Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code
Abstract
Two-dimensional code is widely used in daily life, and security issues are increasingly prominent. In order to improve the security and use of two-dimensional code information, the anti-counterfeiting technology based on encrypted two-dimensional code is studied. At first, this article discusses the security problems faced by two-dimensional code in the application process, and analyzes digital security technology, and compares the performance of different encryption algorithms. This algorithm not only effectively enhances the security of the system and reduces the chances of key information theft and tampering, but also ensures the generation and recognition speed of two-dimensional codes.
References
Li C. Studies on book anti-counterfeiting technology based on two-dimensional code [Master’s thesis]. Nanjing: Nanjing Normal University; 2014.
Yuan W. The design principles of AES algorithm and the improvement of its key expanding algorithm [Master’s thesis]. Changchun: Jilin University; 2010.
Wu M, Xu X, E C. Research on the encryption speed of DESRSA and their hybrid algorithm. Network Security Technology and Application 2014; (7): 117–119.
Feng Y. Research on attack and defense of smart card based on AES [Master’s thesis]. Beijing: Beijing Jiaotong University; 2013.
Wei X. Research and implementation of QR code encryption based on improved AES Algorithm [Master’s thesis]. Xi’an: Xi’an University of Technology; 2019.
Yu X, Chen Q, Yan Y. Research and Realization of the RSA Encryption Algorithm Improvement. Journal of the University of South China (Natural Science edition) 2016; 32(2): 75–78.
Zhu J. Research and implementation of QR code anti-counterfeiting algorithm based on improved DES algorithm [Master’s thesis]. Xi’an: Shaanxi University of Science & Technology; 2018.
Chen Q. A hybrid encryption algorithm based on DES and RSA algorithm [Master’s thesis]. Kunming: Yunnan University; 2015.
Tian W, Li Z. Study of RSA encryption algorithm and its improved algorithm. Shanxi Electronics Technology 2013; (6): 90–92.
Lv L, Zhao J. Analysis and research of DES encryption algorithm. Journal of Nanchang Institute of Technology 2006; (5): 28–31.
Copyright (c) 2020 Liuyi Lu
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors contributing to the journal agree to publish their articles under the Creative Commons Attribution-Noncommercial 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit, that the work is not used for commercial purposes, and that in the event of reuse or distribution, the terms of this license are made clear.