2022
DOI: 10.1155/2022/6485195
|View full text |Cite|
|
Sign up to set email alerts
|

Application Research of Data Encryption Technology in Computer Network Information Security

Abstract: In order to ensure the rights and interests of computer users, a method of data encryption technology in computer network information security is proposed. According to the symmetric encryption AES algorithm, the ECC system has higher security, slower decoding speed, smaller storage space occupation, and lower bandwidth requirements. The experimental results show that the safety mode length can reach 5 : 1, 6 : 1, 10 : 1 or even 35 : 1. Conclusion. The use of a hybrid cryptosystem based on MD5, AES, and ellipt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…In the face of various threats and challenges to network security, new technologies such as artificial intelligence engine, artificial neural network and zero-trust network security architecture must be applied to build the network security of digital economy and digital development. Through continuous real-time attention and analysis of people, behaviors and data, an adaptive active immune defense line of network security can be realized [11] . Finally, the ultimate network security protection effect of "six No" is completed, that is, "the attacker can't get in, the non-authorized party can not get important information, the thief can not understand, the system information can not be changed, the system work is not paralyzed, the attack behavior can not be denied".…”
Section: Build An Active Defense Line Of Cyber Security Immunitymentioning
confidence: 99%
“…In the face of various threats and challenges to network security, new technologies such as artificial intelligence engine, artificial neural network and zero-trust network security architecture must be applied to build the network security of digital economy and digital development. Through continuous real-time attention and analysis of people, behaviors and data, an adaptive active immune defense line of network security can be realized [11] . Finally, the ultimate network security protection effect of "six No" is completed, that is, "the attacker can't get in, the non-authorized party can not get important information, the thief can not understand, the system information can not be changed, the system work is not paralyzed, the attack behavior can not be denied".…”
Section: Build An Active Defense Line Of Cyber Security Immunitymentioning
confidence: 99%
“…After the key configuration is completed, the key information is signed and authenticated by RSA, so that it can be converted into an RSA key. Finally, the ciphertext and key obtained by the two branches are sent to the receiver at the same time to complete the whole process of encryption [3].…”
Section: Encryption Algorithm Scheme Design 21 Basic Framework Designmentioning
confidence: 99%
“…The service architecture of the computer network security system should be divided according to the security level. The specific design is shown in Figure 3 below: [11][12][13] Based on the above analysis, it can be seen that in the identification and authentication of subject and object, service functions such as identity authentication and access control should be used to effectively deal with it, so as to ensure that the permissions of users entering the network system meet the pre-designed requirements, and at the same time, actual authorized access should be controlled according to the authentication activity marks of subject and object. When accessing the database, the user can only realize the transmission activities through the access control module, so as to ensure the integrity and confidentiality of data information on the basis.…”
Section: Service Architecturementioning
confidence: 99%