Cart (Loading....) | Create Account
Close category search window

Study of file encryption and decryption system using security key

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Gang Hu ; Sch. of Comput. Sci. & Technol., Sichuan Police Coll., Luzhou, China

The paper tries to have made a study of the security keys of USB, which can achieve these functions such as data encryption, digital signature, and identity authentication. Based on the analysis of the security key system, the paper also introduces its formation, functions and cryptosystem while putting forward a file encryption project on the basis of the USB security key. The project adopts the combination of soft hardware, the software conducting the process of file encryption and hardware taking charge of the management of secret key and the encryption of session key. The project makes a full use of the respective advantages upon the Symmetetric-key cryptosystems and the Publed-key cryptosystem, which means to encrypt the electronic documents by using the algorithms of the Symmetetric-key cryptosystems and transmit its secret key by employing the ones of the Public-key cryptosystem. Simultaneously, the validation of the informative integrity and authenticity have been realized by the use of information abstract algorithms. With high security, high efficiency and user-friendliness, the project achieves the file encryption with the strong extendibility of the system on the basis of the characteristics of USB security key.

Published in:

Computer Engineering and Technology (ICCET), 2010 2nd International Conference on  (Volume:7 )

Date of Conference:

16-18 April 2010

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.