|
计算机应用研究 2005
Design and Implementation of an Encrypted Data-Transmission Scheme
|
Abstract:
This security schema is composed of two parts: one part is to encrypt the data using the integrated data encryption algorithm, the other is to manage the different keys. The data which to be transferred is to be encrypted before transmitting, and verified by MAC when exchanging .The keys of each level are managed respectively.