需要金幣:![]() ![]() |
資料包括:完整論文 | ![]() |
![]() |
轉(zhuǎn)換比率:金額 X 10=金幣數(shù)量, 例100元=1000金幣 | 論文字?jǐn)?shù):17878 | ![]() | |
折扣與優(yōu)惠:團(tuán)購(gòu)最低可5折優(yōu)惠 - 了解詳情 | 論文格式:Word格式(*.doc) | ![]() |
摘要:在這個(gè)信息技術(shù)發(fā)展的時(shí)代,用戶通常將各種電子文檔保存在所使用計(jì)算機(jī)的磁盤上,其中包括很多重要的機(jī)密文檔以及含有敏感信息的文檔。因此,如何確保磁盤上數(shù)據(jù)的機(jī)密性顯得尤為重要。 TrueCrypt磁盤加密軟件是目前應(yīng)用非常廣泛的采用OTFE(On-The-Fly Encryption)技術(shù)進(jìn)行磁盤加密的軟件系統(tǒng)。該技術(shù)能夠保證數(shù)據(jù)在裝載和儲(chǔ)存前被自動(dòng)進(jìn)行快速加解密而不需要用戶的干預(yù)。軟件同時(shí)還采用虛擬磁盤技術(shù)使用高強(qiáng)度密碼算法對(duì)用戶敏感數(shù)據(jù)進(jìn)行保護(hù)。 本文首先介紹了TrueCrypt磁盤加密軟件的基本思想、總體架構(gòu)和工作流程,并對(duì)其中相關(guān)的數(shù)據(jù)加密算法和數(shù)字摘要算法進(jìn)行了闡述。 接著通過實(shí)例,說明了如何使用TrueCrypt軟件。 最后,本文分析了TrueCrypt磁盤加密軟件的安全機(jī)制,并對(duì)其安全性做了評(píng)估,給出了基于口令猜證的攻擊方法,并提出了使用該軟件的建議。 關(guān)鍵詞:信息安全、磁盤加密、TrueCrypt軟件、安全機(jī)制、口令攻擊
Abstract:In this era of information technology development, the user will usually have a variety of electronic documents stored on computer disk, which includes many important confidential documents and documents containing sensitive information. Therefore, how to ensure the confidentiality of data on the disk is particularly important. TrueCrypt disk encryption software is very widely used OTFE (On-The-Fly Encryption) technology, disk encryption software. The technology can ensure data is automatically loaded and stored before the fast encryption without user intervention. Software also uses the virtual disk technology uses high-strength cryptographic algorithms to protect sensitive data to users. This paper introduces the TrueCrypt disk encryption software, the basic idea of ??the overall architecture and workflow, and one of the relevant data encryption algorithm and digital digest algorithm described. Then through the example, explained how to use TrueCrypt the software. Finally, the paper analyzes the TrueCrypt disk encryption software, security, and its security assessment done, given the card based password guessing attack, and made the same recommendation to use the software. Keywords:Information Security; Disk encryption;TrueCrypt Software; Security; Password attacks
|