Font Size: a A A

Study On The Appliacation Of Two-dimensional Fingerprint Encryption Code In The File Management System

Posted on:2016-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:D L LiuFull Text:PDF
GTID:2308330467973333Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the continuous development of Internet of things and the Android system,two-dimensional code of Chinese mobile phone market also gradually warming.Nowadays QRcode has been applied to many aspects,for example:the restaurants, schools, shopping onlineand so on.In general, the two-dimensional code mostly is the entrance of webpage browsing,online payment, download and install.The information decoded with using two-dimensional codedecoding software need not be kept confidential.But for some train ticket on thetwo-dimensional code, and some privacy content of two-dimensional code, the information afterdecoding is easily compromised.At this time, the security of two-dimensional code become animportant aspect of the value of two-dimensional code.Based on research and analysis of theexisting model of the QR code and coding theory,author put forward a kind of improved QRmodel for the existing models and security problems.This model mainly introduces two kinds ofencryption algorithm: the improved RC4algorithm and the fingerprint encryptionalgorithm.Through two kinds of encryption algorithm are used in the QR two-dimensional codemodel, the security and confidentiality of the original two-dimensional QR code has been greatlyimproved.The main process of the new model:Before QR two-dimensional code is encoded, weneed to encrypt plaintext into ciphertex(ciphertext is usually some variation character).Thegenerated ciphertext is encoded with QR coding rules, and the encoded two-dimensionalcoding is encrypted using fingerprint encryption algorithm.The main purpose of encryption isuser access rights of reading two-dimensional code is restricted. This algorithm greatlyimproves the security and confidentiality of original model. Therefore, the main contents of thisdissertation and the innovation points are divided into the following three points:1.Firstly,QR two-dimensional code principle and model structure on the use of people’sdaily life is carried out a detailed analysis and research On this basis,author puts forward aimproved two-dimensional QR code model, Two indicators of the encryption speed about theimproved RC4algorithm and accuracy about the modified fingerprint encryption algorithm are used to evaluate feasibility and practicability of the improved model.2.This dissertation put forward a kind of improved RC4algorithm.Firstly,author analyzesreason of the existent defects about the original RC4algorithm,for example: weak keys,easyto gues.On this basis,author improve the original byte swapping process.The specific method isto add the line shift and column shift in the process of the exchange of atomic section.Althoughthe output byte of the surface of the improved algorithm is only two, two rows and two columnsrespectively were carried out for row and column shift.This method increases the algorithmcomplexity of the exchange process.So that the PRGA algorithm module is not vulnerable toguess and attack.Finally,author detects efficiency and the practicability of the algorithm.3.This dissertation put forward an improved fingerprint encryption algorithm.Becauseauthor considers the complexity of fingerprint encryption algorithm and QR two-dimensionalcode,the improved fingerprint encryption algorithm abandon the traditional fingerprintalgorithm.The extracted fingerprint information just simply are expressed and converted tothe corresponding binary sequence.Then author conduct a simple XOR operation.The encryptionperformance of algorithm is evaluated by using evaluation index of fingerprint encryptionalgorithm.4.The improved QR model is applied to the archives management system.Author mainlyencrypt the sensitive information in the archives management system.This approach improvethe security of traditional archives management system.Finally,author conducts function test andlogic test to demonstrate the availability of the system.
Keywords/Search Tags:Fingerprint algorithm, QR two-dimensional code, RC4algorithm
PDF Full Text Request
Related items