2021
DOI: 10.1007/978-981-16-6554-7_75
|View full text |Cite
|
Sign up to set email alerts
|

Research on Application of Data Encryption in Computer Network Security

Abstract: The rapid development of network information technology, bringing a massive impact on people's lives, has completely broken the traditional way of life and led us into a new era. Under the current background, all kinds of information have an essential influence on everyone, related to the people's lives, and the development of enterprises and even the country. Therefore, network security in recent years has drawn more and more attention. Among current network security problems, the loss and malicious theft of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Although these methods can protect the information in the resource platform, all of them have some shortcomings in one way or another. The commonly used information encryption and decryption algorithms have problems related to key distribution, which may cause indelible losses if the key is leaked or the system is accessed by lifting rights in an open and complex network architecture [31][32][33][34][35]. In some scenarios with high-security-factor requirements, multiple DES is usually used, which further increases the algorithm's complexity by multiple iterations and improves the security of encrypted data to some extent.…”
Section: Related Workmentioning
confidence: 99%
“…Although these methods can protect the information in the resource platform, all of them have some shortcomings in one way or another. The commonly used information encryption and decryption algorithms have problems related to key distribution, which may cause indelible losses if the key is leaked or the system is accessed by lifting rights in an open and complex network architecture [31][32][33][34][35]. In some scenarios with high-security-factor requirements, multiple DES is usually used, which further increases the algorithm's complexity by multiple iterations and improves the security of encrypted data to some extent.…”
Section: Related Workmentioning
confidence: 99%
“…Finally there is a need to ensure to a certain extent that the system is stable and can operate properly. Computer network equipment and transmission systems are important factors affecting the reliability of computer network operation, so when carrying out maintenance work, it is important to focus on the inspection of equipment, data and lines, as well as testing the stability of their performance [1]. For example, in some special cases, it is necessary to use special communication channels to exchange information and remote control functions, and it is not possible to directly replace or reinstall a new network for the failure problems that occur in some specific applications, which must take the necessary measures to ensure that the computer network can operate efficiently and improve the reliability of the whole system, so that the overall operation level can be effectively improved.…”
Section: The Main Factors Affecting the Reliability Of Computer Netwo...mentioning
confidence: 99%
“…If the connection between two nodes is independent, an algorithm can simulate natural language transmission over the network and functional relationships under certain conditions [7]. However, this method does not rely on other forms existing in the real world with the same characteristics or high degree of functional similarity, so it can only be applied to the actual structure and cannot be experimentally verified.…”
Section: Conditional Independencementioning
confidence: 99%