n維魔方加密算法的設(shè)計(jì)與實(shí)現(xiàn).doc
約30頁(yè)DOC格式手機(jī)打開(kāi)展開(kāi)
n維魔方加密算法的設(shè)計(jì)與實(shí)現(xiàn),n維魔方加密算法的設(shè)計(jì)與實(shí)現(xiàn)1.5萬(wàn)字30頁(yè)摘要隨著計(jì)算機(jī)網(wǎng)絡(luò)的普及,網(wǎng)絡(luò)攻擊、計(jì)算機(jī)犯罪也隨之不斷增多。尤其是針對(duì)缺少技術(shù)支持的個(gè)人用戶。與公司機(jī)關(guān)等大型用戶相比,個(gè)人用戶的防護(hù)較簡(jiǎn)單,防護(hù)意識(shí)差,使得個(gè)人隱私容易泄露,網(wǎng)絡(luò)侵權(quán)不斷發(fā)生。如何滿足個(gè)人用戶的保密、加密需求,采用什么樣的加密模型,就成為了值得研究的問(wèn)題。...
內(nèi)容介紹
此文檔由會(huì)員 阿凡達(dá) 發(fā)布
N維魔方加密算法的設(shè)計(jì)與實(shí)現(xiàn)
1.5萬(wàn)字 30頁(yè)
摘 要
隨著計(jì)算機(jī)網(wǎng)絡(luò)的普及,網(wǎng)絡(luò)攻擊、計(jì)算機(jī)犯罪也隨之不斷增多。尤其是針對(duì)缺少技術(shù)支持的個(gè)人用戶。與公司機(jī)關(guān)等大型用戶相比,個(gè)人用戶的防護(hù)較簡(jiǎn)單,防護(hù)意識(shí)差,使得個(gè)人隱私容易泄露,網(wǎng)絡(luò)侵權(quán)不斷發(fā)生。如何滿足個(gè)人用戶的保密、加密需求,采用什么樣的加密模型,就成為了值得研究的問(wèn)題。
本文通過(guò)研究現(xiàn)有的三維魔方加密,將三維三階的魔方映射成用數(shù)組表示的虛擬魔方,仿照魔方的移動(dòng)規(guī)律設(shè)計(jì)并改進(jìn)了虛擬魔方的加密方式,該方式通過(guò)一定的隨機(jī)步驟移動(dòng)達(dá)到加密置亂的效果。在此基礎(chǔ)上將虛擬魔方擴(kuò)展到N維,分析了加密效率與加密強(qiáng)度隨著維度增加的關(guān)系,同時(shí)結(jié)合主流破解方式,分析魔方加密的抗攻擊能力。根據(jù)魔方加密的特性,找出魔方加密模型運(yùn)用到文字加密上的不足,結(jié)合橢圓曲線加密算法改進(jìn)N維魔方加密模型。并且針對(duì)漢字是象形文字與以字母為基礎(chǔ)的拉丁語(yǔ)系不同的特性,加入偽隨機(jī)數(shù)置亂,提高魔方加密對(duì)漢字的加密能力。在此研究基礎(chǔ)上給出一個(gè)簡(jiǎn)單的實(shí)現(xiàn),該實(shí)現(xiàn)是改進(jìn)后的魔方加密模型。用該實(shí)現(xiàn)與DES算法進(jìn)行對(duì)比試驗(yàn),根據(jù)實(shí)驗(yàn)結(jié)果進(jìn)行了加密性能和加密效率的總體算法分析。
論文最后對(duì)全文進(jìn)行了總結(jié),并對(duì)后續(xù)工作進(jìn)行了展望。
關(guān)鍵詞:加密, N維, 魔方, 橢圓, 偽隨機(jī)
Abstract
Chaperonage mankind society of continuously development and progress, calculator gradually infiltration arrive people life of each area. Calculator of universality, biggest push mankind society of progress, speed transact an efficiency, convenience daily of food and clothing living, but in the meantime, network attack, calculator crime also immediately and continuously increase. It particularly is personal customers who aim at a want for technique support. With company organization etc. the large customer compare, personal customer's protection more simple, protection consciousness bad, make personal privacy easy reveal, network infringement continuously occurrence. How satisfy the need of keeping secret, encrypting of personal customer, adoption what kind of encrypt model, became a problem worthy of study.
