Skip to main content

Research and Implementation of File Encryption and Decryption

  • Conference paper
Advances in Computer Science and Engineering

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 141))

Abstract

Analyzed and studied on public key and private key cryptography, studied and compared the RSA and DES algorithm, achieved a basic process of file encryption and decryption, provided effectivly protection to document security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lu, D.: Computer Cryptography, Computer network data privacy and security. Tsinghua University Press (1998)

    Google Scholar 

  2. Li, K., Wang, D., Dong, X.: Practical Cryptography and computer data security. Northeastern University Press (1997)

    Google Scholar 

  3. Yang, Y., Sun, W.: Modon cryptography new theory. Science Press, Beijing (2001)

    Google Scholar 

  4. Schneier, B.: Application Cryptography - Protocols, Algorithms and C source code. Machinery Industry Press (2000)

    Google Scholar 

  5. Huang, Y., Chen, L., Tang, S.: Information security and encryption decryption core technology. Electronic Press (2001)

    Google Scholar 

  6. Li, S., Wang, D.: Modern Cryptography Theory, Method and frontier. Science Press, Beijing (2009)

    Google Scholar 

  7. Manzanares, A.I., Sierra, C.J.M., Marquez, J.T.: On the imp lementation of security policies with adaptative encryption. Computer Communications 29(2), 2750–2758 (2006)

    Article  Google Scholar 

  8. Vaudenay, S.: On the Weak Keys of Blowfish. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 27–32. Springer, Heidelberg (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lu Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Chang, L., GuangMing, X. (2012). Research and Implementation of File Encryption and Decryption. In: Zeng, D. (eds) Advances in Computer Science and Engineering. Advances in Intelligent and Soft Computing, vol 141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27948-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27948-5_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27947-8

  • Online ISBN: 978-3-642-27948-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics