摘要
首先分析当前比较流行的数字签名算法,着重介绍MD5与RSA算法,讨论如何对两者的优点加以利用,如何通过互补避免两者的缺点所带来的一系列问题,以及如何在利用两者的同时加入一些控制因素,加强数据在网上办公系统传输中的安全性.接着讨论数字签名在电子公文中的实现与应用,利用发送方与接受方之间比较严密的应答协议,克服了单纯利用数字签名带来的弊端,介绍了如何利用两者的优势互补再配合科学的封装机制,利用传送协议实现包含数字签名的公文在网上安全传输,并且提供了一种有效的认证机制,接着介绍电子公章在公文流转中的软件方案.通过对BMP图像数据位的读写分析,结合公文流转的特点以及MD5加密算法,实现用户对电子公文的加盖公章操作.对网上办公系统进行研究分析,创建了一套安全的网上公文流转方案,结合公文审批、申请等网上办公的方法,利用前面讨论的安全机制,完成了基于数据加密技术的网上办公系统.最后对这套网上办公系统的源文件的注册加密技术展开讨论,从而实现对文件的底层保护,避免程序文件被破解而产生的整个办公系统的安全问题.
Firstly, the current popular digital signature algorithm is analyzed, we mainly introduced MD5 and RSA, we discuss how to make good use of the advantage of both method, how to avoid a series of problems due to the disadvantages of both, and how to add some control factors in order to strengthen the data transmission security in the online office system; secondly, we discuss the realization and application of digital signature in electronic document, we make use of the strict responsive protocol between the receiver and sender to overcome the disadvan- tages of simplex digital signature, introduce how to make good use of the advantages of both and combine scientific encapsulation system, realize online safe transmission of including digital signature by transmission protocol, and offer an effective authentication system; thirdly ,we introduced the software scheme of electronic official seal in doc- ument transmission. Through the read-write analysis of BMP data bit, and combining the document transmission characteristic and MD5 encryption algorithm, electronic document stamping is realized by user. Through the re- search and analysis to the on-line office system, a safe scheme of document transmission is established. Combining a series of online work methods, such as document examination and approval, application etc. , utilizing the above disscused safe mechanism, a on-line office system is completed based on the data encryption technique. Finally, the registration encryption technique of the online office system source files is discussed. Bottom level protection to the source files is realized. In this way, the security problems resulting from the explanation of program file is avoided.
出处
《曲阜师范大学学报(自然科学版)》
CAS
2009年第3期116-119,共4页
Journal of Qufu Normal University(Natural Science)