摘 要
隨著網絡技術的廣泛應用,網絡信息安全越來越引起人們的重視。針對數據在存儲的時候存在大量的安全問題,目前通常將需要存儲的數據進行加密然后再存儲,應用MD5算法是一個不錯的選擇。MD5算法的全稱是Message-Digest algorithm 5,是一種用于產生數字簽名的單項散列算法。它的作用是讓大容量信息在用數字簽名軟件簽署私人密鑰前被“壓縮”成一種保密的格式,即將一個任意長度的“字節串”通過一個不可逆的字符串變換算法變換成一個128bit的串。
該畢業設計是運用microsoft visual c++ 6.0軟件而開發的,主要是通過算法實現數據的加密存儲。文章分成五部分。第一,二部分描述了MD5的目前現狀和相關理論知識,也讓我們了解MD5的定義。重點是MD5的流程實現和封裝DLL。在MD5算法的DLL封裝這章,主要是描述我們為什么要選用封裝DLL的原因,以及封裝的好處。設計流程這一部分里包含讀取,修改,插入,刪除這幾個功能的實現情況,并用流程圖的方式來分別描述了這四大功能模塊的實現過程。最后一部分顯示了系統測試的內容和系統主要功能運行界面圖。
關鍵詞:信息安全;MD5;加密;封裝
The Research and Implementation for MD5 Algorithm
-------- Data Storage and Encryption
Abstract
With the wide application of the network technology, the information of the network safety causes people's attention more and more. A large number of security questions appear while storing data, the data that usually store needing at present are encrypted then stored, it is a good choice to use MD5 algorithm. The full name of MD5 algorithm is Message-Digest algorithm 5, is that a kind of individual event used for producing figures and signed breaks up and arranges algorithms. Its function is to let large capacity information " compress " and become a kind of secret form before signing the private key with the digital signature software, vary " byte bunch " of a wanton length into a great integer of one 128bit through an irreversible one bunch of algorithms of varying of character .
Used Microsoft Visual C++ 6.0 software and developed in this graduation project, is mainly to realize through the algorithm that the encryption of the data is stored. The article is divided into five parts. The first and second parts are describing the current situation and relevant theory knowledge at present of MD5, let us understand the definition of MD5. The focal point is the procedure of MD5 is realized and encapsulation to Dynamic Link Library. In this chapter of encapsulation MD5 class library to Dynamic Link Library, mainly describe why we will select encapsulation Dynamic Link Library for use , and the advantage of encapsulation . Design this of procedure and include reading in the part , revise , insert, delete the realization situations of these functions, and has described the realization course of this four major functions module respectively in way of the flow chart . The last part has shown that the content of system testing and main function of system operate the interface picture .
Key words: information security; MD5; encrypt; Packaging