期刊文献+

.net平台下基于xml文档格式的RC5加解密算法研究与实现 被引量:1

The Study and Implementation of RC5 algorithm for Encryption & Decryption of XML Document Based on .NET
原文传递
导出
摘要 本文主要研究在.net平台下对给定文档的标准XML格式的不同节点位置进行要求的RC5算法的加解密操作。包括对XML文档中不同节点进行一定的解析,然后加密并且将加密结果嵌入到XML文档中;对给定的加密后的XML文档进行相应节点的解密,并重新组织成规范的XML格式;提供不同的API接口以供其它程序调用。最后在具体RC5算法的基础上完成软件程序,并在特定XML文档格式的基础上完成了模拟实现。 This paper is about the Study of encrypting and decrypting the node of standard xml document by using RC5 algorithm. The study is about how to parse different nodes of xml document and encrypts them and inserts them to the xml document The correspond nodes of the encrypted xml document also can be decrypt and form to a xml document. After thatsome different APIs used by other prog ram are given. At last the software program base on the RC5 arithmetic be implemented.and a simulation based on the standard xml document is given.
作者 刘城霞
出处 《网络安全技术与应用》 2012年第8期32-34,11,共4页 Network Security Technology & Application
基金 北京市人才强教计划--骨干教师资助(PHR201008428) 北京市教委科技发展计划项目(KM201110772013)资助 北京市优秀人才培养(2010D005007000003)资助
关键词 .net平台 XML RC5 加密解密 API net xml RC5 encrypt & decrypt API
  • 相关文献

参考文献7

二级参考文献24

  • 1李红艳.无线传感器网络安全研究与分析[J].信息技术与信息化,2006(6):44-46. 被引量:4
  • 2Shannon C E. Communication theory of secrecy system[J]. Bell Sys Tech J, 1949, 28(4): 656-715.
  • 3William Stallings. Cryptography and network security: principles and practice[M]. 2nd ed. New Jersey: Prentice-Hill, 1999.
  • 4[1]Rivest R L(MIT),Matt Robshaw (RSA Labs),Ray Sidney(RSA Labs),Yiqun Lisa Yin(RSA Labs).The RC6 Block Cipher:A simple fast secure AES proposal,September 28,2000.
  • 5[2]Dray J.Report on the NIST Java AES candidate algorithm analysis.National Institute of Standards and Technology.Proceedings of 3rd AES conference,New York,April 2000:149-160.
  • 6[3]Hachez G,Koeune F,Quisquater J,AES results Implementation of four AES candidates on two smart cards.Proceedings of 2nd AES Candidate Conference,Rome,March 1999:95-108.
  • 7[4]Sterbenz A,Lipp P.Performance of the AES candidate algorithms in Java.Proceedings of 3rd AES conference,New York,April 2000:161-165.
  • 8[5]Weaver N,Wawrzynek J.A comparison of the AES candidates amenability to FPGA implementation.Proceedings of 3rd AES conference,New York,April2000:28-39.
  • 9[6]Weeks B,Bean M,Rozylowicz T,et al.Hardware performance simulations of Round 2 Advanced Encryption Standard algorithms.Proceedings of 3rd AES conference,New York,April 2000:286-304.
  • 10迅通科技.nRF905数据使用手册[Z].

共引文献9

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部