2022
DOI: 10.1155/2022/7472205
|View full text |Cite|
|
Sign up to set email alerts
|

Application of Data Encryption Technology in Computer Network Information Security

Abstract: In order to solve the partial optimization problems of the RSA algorithm in computer network security, a method of RSA algorithm optimization based on data encryption was proposed. In the research, the application of data encryption in network information security system was mainly investigated, using RSA as the representative algorithm in the public key cryptosystem. The network information security model on the basis of data encryption was built on the public key cryptosystem in the research. Through the int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…The design scheme of communication engineering project is the core factor affecting the scientificity and rationality of project management. When the design management lacks scientificity, it cannot effectively sort out the work contents and processes of project management, which leads to the slowdown of the progress of communication engineering, and the continuous reduction of the overall construction efficiency and quality level [5] .…”
Section: Problems Existing In the Communication Engineering Project M...mentioning
confidence: 99%
“…The design scheme of communication engineering project is the core factor affecting the scientificity and rationality of project management. When the design management lacks scientificity, it cannot effectively sort out the work contents and processes of project management, which leads to the slowdown of the progress of communication engineering, and the continuous reduction of the overall construction efficiency and quality level [5] .…”
Section: Problems Existing In the Communication Engineering Project M...mentioning
confidence: 99%
“…SSL and TLS are widely used protocols that ensure the security of data during transmission. [4] The SSL protocol uses public and private keys for encryption. In the SSL protocol, the server needs to use a digital certificate to verify its identity and provide the public key to the client.…”
Section: Network Communication Encryptionmentioning
confidence: 99%
“…To achieve this goal, it is necessary to start from several aspects, including strengthening the protection ability of hardware devices, improving the management mechanism of software systems, and improving the technical level of employees. This study will focus on the current situation and development trend of computer network security issues and propose corresponding solutions [1]. Through in-depth research and analysis, we hope to provide more scientific and effective guidance for computer network security and promote the development and progress of computer networks.…”
Section: Introductionmentioning
confidence: 99%