ÂÛÎĸñʽ
µçÆø¹¤³Ì »á¼ÆÂÛÎÄ ½ðÈÚÂÛÎÄ ¹ú¼ÊóÒ× ²ÆÎñ¹ÜÀí ÈËÁ¦×ÊÔ´ Çữ¹¤³Ì µÂÓïÂÛÎÄ ¹¤³Ì¹ÜÀí ÎÄ»¯²úÒµ¹ÜÀí ÐÅÏ¢¼ÆËã¿ÆÑ§ µçÆø×Ô¶¯»¯ ÀúÊ·ÂÛÎÄ
»úеÉè¼Æ µç×ÓͨÐÅ Ó¢ÓïÂÛÎÄ ÎïÁ÷ÂÛÎÄ µç×ÓÉÌÎñ ·¨ÂÉÂÛÎÄ ¹¤É̹ÜÀí ÂÃÓιÜÀí Êг¡ÓªÏú µçÊÓÖÆÆ¬¹ÜÀí ²ÄÁÏ¿ÆÑ§¹¤³Ì ººÓïÑÔÎÄѧ Ãâ·Ñ»ñÈ¡
ÖÆÒ©¹¤³Ì ÉúÎ﹤³Ì °ü×°¹¤³Ì Ä£¾ßÉè¼Æ ²â¿Ø×¨Òµ ¹¤Òµ¹¤³Ì ½ÌÓý¹ÜÀí ÐÐÕþ¹ÜÀí Ó¦ÓÃÎïÀí µç×ÓÐÅÏ¢¹¤³Ì ·þ×°Éè¼Æ¹¤³Ì ½ÌÓý¼¼Êõѧ ÂÛÎĽµÖØ
ͨÐŹ¤³Ì µç×Ó»úµç Ó¡Ë¢¹¤³Ì ÍÁľ¹¤³Ì ½»Í¨¹¤³Ì ʳƷ¿ÆÑ§ ÒÕÊõÉè¼Æ ÐÂÎÅרҵ ÐÅÏ¢¹ÜÀí ¸øË®ÅÅË®¹¤³Ì »¯Ñ§¹¤³Ì¹¤ÒÕ ÍÆ¹ã׬»ý·Ö ¸¶¿î·½Ê½
  • Ê×Ò³ |
  • ±ÏÒµÂÛÎÄ |
  • ÂÛÎĸñʽ |
  • ¸öÈ˼òÀú |
  • ¹¤×÷×ܽá |
  • Èëµ³ÉêÇëÊé |
  • ÇóÖ°ÐÅ |
  • ÈëÍÅÉêÇëÊé |
  • ¹¤×÷¼Æ»® |
  • Ãâ·ÑÂÛÎÄ |
  • ºÏ×÷ÆÚ¿¯ |
  • ÂÛÎÄÍ¬Ñ§Íø |
ËÑË÷ ¸ß¼¶ËÑË÷

µ±Ç°Î»ÖãºÂÛÎĸñÊ½Íø -> ±ÏÒµÂÛÎÄ -> ¼ÆËã»úÂÛÎÄ
±ÏÒµÂÛÎıêÌâ:

»ùÓÚDES¼ÓÃÜËã·¨µÄWORD¼ÓÃܲå¼þµÄʵÏÖ

 ±¾ÎÄID£ºLWGSW13874 ¼Û¸ñ:ÊÕ·Ñ»ý·Ö/100
ɨһɨ ɨһɨ
±¾Õ¾»áÔ±¿É×ÔÐÐÏÂÔØ:ÏÂÔØµØÖ· »ùÓÚDES¼ÓÃÜËã·¨µÄWORD¼ÓÃܲå¼þµÄʵÏÖ (ÊÕ·Ñ:1000 »ý·Ö)  

ÂÛÎÄ×ÖÊý:9179,Ò³Êý:24

Õª  Òª
Ëæ×ÅÉç»á·¢Õ¹£¬Éç»á½øÈëÐÅϢʱ´ú¡£ÐÅÏ¢¼¼ÊõºÍÐÅÏ¢²úÒµÕýÔڸı䴫ͳµÄÉú²ú©p¾­ÓªºÍÉú»î·½Ê½£¬ÐÅÏ¢ÒѳÉΪÉç»á·¢Õ¹µÄÖØÒªÕ½ÂÔ×ÊÔ´¡£Èç½ñ£¬Office°ì¹«ÎĵµÒÑÊÇÈÕ³£°ì¹«Éú»îÖв»¿ÉȱÉÙµÄÒ»²¿·Ö£¬Óë´Ëͬʱ°éËæ¶øÀ´µÄÐÅÏ¢°²È«ÎÊÌâÒ²ÈÕÒæÍ»³ö¡£ÈçºÎÈ·±£WordÎĵµÖеÄÄÚÈݲ»±»Î´ÊÚȨµÄµÚÈý·½ËùÖª£¬·ÀÖ¹ÖØÒªÐÅÏ¢±»ËæÒâ¸Ä¶¯£¬³ÉΪµ±ÎñÖ®¼±¡£Èç¹ûÔÚWord¹¤¾ßÀ¸ÖÐÌí¼ÓÒ»¸ö¼ÓÃܲå¼þ£¬¿ÉÒÔ¶ÔÎĵµÈ«²¿ÄÚÈÝ»ò²¿·ÖÄÚÈݼÓÃÜ£¬±ãÄÜÓÐЧ·ÀÖ¹ÐÅϢй©¡£
±¾ÂÛÎIJÉÓÃVB±àдWord²å¼þ£¬Í¨¹ý²ÉÓÃWindowsÏµĶ¯Ì¬Á´½Ó¿â¼¼Êõ£¨DLL£©£¬ÔÚVCÖаÑDESËã·¨·â×°ÆðÀ´×ö³ÉDLLÄ£¿é¹©VBµ÷Óã¬ÊµÏÖÁË¿ª·¢¼ÓÃܲå¼þʱ¶Ô¼ÓÃܺ¯ÊýµÄµ÷Óã¬Ìá¸ßÁ˼ÓÃÜËã·¨µÄЧÂÊ¡£Í¨¹ýʹÓøòå¼þÔÚWordÖÐÌí¼ÓµÄ¹¤¾ß°´¼ü£¬±ãÄܼòµ¥ÓÐЧµØ¶ÔÎĵµÄÚÈݼӽâÃÜ£¬Ê¹Óû§ÔÚ²Ù×÷WORDÎĵµÊ±¸ü¼Ó·½±ã°²È«¡£