This text encrypt through the research 3D Rubik's cube and reflect 3D Rubik's cube of three ranks to shoot use a several mean of conjecture Rubik's cube, follow a Rubik's cube of move way design and improvement conjecture Rubik's cube of move way, pass certain of random step move attain to encrypt to place disorderly of effect. Expand to N in this conjecture Rubik's cube of the foundation full general, analysis encrypt an efficiency with encrypt strength along with the dimension increment of relation, combine in the meantime main current crack a way, analysis the Rubik's cube encrypt of anti- attack ability. The characteristic encrypted according to the Rubik's cube, find out a Rubik's cube to encrypt a model usage to arrive a writing to encrypt top of shortage, combine oval curve to encrypt calculate way improvement N a Rubik's cube to encrypt model. And aim at Chinese characters is pictograph with take letter of alphabet as foundation of the Latin fasten dissimilarity of characteristic, join false random number place disorderly, exaltation the Rubik's cube encrypt the ability of encrypting Chinese characters. At this research foundation top give a simple of realization, should realization is improvement empress of the Rubik's cube encrypt model. Use that realization to carry on contrast with DES calculate way experiment, according to experiment result carried on to encrypt function and encrypt an efficiency of total calculate way analysis.
Thesis the end carried on summary to the full text, and to follow-up work carried on outlook.
Key Words:Encrypt;N Wei; Rubik's cube; oval and false random
目 錄
第一章 緒論 1
1.1 課題研究的背景 1
1.2 課題研究的現(xiàn)狀 1
1.3 論文組織結(jié)構(gòu) 2
第二章 加密算法 3
2.1 私鑰加密簡(jiǎn)介 3
2.2 公開(kāi)密鑰加密簡(jiǎn)介 4
2.3 加密算法的對(duì)比與選擇 5
2.4 本章小結(jié) 7
第三章 魔方加密算法設(shè)計(jì)與分析 8
3.1 魔方加密思想 8
3.2 加密算法的設(shè)計(jì) 9
3.3 密鑰的設(shè)計(jì) 12
3.4 魔方加密的性能 13
3.4.1 魔方加密的總體性能 13
3.4.2 魔方加密的性能與維度的關(guān)系 14
3.5 本章小結(jié) 15
第四章 魔方加密算法的改進(jìn)與分析 16
4.1 引入橢圓加密 16
4.2 引入偽隨機(jī)數(shù)置亂加密 16
4.3 魔方加密的改進(jìn) 17
4.4 改進(jìn)魔方加密后的性能 18
4.5 本章小結(jié) 18
第五章 對(duì)比實(shí)驗(yàn)及分析 19
5.1 實(shí)驗(yàn)設(shè)計(jì) 19
5.2 實(shí)驗(yàn)結(jié)果 19
5.3 本章小結(jié) 20
總結(jié)與展望 21
總結(jié) 21
展望 21
致 謝 23
參考文獻(xiàn) 24
參考文獻(xiàn)
[5].申春雪,用全排列和遞歸求解“魔方”——C++程序設(shè)計(jì).洛陽(yáng)大學(xué)學(xué)報(bào)[J]
[6].何智勇,賁可榮,基于OpenGL的魔方自動(dòng)求解算法與實(shí)現(xiàn).哈爾濱工業(yè)大學(xué)學(xué)報(bào)[J]
[7].陳 濤,謝陽(yáng)群,基于擴(kuò)展的N維魔方加密算法的設(shè)計(jì)與實(shí)現(xiàn).情報(bào)技術(shù)[J]
[8].彭曉君,基于Turbo C 2.0的人工智能魔方模型方案.肇慶學(xué)院學(xué)報(bào)[J]
1.5萬(wàn)字 30頁(yè)
摘 要
隨著計(jì)算機(jī)網(wǎng)絡(luò)的普及,網(wǎng)絡(luò)攻擊、計(jì)算機(jī)犯罪也隨之不斷增多。尤其是針對(duì)缺少技術(shù)支持的個(gè)人用戶。與公司機(jī)關(guān)等大型用戶相比,個(gè)人用戶的防護(hù)較簡(jiǎn)單,防護(hù)意識(shí)差,使得個(gè)人隱私容易泄露,網(wǎng)絡(luò)侵權(quán)不斷發(fā)生。如何滿足個(gè)人用戶的保密、加密需求,采用什么樣的加密模型,就成為了值得研究的問(wèn)題。
