期刊文献+

网络游戏中数据加密与解密技术的研究 被引量:3

Research on data encryption and decipher techniques in network game
下载PDF
导出
摘要 网络游戏已经成为网络业三大赢利且利润丰厚的领域之一,但由于网络黑客对游戏的破坏,许多网络游戏被迫关闭,因此必须对网络黑客常用的游戏解密行为进行剖析,使得游戏编程人员和开发商彻底地了解其破解方式,在游戏底层阻断黑客的破坏行为.剖析过程以腾讯的QQ游戏为例,对黑客的解密行为进行了仿真实验,证明了许多网络游戏的加密机制确实存在着漏洞.最后给出了防范黑客的几种应对方案,对于促进网络游戏的良性发展有着深远的意义. Network game has already become one of the three best profit domains in network industry. But due to destruction of network hacker, many network games are compelled to close. It is meaningful to analyze common deciphering behaviors usually used by network hacker. By thoroughly understanding the attack behaviors of hacker, both programmers and developers can stop invasion action from hacker in bottom layer of game. The analysis process of hacker deciphering behaviors was given. Through taking the QQ game developed by Tengxun company as an example, the simulation experiment for various deciphering behavior of hacker was carried out. Experiment proves that many network games really have flaws in encryption mechanism. Finally, several network game encryption mechanism are suggested, which will have profound significances for promoting favorable developments of network games.
出处 《沈阳工业大学学报》 EI CAS 2007年第5期578-581,共4页 Journal of Shenyang University of Technology
关键词 对称加密 非对称加密 DES加密 RSA加密 封包 symmetrical encryption asymmetrical encryption DES RSA data packet
  • 相关文献

参考文献5

  • 1胡磊,王鹏.应用密码学手册[M].北京:电子工业出版社,2005.
  • 2陈树平,侯贤良.计算机网络中DES数据加密和解密技术[J].现代电子技术,2005,28(9):114-115. 被引量:8
  • 3云风.我的编程感悟[M].北京:电子工业出版社,2005.
  • 4陈为,周骥,杨珂,等.面向对象的游戏开发[M].北京:电子工业出版社,2005.
  • 5谭明金.黑客反汇编揭秘[M].北京:电子工业出版社,2004.

二级参考文献2

共引文献14

同被引文献8

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部