2022
DOI: 10.1155/2022/1463724
|View full text |Cite|
|
Sign up to set email alerts
|

Application Research of Data Encryption Algorithm in Computer Security Management

Abstract: In order to promote the research process of information security in the whole society, improve the safety factor of computer data communication, strengthen computer security management, the author proposes a computer data encryption strategy that combines the strong security of the 3DES encryption algorithm and the asymmetric encryption advantages of the RSA algorithm. Through the detailed analysis of DES encryption algorithm and 3DES encryption, creatively uses the RSA encryption algorithm to improve the sing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…In [14], network applications and systems are growing due to the ongoing development of social information technology, notably the rapid development of Internet technology. A serious obstacle network applications confront is safeguarding sensitive data so that external masquerading and attacks may be successfully avoided.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In [14], network applications and systems are growing due to the ongoing development of social information technology, notably the rapid development of Internet technology. A serious obstacle network applications confront is safeguarding sensitive data so that external masquerading and attacks may be successfully avoided.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Since most digital social work data and transactions are carried at rapid speeds by computer networks as carriers, regardless of whether it is private or commercial information, since information security is in danger of being compromised or decoded, resulting in varied degrees of brokenness, it should be one of our top priorities for each individual. In this regard and manner, we should employ almost every kind of information securely and efficiently has become a critical pillar in ensuring the growth of digital humanity's environment: how to prevent information from being illegally stolen, eavesdropped on, forged, retrieved, and tampered with during the transmission and processing of information on the publicly accessible network, i.e., the issue of information authentication and confidentiality, has become a problem that people are scared about; as a result, the theory of information authentication and confidentiality has become a problem that people are focused on [2]. The concept of cryptography is a major answer to the problem of data insecurity.…”
Section: Introductionmentioning
confidence: 99%
“…This article has been retracted by Hindawi following an investigation undertaken by the publisher [1]. This investigation has uncovered evidence of one or more of the following indicators of systematic manipulation of the publication process:…”
mentioning
confidence: 99%