本文通過(guò)研究現(xiàn)有的三維魔方加密,將三維三階的魔方映射成用數(shù)組表示的虛擬魔方,仿照魔方的移動(dòng)規(guī)律設(shè)計(jì)并改進(jìn)了虛擬魔方的加密方式,該方式通過(guò)一定的隨機(jī)步驟移動(dòng)達(dá)到加密置亂的效果。在此基礎(chǔ)上將虛擬魔方擴(kuò)展到N維,分析了加密效率與加密強(qiáng)度隨著維度增加的關(guān)系,同時(shí)結(jié)合主流破解方式,分析魔方加密的抗攻擊能力。根據(jù)魔方加密的特性,找出魔方加密模型運(yùn)用到文字加密上的不足,結(jié)合橢圓曲線加密算法改進(jìn)N維魔方加密模型。并且針對(duì)漢字是象形文字與以字母為基礎(chǔ)的拉丁語(yǔ)系不同的特性,加入偽隨機(jī)數(shù)置亂,提高魔方加密對(duì)漢字的加密能力。在此研究基礎(chǔ)上給出一個(gè)簡(jiǎn)單的實(shí)現(xiàn),該實(shí)現(xiàn)是改進(jìn)后的魔方加密模型。用該實(shí)現(xiàn)與DES算法進(jìn)行對(duì)比試驗(yàn),根據(jù)實(shí)驗(yàn)結(jié)果進(jìn)行了加密性能和加密效率的總體算法分析。
論文最后對(duì)全文進(jìn)行了總結(jié),并對(duì)后續(xù)工作進(jìn)行了展望。
關(guān)鍵詞:加密, N維, 魔方, 橢圓, 偽隨機(jī)
Abstract
Chaperonage mankind society of continuously development and progress, calculator gradually infiltration arrive people life of each area. Calculator of universality, biggest push mankind society of progress, speed transact an efficiency, convenience daily of food and clothing living, but in the meantime, network attack, calculator crime also immediately and continuously increase. It particularly is personal customers who aim at a want for technique support. With company organization etc. the large customer compare, personal customer's protection more simple, protection consciousness bad, make personal privacy easy reveal, network infringement continuously occurrence. How satisfy the need of keeping secret, encrypting of personal customer, adoption what kind of encrypt model, became a problem worthy of study.
This text encrypt through the research 3D Rubik's cube and reflect 3D Rubik's cube of three ranks to shoot use a several mean of conjecture Rubik's cube, follow a Rubik's cube of move way design and improvement conjecture Rubik's cube of move way, pass certain of random step move attain to encrypt to place disorderly of effect. Expand to N in this conjecture Rubik's cube of the foundation full general, analysis encrypt an efficiency with encrypt strength along with the dimension increment of relation, combine in the meantime main current crack a way, analysis the Rubik's cube encrypt of anti- attack ability. The characteristic encrypted according to the Rubik's cube, find out a Rubik's cube to encrypt a model usage to arrive a writing to encrypt top of shortage, combine oval curve to encrypt calculate way improvement N a Rubik's cube to encrypt model. And aim at Chinese characters is pictograph with take letter of alphabet as foundation of the Latin fasten dissimilarity of characteristic, join false random number place disorderly, exaltation the Rubik's cube encrypt the ability of encrypting Chinese characters. At this research foundation top give a simple of realization, should realization is improvement empress of the Rubik's cube encrypt model. Use that realization to carry on contrast with DES calculate way experiment, according to experiment result carried on to encrypt function and encrypt an efficiency of total calculate way analysis.
