首页 | 本学科首页   官方微博 | 高级检索  
     检索      

数据和程序加密技术的研究与实现
引用本文:陈华,金山.数据和程序加密技术的研究与实现[J].辽宁大学学报(自然科学版),1997,24(1):48-52.
作者姓名:陈华  金山
作者单位:辽宁大学计算机科学技术系
摘    要:本文对异盘加密和同盘加密的原理及具体实施办法作了详细论述。

关 键 词:软件  加密  文件头  识别原盘

A Study about Encryption on Data and Programs and Bring Them Into True
Chen Hua,Jin Shan.A Study about Encryption on Data and Programs and Bring Them Into True[J].Journal of Liaoning University(Natural Sciences Edition),1997,24(1):48-52.
Authors:Chen Hua  Jin Shan
Institution:Chen Hua Jin Shan Department of Computer Science Technolosy,Shenyang 110036
Abstract:In this paper, the principle and accomplishment of program encrypti on of different-disk and seme-disk is expounded in detail. The logic XOR is applied to operating dates and secret-key, thus the encryption and deencryption are completed by same program, in the different-disk encryption. The primitive disk is judged by bad-cluster mark. The primitive disk is enabled to runing, but a copy of it is unexecutable, in same disk encryption.
Keywords:Software encryption  XOR operating  Ffile control information block  Frimitive disk judgement    
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号