期刊文献+

基于SHA512哈希函数和Rijndael加密算法QR二维码信息安全设计 被引量:7

QR Code Design of Information Security Based on Rijndael Encryption Algorithm and SHA512 Encryption Algorithm
下载PDF
导出
摘要 随着二维码技术广泛应用于电子票务、银行支票、电子保单等多个领域,二维码的信息泄露和信息篡改等安全问题日益突出.为提高二维码内部信息的安全性能,从对二维码内部信息加密和二维码信息防篡改俩个角度来提高.基于Visual Studio 2008 C#平台,设计了一种采用SHA512哈希函数和Rijndael加密算法混合加密的方法,该方法利用Rijndael加密和SHA512数字签名等技术,对Rijndael第一次加密密钥系统随机分配,并对系统随机分配密钥采用二次Rijndael加密防护方法,并通过SHA512对二维码内部信息防篡改校验,达到对二维码信息及其加密密钥的安全保护.在生成QR二维码之前实现了信息加密,并从系统构架、算法原理和实现及安全性能等多个方面进行了测试和分析.分析表明此方法提高了二维码信息的安全性能,达到对密钥高效管理和对信息的多重保护,而在加密后密文信息容量较明文信息有所增加. With the QR code technology being widely applied in electronic ticketing, bank checks, E-commerce and other fields, many safety problems have emerged, such as information leakage and data tampering. Based on Visual Studio 2008 c platform, the method with Rijndael random variable and random keys secondary Rijndael encryption protection is proposed using Rijndael encryption and SHA512 digital signature technology. This paper presents a novel design of information security before generating QR code. The encryption principle, algorithm and implementation, safety performance of the proposed method are discussed. Also corresponding testing and analysis are provided to verify the feasibility of the proposed algorithm. Results have proved that the information safety performance of QR code is greatly increased with the encryption algorithm, the efficient management and the multiple- protection to a key. This just causes a smaller increase in the content of the encryption data than those of the raw data.
出处 《计算机系统应用》 2015年第7期149-154,共6页 Computer Systems & Applications
关键词 信息加密 RIJNDAEL算法 SHA512算法 二维码 信息安全 information encryptio Rijndael algorithm SHA512 algorithm QR code information security
  • 相关文献

参考文献5

二级参考文献35

  • 1黄谆,白国强,陈弘毅.快速实现SHA-1算法的硬件结构[J].清华大学学报(自然科学版),2005,45(1):123-125. 被引量:19
  • 2高旸,胡向东.AES算法的DSP实现[J].兵工自动化,2006,25(1):38-39. 被引量:2
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 4吴鹏,李开成.基于FPGA的Rijndael算法实现的研究[J].铁路计算机应用,2007,16(3):46-48. 被引量:2
  • 5孙永清,顾雨捷,赵戈.基于动态注册码的软件加密保护[J].计算机工程,2007,33(12):183-184. 被引量:16
  • 6Schneier B. Applied cryptography, protocols, algorithms and source code in C[ M] . Beijing:China Machine Press,2000.
  • 7Wang X,Yin Y L,Yu H.Finding Collisions in the Full SHA1[C]//Proc.of the 25^th Annual International Cryptology Conference.2005.
  • 8National Institute for Standards and Technology (NIST).NIST Brief Comments on Recent Cryptanalytic Attacks on SHA-1[Z].2005-02.
  • 9National Institute for Standards and Technology (NIST).FIPS PUB 180-2,Secure Hash Standard (SHS)[S].2004.
  • 10Deepakumara J,Heys H M,Venkatesan R.FPGA Implementation of MD-5 Hash Algorithm[C]//Proc.of IEEE Canadian Conference on Electrical and Computer Engineering,Toronto.2001.

共引文献32

同被引文献45

引证文献7

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部