequacies of data protection scheme found in practice and proposes appropriate modifications recommendations. |