Paper
6 September 2022 Design and Implementation of encryption software based on classical cryptography algorithms
Lei Ding
Author Affiliations +
Proceedings Volume 12332, International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2022); 1233218 (2022) https://doi.org/10.1117/12.2653013
Event: International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2022), 2022, Chengdu, China
Abstract
This article uses Visual Studio 2015 to develop, using a variety of encryption algorithms, including Virginia algorithm, Caesar algorithm, single table replacement algorithm technology, to achieve efficient and secure information. The system runs in the Windows system, the function is stable, and the information security is effectively guaranteed. In this paper, the research of the subject is carried out first, and the key technologies of cryptography are sorted out. Present the current research status and introduce the main research contents. Then analyze and organize related technologies, introduce their advantages and disadvantages, and then compare encryption algorithms. Finally, the implementation and evaluation of the algorithm are carried out. The realization of the encryption software based on the classical cryptography algorithm ensures the encryption in the transmission process and solves the problem of data security.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Lei Ding "Design and Implementation of encryption software based on classical cryptography algorithms", Proc. SPIE 12332, International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2022), 1233218 (6 September 2022); https://doi.org/10.1117/12.2653013
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Algorithm development

Cryptography

Information security

Network security

Computer security

Algorithms

Software development

RELATED CONTENT


Back to Top