分类号:TP309.7 U D C:D10621-408-(2007)6125-0
密 级:公 开 编 号:2003214008
成 都 信 息 工 程 学 院
学 位 论 文
基于 Misty1 算法的加密软件(Java)的实现
论 文 作 者 姓 名 :
王文丰
申 请 学 位 专 业 :
计算机科学与技术
申 请 学 位 类 别 :
工学学士
指导教师姓名(职称):
陈俊(讲师)
论 文 提 交 日 期 :
2007 年 06 月 09 日
基于 Misty1 算法的加密软件(Java)的实现
摘 要
随着计算机网络及通信技术的飞速发展,信息安全成了信息社会急需解决的
最重要的问题之一,密码技术是保证信息安全的核心技术。本文用 JAVA 语言开
发了一个基于 Misty1 算法的加密软件,该软件能对文件进行加密和解密。在具
体实现时,首先分析了 Misty1 算法的基本结构,设计出相应的实施方法,正确
实现了该算法,其次,设计了一个图形用户界面,最后对软件进行了测试,验证
了实现方法的正确性。
关键词:Misty1;Java;加密;解密
The Implementation of Encryption Software (Java) Based
on Misty1 Algorithm
Abstract
With the rapid development of computer networks technology and
communication technology, Information security has become one of the most
important problems urgent to resolve in information society, Cryptographic
technology is the core technology to guarantee information security. In this paper, the
software of encryption based on Misty1 algorithm is developed by using JAVA
language. It can encrypt and decrypt a file. During the process of implementation, the
basic structure of the algorithm is analyzed first and the counterpart method is
designed, secondly, a GUI is designed, finally, the software is tested, the result shows
that method of implementation is right.
Key words: Misty1; Java ; Encryption; Decrypt
目 录
论文总页数:24 页
1 引言............................................................................................................................................1
1.1 课题背景............................................................................................................................1
1.2 国内外研究现状................................................................................................................1
1.3 本课题研究的意义............................................................................................................2
1.4 本课题的研究方法............................................................................................................3
2 MISTY1 算法描述.......................................................................................................................3
2.1 秘钥产生部分....................................................................................................................3
2.2 数据随机化部分................................................................................................................4
2.3 函数描述............................................................................................................................4
2.3.1 FI 函数.......................................................................................................................4
2.3.2 FO 函数.......................................................................................................................5
2.3.3 FL 函数.......................................................................................................................7
2.3.4 FL
-1
函数 ....................................................................................................................8
3 MISTY1 加密软件的设计与实现...............................................................................................9
3.1 工作环境介绍....................................................................................................................9
3.2 JAVA 及程序编辑工具介绍................................................................................................9
3.2.1 Java 介绍...................................................................................................................9
3.2.2 程序编辑工具介绍..................................................................................................10
3.3 MISTY1 算法应用于文件加密的分析 ..............................................................................12
3.4 MISTY1 算法的实现 ..........................................................................................................13
3.4.1 加密..........................................................................................................................13
3.4.2 解密..........................................................................................................................15
3.5 设计流程图、图形界面及事件处理..............................................................................18
3.5.1 加密/解密流程图....................................................................................................18
3.5.2 图形界面..................................................................................................................18
3.5.3 处理按钮事件..........................................................................................................20
4 程序演示..................................................................................................................................21
4.1 程序演示..........................................................................................................................21
4.2 结果及存在的问题..........................................................................................................21
结 论..........................................................................................................................................22
参考文献..........................................................................................................................................22
致 谢..........................................................................................................................................23