The paper describes a new electronic official seal system scheme based on the technologies of MD5, RSA and USBkey. In order to guarantee the reliability of transmitting data, the system develops the toolbar by utilizi...
详细信息
ISBN:
(纸本)9780769536101
The paper describes a new electronic official seal system scheme based on the technologies of MD5, RSA and USBkey. In order to guarantee the reliability of transmitting data, the system develops the toolbar by utilizing VBA to found the toolbar object in WORD and calling cryptoapi to realize encryption and decryption, and USBkey is applied to save the key and the digital certificate. Moreover, we combine USBkey with the dynamic password, so that the PIN code could be produced dynamically. According to the experimental results, the storage and transmission of documents are much simpler in electronic form and are more inclined to be accepted by users. The system guarantees the validity, authentication and non-repudiation of the documents. Therefore, the system is of great value in electronic commerce, electronic government and other electronic official fields.
In order to guarantee the secure transmission and efficient authentication of electronic official document paper, this paper puts forward the design plan of the electronic seal system with the technologies of CAPICOM,...
详细信息
ISBN:
(纸本)9783037857441
In order to guarantee the secure transmission and efficient authentication of electronic official document paper, this paper puts forward the design plan of the electronic seal system with the technologies of CAPICOM, SHA-1 and USBKey. The design plan implements document protection function with major forms of electronic signature, handwritten signature and keyboard notation. Examination result and analysis proves that the system can ensure the security of the seal and guaranteed the integrality, authentication and non-repudiation of the documents. The system has broad application potential in electronic commerce, electronic government and other electronic official field.
According to European law (that also has equivalent national regulations across the globe), qualified electronic signatures have the same legal value as handwritten ones, so paper documents are replaced by electronic ...
详细信息
ISBN:
(纸本)9781728156118
According to European law (that also has equivalent national regulations across the globe), qualified electronic signatures have the same legal value as handwritten ones, so paper documents are replaced by electronic versions. As a consequence, electronic document flows a re reshaping the way people interact with governments, banks and other companies, enabling them to sign any kind of documents from the comfort of their office or home, without the need to visit a physical branch. The overall costs are also reduced, as physical paper management is no longer needed. Remote digital signatures have the potential of adding extra convenience, as no more special cryptographic devices are needed to be own, managed, and use by the signers. This paper presents a survey of the methods one can use to integrate remote digital signatures into existing signing applications using the most popular and widely used cryptographic APIs and low-level and high-level cryptographic SDKs.
The software realization of DES symmetric encryption algorithm using cryptoapi on .NET platform has been analyzed. The processing performance of the software implementation has been tested and it was shown, that the e...
详细信息
ISBN:
(纸本)9789665335870
The software realization of DES symmetric encryption algorithm using cryptoapi on .NET platform has been analyzed. The processing performance of the software implementation has been tested and it was shown, that the encryption rate is 11.1 Mb/sec on the Intel Celeron D 351 3.2GHz processor, while the development environment is a flexible architecture independent tool and meets all the requirements to the secure implementation of cryptographic software.
Tato práce se v prvé řadě zaměřuje na návrh a implementaci šifrovacího filtru pro Redirecting Filesystem Framework (dále jen RedirFS) v podobě modulu linuxového jádra. Zpočát...
详细信息
Tato práce se v prvé řadě zaměřuje na návrh a implementaci šifrovacího filtru pro Redirecting Filesystem Framework (dále jen RedirFS) v podobě modulu linuxového jádra. Zpočátku se věnuje problematice kryptografie a šifrování. Dále rozebírá hlavní části RedirFS a možnosti jejich rozšíření. Potom co je čtenář seznámen s důležitými pojmy, následuje hlavní část práce. Nejdříve je nastíněn samotný návrh filtru, zvolené postupy - jejich výhody a omezení. Poslední kapitola je plně věnována cipherflt: vzorové implementaci šifrovacího filtru.
V této práci bude čtenář nejprve seznámen s vybranými pojmy z oblasti kryptografie. Ve spojení s popisem architektury a programových prostředků pro programování grafick...
详细信息
V této práci bude čtenář nejprve seznámen s vybranými pojmy z oblasti kryptografie. Ve spojení s popisem architektury a programových prostředků pro programování grafických karet (CUDA, OpenCL) byl vybrán algoritmus AES, za účelem jeho akcelerace pomocí GPU. Dále se práce zabývá mapováním aplikačních rozhraní, která existují pro komunikaci se specializovanými krypto-koprocesory v jádrech operačních systémů Linux/BSD (cryptoapi, OCF) a jejich podporou uvnitř multiplatformní knihovny OpenSSL. Následně práce pojednává o implementačních detailech, dosažených zrychleních a o integraci s OpenSSL. Závěr pojednává o možnostech využití implementovaného algoritmu a krátce o jeho využití přímo v jádrech operačního systému.
Along with fast development of Internet,the communicating degree of information is more *** technology is used in the course of information communicate, since the problem of information security is outstanding ***,whi...
详细信息
Along with fast development of Internet,the communicating degree of information is more *** technology is used in the course of information communicate, since the problem of information security is outstanding ***,which is used to implement cryptographic operations,is the base of Microsoft's security applications frame and serves,but it can only be used in Windows Operating System and the speed of cryptographic operations is limited due to its software *** order to resolve the above problems and really meet Chinese cryptographic standards,a new CSP module named as XyCSP which make the CSPs of Microsoft as reference,is designed in this *** design and implementation of XyCSP with three forms and the procedure of writing XyCSP module are all *** the application developer can encrypt and decrypt the message with cryptoapi and keep the message securely transmission.
暂无评论