¹Ø¼ü´Ê£º¼ÓÃܲå¼þ£»ÐÅÏ¢°²È«£»COM×é¼þ£»¶¯Ì¬Á´½Ó¿â

The Implementation of a Word Adding for Encryption Based on DES Encryption Algorithm
Abstract
With the development of the society, we are entering the information times. The traditional method of the product, the management and our life style are changed by the information technology and the information industries. The information has become the important strategic resources for the society development. Now, the Office documents have already become an essential part in people¡¯s daily work, followed with this, the question of information security becomes critical day by day at the same time. How to prevent the content in the Word documents from being known or modified by the unauthorized third party has become an urgent issue. If we can add an encryption plug-in into the word toolbar, which is able to encrypt all or part of the Word document, the information leaking could be prevented efficiently.
The Word adding introduced in this paper is developed with VB, which calls the encryption and decryption functions in a Dynamic Link Library (DLL) that is developed with VC to enhance the efficiency of the encryption algorithm. By using this adding, users can encrypt or decrypt word document locally without leaving the Word.

Key words: Encryption plug-in unit; Information security; COM module; DLL

Ä¿  ¼

1 ÒýÑÔ 1
1.1Ñ¡Ìâ±³¾° 1
1.2Ñ¡ÌâÒâÒå 1
2ÀíÂÛ»ù´¡ 2
2.1 DESËã·¨ÃèÊö 2
2.1.1  DESËã·¨¿òͼ 2
2.1.2  DES½âÃÜ 3
2.1.3  DESËã·¨Ô­Àí 3
2.2  COM×é¼þ¼ò½é 5
2.2.1 ×é¼þ 5
2.2.2 ½Ó¿Ú 6
2.2.3 ´´½¨ 7
2.2.4 ¸´Óà8
2.3  ²å¼þ¼ò½é 8
3 ÐèÇó·ÖÎöºÍ·½°¸Éè¼Æ 8
3.1 ÐèÇó·ÖÎö 8
3.1.1¹¦ÄÜÐèÇó 8
3.1.2 ¿ª·¢»·¾³ 9
3.2 ·½°¸Éè¼Æ 10
4 ³ÌÐòµÄʵÏÖ 10
4.1  VC½¨Á¢DESË㷨ģ¿é 10
4.1.1 ¼ÓÃܵ¼³öº¯ÊýµÄ¶¨Òå 11
4.1.2½âÃܵ¼³öº¯ÊýµÄ¶¨Òå 11
4.1.3¼Ó½âÃÜÏà¹Øº¯ÊýµÄÉùÃû 11
4.2  VB±àдWORD²å¼þ 12
4.2.1½¨Á¢Word²å¼þ¹¤³Ì 12
4.2.2 Word´úÂëµÄ±àд 14
5 ²âÊÔ 16
½á    ÂÛ 17
²Î¿¼ÎÄÏ× 18
Ö    л 19
Éù    Ã÷ 20


Ïà¹ØÂÛÎÄ
±¾ÂÛÎÄÔÚ¼ÆËã»úÂÛÎÄÀ¸Ä¿£¬ÓÉÂÛÎĸñÊ½ÍøÕûÀí,×ªÔØÇë×¢Ã÷À´Ô´www.lwgsw.com,¸ü¶àÂÛÎÄ,ÇëµãÂÛÎĸñʽ·¶ÎIJ鿴
ÉÏһƪ£º»ùÓÚC/S½á¹¹µÄÒ½Ôº¹ÜÀíϵͳµÄÉè¼Æ.. ÏÂһƪ£ºÎïÒµ¹ÜÀíϵͳµÄÉè¼ÆÓëʵÏÖ
Tags£º»ùÓÚ DES ¼ÓÃÜ Ëã·¨ WORD ²å¼þ ʵÏÖ ¡¾Êղء¿ ¡¾·µ»Ø¶¥²¿¡¿
×îÐÂÎÄÕÂ
ÈÈÃÅÎÄÕÂ
¼ÆËã»úÂÛÎÄ
ÍÆ¼öÎÄÕÂ

±¾Õ¾²¿·ÖÎÄÕÂÀ´×ÔÍøÂç,Èç·¢ÏÖÇÖ·¸ÁËÄúµÄÈ¨Òæ,ÇëÁªÏµÖ¸³ö,±¾Õ¾¼°Ê±È·ÈÏɾ³ý E-mail:349991040@qq.com

ÂÛÎĸñÊ½Íø(www.lwgsw.com--ÂÛÎĸñÊ½ÍøÆ´ÒôÊ××Öĸ×éºÏ)Ìṩ¼ÆËã»úÂÛÎıÏÒµÂÛÎĸñʽ,ÂÛÎĸñʽ·¶ÎÄ,±ÏÒµÂÛÎÄ·¶ÎÄ

Copyright@ 2010-2018 LWGSW.com ÂÛÎĸñÊ½Íø °æÈ¨ËùÓÐ ÊñICP±¸09018832ºÅ