ﻩ论文题目:数据加密技术的设计与应用摘要在竞争激烈的信息时代,信息不仅给我们带来很大的方便,同样,信息也可以用来对他们构成威胁、造成破坏。因此,在客观上就需要一种强有力的安全措施来保护机密数据不被窃取或篡改,数据加密技术就应运而生。所谓数据加密技术是指将一个信息经过加密钥匙及加密函数转换,变成无意义的密文,而接收方则将此密文经过解密函数、解密钥匙还原成明文。加密技术是网络安全技术的基石。所谓加密,就是把数据信息即明文转换为不可辨识的形式即密文的过程,目的是使不应了解该数据信息的人不能够知道和识别。将密文转变为明文的过程就是解密。加密和解密过程形成加密系统,明文与密文统称为报文。任何加密系统,不论形式如何复杂,实现的算法如何不同,但其基本组成部分是相同的。本文是一篇讨论关于常用文件加密解密算法的毕业设计论文,它详细的讲述了文件加密解密算法实现的过程中所用到的方法、技术。对公钥密码体制和私钥密码体制进行了分析和研究,并对公钥密码体制和私钥密码体制的代表RSA算法和DES算法进行了研究和比较。关键词解密文件加密密码体制DESRSAAbstractInthefiercecompetitionintheinformationage,informationnotonlybringusalotofconvenience,thesame,theinformationcanalsobeusedtoposeathreat,theycausedamage.Therefore,inwhichtheyneedastrongsecuritymeasurestoprotectconfidentialdataisnottheftorfalsified,dataencryptiontechnologyismade.Theso-calleddataencryptiontechnologyreferstoaninformationencryptedkeyandencryptionfunctionconversion,becomemeaninglessciphertext,andreceivingpartywilltheciphertextafterdecryptionfunction,decryptionkeyreductionintoplaintext.Encryptiontechnologyisthefoundationofnetworksecuritytechnology.Theso-calledencryption,dataistheinformationthatisnotexpresslyconvertedtotheformofidentificationisciphertextprocess,thepurposeistomakeshouldnotunderstandthedatainformationofpeoplecan'tknowandidentification.Willciphertextintoplaintextprocessisdecryption.Encryptionanddecryptionprocessformsencryptionsystem,plaintextandciphertextcollectivelyreferredtoasmessage.Anyencryptionsystem,nomatterhowcomplexform,thealgorithmisrealizedhowdifferent,butthebasiccomponentisthesame.Thispaperisadiscussionaboutthecommonfileencryptiondecryptionalgorithmgraduationdesignpaper,itdetailedtellsthestoryoffileencryptiondecryptionalgorithmusedintheprocessofthemethodandtechnology.Topublickeycryptosystemsandprivatekeyciphersystemwereanalyzedandinvestigated,andthepublickeycryptosystemandtheprivatekeyciphersystemonbehalfoftheRSAalgorithmandDESalgorithmarestudiedandcompared.KEYWORDecryptionFileencryptionThepasswordsystemDESRSA目录第一章绪言...........................................................................................................................1第二章需求分析.....................................................................................................................1第一节概述....................................................................................................................1第二节密码学的发展..................................................................................................