| 摘要 | 第4-5页 |
| Abstract | 第5页 |
| 1 INTRODUCTION | 第8-13页 |
| 1.1 Details of the study | 第8-10页 |
| 1.2 Objectives of the study | 第10-11页 |
| 1.3 Practical value | 第11页 |
| 1.4 Testing work | 第11-13页 |
| 2 ESTABLISHMENT OF PROTECTION FOR SOFTWARE PACKAGE,THE EXAMPLEOF DISTANCE LEARNING | 第13-32页 |
| 2.1 Information security faced by automated systems of distance learning | 第13-14页 |
| 2.2 A review of publications on the subject | 第14-25页 |
| 2.3 The tasks assigned to the protection system | 第25-28页 |
| 2.4 Choosing a class of system requirements of protection | 第28-30页 |
| 2.5 Findings | 第30-32页 |
| 3 SUGGESTED METHODS OF CREATION OF INFORMATION INTEGRABLESYSTEMS | 第32-44页 |
| 3.1 Selecting objects for protection | 第32-35页 |
| 3.2 Data Encryption | 第35-41页 |
| 3.2.1 Some general information | 第35-37页 |
| 3.2.2 Asymmetric cryptosystems | 第37-38页 |
| 3.2.3 El-Gamal cryptosystem | 第38-39页 |
| 3.2.4 Cryptosystem Rivest-Shamir-Eydelmana | 第39-40页 |
| 3.2.5 Cryptosystems based on elliptic curves | 第40页 |
| 3.2.6 Adapted asymmetric encryption method | 第40-41页 |
| 3.3 The advantages of using polymorphic encryption algorithms | 第41-43页 |
| 3.4 The functionality of the system of protection | 第43-44页 |
| 4 IMPLEMENTATION OF PROTECTION | 第44-64页 |
| 4.1 Choice of development tools and organizations | 第44-47页 |
| 4.1.1 Brief description of the programming language C++ | 第44-45页 |
| 4.1.2 Brief description of the environment Visual C++ | 第45-46页 |
| 4.1.3 Brief description of the ATL | 第46-47页 |
| 4.1.4 Brief description of the ZLIB library | 第47页 |
| 4.2 Polymorphic generator encryption algorithms | 第47-61页 |
| 4.2.1 General principles of polymorphic encryption and decryption | 第47-50页 |
| 4.2.2 Virtual machine to perform polymorphic algorithms | 第50-54页 |
| 4.2.3 Polymorphic code generator | 第54-59页 |
| 4.2.4 The uniqueness of the generated polymorphic algorithm and its complexity analysis | 第59-61页 |
| 4.3 Features of the implementation of the security module | 第61-62页 |
| 4.4 Protection of executable files | 第62-64页 |
| KEY FINDINGS AND RESULTS | 第64-65页 |
| THANKS | 第65-66页 |
| REFERENCES | 第66-68页 |
| 攻读学位期间的研究成果 | 第68页 |