虚拟专用网(VPN)认证算法的分析与实现毕业论文.doc

虚拟专用网(VPN)认证算法的分析与实现毕业论文.doc

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
虚拟专用网(VPN)认证算法的分析与实现 摘 要本论文实现了VPN所使用的MD5算法关键词Abstract VPN (Virtual Private Network Virtual Private Network) is a network technology, usually used to achieve the relevant organizations and individuals across the open, distributed network between the public safety communications. VPN for all mainframe, the same as in a network, and not aware of the existence of the public network. With IP technology and IP business development for IP VPN technology began to appear and in use. Its essence is to use the Internet to share facilities to simulate the exclusive wide-area network, the extensive use of the Internet network coverage and low-cost access, integrate tunnel safety, identity authentication and processing decryption techniques, overcome the inherent insecurity, and to achieve comparable private network security. Authentication mainly called for the recognition of the identity of the tunnel to ensure that source-residential security. Encryption processing in the letter refers to the source of the information encrypted Getter in the letter to the information received by the corresponding decryption algorithm, as well as the integrity of the information for the examination. This will ensure that information on the safety of the tunnel. Authentication RSA encryption algorithm available, but RSA encryption fairly slow, and not suitable for heavy data processing, So the transmission of data is usually used DES encryption algorithm. Right to the integrity of the information processing normally used MD5 algorithm. In this paper, we implement the MD5 algorithm that could be used in VPN. Key words: VPN MD5 message digest algorithm Identity Authentication 目 录第一章 引言 1 1.1 VPN技术概述 1 1.1.1 VPN的特点 1 1.1.2 VPN安全技术 2 1.1.3 VPN解决方案 3 1.1.4 VPN的益处 6 1.1.5 VPN发展趋势 9 1.2 全文内容安排 10 第二章 加密算法概述 11 2.1 常规密码体制 11 2.2 公钥密码体制 13 第三章 RSA算法和DES算法 16 3.1 RSA算法简介 16 3.1.1 RSA的基本原理 16 3.1.2 RSA算法描述 16 3.1.3 RSA的安全性 18 3.2 DES算法简介 19 3.2.1 DES加密 20 3.2.2 DES解密 22 3.2.3 3DES加解密 22 3.2.4 DES算法的应用

您可能关注的文档

文档评论(0)

xingyuxiaxiang + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档