期刊文献+

基于TEA算法的地理信息数据安全保护技术及验证分析 被引量:2

Security protection technology and verification analysis of geographic information data based on TEA algorithm
下载PDF
导出
摘要 地理信息数据是国家国防建设和国民经济发展的重要基础数据,随着数字化、信息化及云计算等技术的发展,地理信息数据的安全威胁日益严峻,本文面对移动平台上地理信息数据安全存储、高效传输和实时信息解密及处理等挑战,提出了一种基于TEA算法的地理信息数据安全保护技术,该技术采用循环迭代的移位和异或运算实现对地理信息数据的加密和解密,可以实现移动平台端地理信息数据的高安全加密存储和高性能实时解密处理,并采用该算法对SRTM数据进行处理和分析。试验结果表明,基于TEA算法的地理信息数据加密技术可以有效实现地理信息数据的加密及解密处理,满足移动系统对地形数据的高安全存储和高性能处理的要求。 Geographic information data is an important basic data for national defense construction and national economic development.With the development of technologies such as digitization,informatization and cloud computing,the security threat of geographic information data is becoming more and more serious.Aiming at the challenges of secure storage,efficient transmission and real-time information decryption and processing of geographic information data on mobile platform.A geographic information data security protection technology based on TEA algorithm is proposed.This technology uses cyclic iterative shift and XOR operation to encrypt and decrypt geographic information data,which can realize high-security encrypted storage and high-performance real-time decryption processing of geographic information data on mobile platform.This algorithm is used to process and analyze SRTM data.The experimental results show that the geographic information data encryption technology based on TEA algorithm can effectively realize the encryption and decryption of geographic information data,and meet the requirements of mobile system for high-security storage and high-performance processing of terrain data.
作者 陶肖静 TAO XiaoJing(College of Architectural Engineering,Shanghai Zhongqiao Vocational and Technical University,Shanghai 201514,China;College of Surveying and Geo-Informatics,Tongji University,Shanghai 200092,China)
出处 《测绘通报》 CSCD 北大核心 2022年第7期154-157,167,共5页 Bulletin of Surveying and Mapping
关键词 TEA算法 地理信息安全 高安全存储 数据实时解密 TEA algorithm geographic information security high security storage real time data decryption
  • 相关文献

参考文献8

二级参考文献83

共引文献98

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部