Thesis the end carried on summary to the full text, and to follow-up work carried on outlook.
Key Words:Encrypt;N Wei; Rubik's cube; oval and false random
目 錄
第一章 緒論 1
1.1 課題研究的背景 1
1.2 課題研究的現(xiàn)狀 1
1.3 論文組織結(jié)構(gòu) 2
第二章 加密算法 3
2.1 私鑰加密簡(jiǎn)介 3
2.2 公開(kāi)密鑰加密簡(jiǎn)介 4
2.3 加密算法的對(duì)比與選擇 5
2.4 本章小結(jié) 7
第三章 魔方加密算法設(shè)計(jì)與分析 8
3.1 魔方加密思想 8
3.2 加密算法的設(shè)計(jì) 9
3.3 密鑰的設(shè)計(jì) 12
3.4 魔方加密的性能 13
3.4.1 魔方加密的總體性能 13
3.4.2 魔方加密的性能與維度的關(guān)系 14
3.5 本章小結(jié) 15
第四章 魔方加密算法的改進(jìn)與分析 16
4.1 引入橢圓加密 16
4.2 引入偽隨機(jī)數(shù)置亂加密 16
4.3 魔方加密的改進(jìn) 17
4.4 改進(jìn)魔方加密后的性能 18
4.5 本章小結(jié) 18
第五章 對(duì)比實(shí)驗(yàn)及分析 19
5.1 實(shí)驗(yàn)設(shè)計(jì) 19
5.2 實(shí)驗(yàn)結(jié)果 19
5.3 本章小結(jié) 20
總結(jié)與展望 21
總結(jié) 21
展望 21
致 謝 23
參考文獻(xiàn) 24
參考文獻(xiàn)
[5].申春雪,用全排列和遞歸求解“魔方”——C++程序設(shè)計(jì).洛陽(yáng)大學(xué)學(xué)報(bào)[J]
[6].何智勇,賁可榮,基于OpenGL的魔方自動(dòng)求解算法與實(shí)現(xiàn).哈爾濱工業(yè)大學(xué)學(xué)報(bào)[J]
[7].陳 濤,謝陽(yáng)群,基于擴(kuò)展的N維魔方加密算法的設(shè)計(jì)與實(shí)現(xiàn).情報(bào)技術(shù)[J]
[8].彭曉君,基于Turbo C 2.0的人工智能魔方模型方案.肇慶學(xué)院學(xué)報(bào)[J]
TA們正在看...
- 誰(shuí)來(lái)為“售后返租”買單.txt
- 【代企業(yè)管理案例分析】oticon公司組織結(jié)構(gòu)變革.doc
- 【代企業(yè)管理案例分析】安徽商人性格調(diào)查報(bào)告及深...txt
- 【代企業(yè)管理案例分析】傳統(tǒng)企業(yè)組織結(jié)構(gòu)模式的比...doc
- 【代企業(yè)管理案例分析】從海爾集團(tuán)美國(guó)建廠看海爾...doc
- 《google排名技巧》共十五課學(xué)習(xí)筆記.doc
- 【代企業(yè)管理案例分析】從正泰的歷史看戰(zhàn)略管理的...doc
- 【代企業(yè)管理案例分析】打破“溫州宿命”:王泉庚...txt
- 【代企業(yè)管理案例分析】海爾組織結(jié)構(gòu)解析強(qiáng)調(diào)“有...doc
- 【代企業(yè)管理案例分析】矩陣結(jié)構(gòu)淺議.doc