优秀的毕业设计论文网
计算机 JAVA 电子信息 单片机 机械机电 模具 土木工程 建筑结构 论文
热门搜索词:网络 ASP.NET 汽车 电气 数控 PLC

MD5算法--整合应用程序的构建

以下是资料介绍,如需要完整的请充值下载.
1.无需注册登录,支付后按照提示操作即可获取该资料.
2.资料以网页介绍的为准,下载后不会有水印.资料仅供学习参考之用.
  
资料介绍:

摘 要

21世纪是网络的世纪,随着网络技术的飞速发展,个人计算机不仅能够同时处理文字、数据、图像、声音等信息,而且还可以使这些信息四通八达,及时地与全国乃至全世界的信息进行交换。数据在这样远距离的频繁的传输过程中难免会出错,加上计算机病毒和黑客的入侵等不确定因素,所以对文件的校验是必要的一个过程。 think58.com

[资料来源:www.THINK58.com]

文件的完整性校验是当前系统安全策略的基本组成部分,对文件的完整性校验可以确保计算机用户的信息文件的安全与完整。本文论述了对MD5校验算法的分析、设计及其实现过程。详尽论述了MD5校验器的设计,开发和测试全过程。其中包括MD5校验器的功能需求分析,总体设计方案,以及各个功能模块的设计和实现细节。还介绍了设计和实现MD5校验器的技术背景和原理。 内容来自think58 [来源:http://think58.com]

  think58.com [资料来源:THINK58.com]

  [资料来源:THINK58.com]

  think58好,好think58 [来源:http://www.think58.com]

关键字: MD5、校验码、信息-摘要、密钥、数字签字。 copyright think58

[资料来源:http://think58.com]

  [资料来源:http://THINK58.com]

  think58好,好think58 [来源:http://think58.com]

 

think58好,好think58 [资料来源:http://www.THINK58.com]

[来源:http://www.think58.com]

Abstract [来源:http://think58.com]

The 21st century is a network century, with the development at top speed of the network technology, the personal computer can not only deal with such information as the characters , data , picture , sound ,etc. at the same time , but also make the information extend in all direction , exchange with the whole country and even information in whole world in time. It would make mistakes in so long distanceand so frequently transmission course in data, asides,it exist uncertain factors such as the invasion of computer virus and hacker ,etc., so the check-up of the file is a necessaly course . [资料来源:http://THINK58.com]

The integrality check-up of the file is a basic component of the safe tactics of the present system, it can make sure the safety of the computer user's information file and fullness to the integrality check-up of the file. This text has described the analysis , design and its realization course on MD5 algorithm. Describe the design of MD5 check-up device exhaustivly, develop and test the whole course. It includes the function demand analysed of MD5 check-up device, the overall design plan , the design of each function module and detail of realizing. Have also introduced that how to design and realize the technological background and principle of MD5 check-up device. think58

[资料来源:http://think58.com]

  copyright think58

[资料来源:www.THINK58.com]

 

copyright think58 [资料来源:THINK58.com]

[资料来源:THINK58.com]

  think58好,好think58

[版权所有:http://think58.com]

Key word: MD5, check-up yard, information- the summary , key , figure are signed. copyright think58

[资料来源:http://think58.com]

  copyright think58

[资料来源:http://THINK58.com]

  think58.com

[资料来源:http://THINK58.com]

目 录 [资料来源:www.THINK58.com]

第一章 绪论 1 think58好,好think58

[来源:http://think58.com]

第一节 MD5算法的发展史 1

[版权所有:http://think58.com]

第二节 MD5的作用 2

[资料来源:THINK58.com]

第三节 MD5的漏洞与可能性突破 2

[版权所有:http://think58.com]

第二章 基础实现技术的知识介绍 4 本文来自think58

[来源:http://www.think58.com]

第一节 SDK的基本介绍 4 [版权所有:http://think58.com]

第二节 SDK应用程序的基本结构 4 内容来自think58 [资料来源:www.THINK58.com]

第三节Windows的消息机制 8 copyright think58 [版权所有:http://think58.com]

第四节 Visual C++开发工具简介 9 本文来自think58

[资料来源:www.THINK58.com]

第三章 算法描述 12 内容来自think58 [资料来源:http://www.THINK58.com]

第四章 MD5文件校验器设计 14 本文来自think58 [资料来源:http://www.THINK58.com]

第一节 文件校验的重要性 14

[资料来源:http://www.THINK58.com]

第二节 系统设计 14

[版权所有:http://think58.com]

一、模块的划分 14 think58 [来源:http://www.think58.com]

二、文档视图结构的应用 15

[资料来源:www.THINK58.com]

三、总界面设计 16

think58 [资料来源:http://www.THINK58.com]

[资料来源:http://www.THINK58.com]

第三节 系统实现 21 [版权所有:http://think58.com]

一、控件的应用 21 [资料来源:THINK58.com]

二、极限编程在设计活动中的实践 22 think58好,好think58 [资料来源:www.THINK58.com]

第五章 系统实现中存在的问题及解决方法 24 [资料来源:http://think58.com]

第六章 总结 26

[资料来源:http://think58.com]

致谢 27

[资料来源:www.THINK58.com]

参考文献 28

[来源:http://www.think58.com]

  copyright think58 [版权所有:http://think58.com]

think58好,好think58 [资料来源:http://THINK58.com]

 

think58

[来源:http://think58.com]

[来源:http://www.think58.com]

[来源:http://www.think58.com]