Article

Research on the application of data encryption technology in network security transmission

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

With the development of information technology and popularization of the Internet, computer network security has gradually become the focus of attention. The data transmission on the network should ensure its confidentiality, authenticity, integrity and non-repudiation. The only effective way to solve these problems is to use modern cryptography. This paper makes full use of the fast speed of symmetric key cryptographic algorithm and the convenience in key management of public key cryptosystem. In this paper, the most advanced data encryption techniques, especially the AEC and ECC algorithms are proposed. The application program is in the Windows operating system, and a data encryption system technology program is designed. The system fully combines the symmetric key encryption algorithm and the public key encryption algorithm to provide a practical mode of operation for fast and secure transmission of confidential data. It also laid a practical and basic foundation for establishing a perfect and tight computer network security mechanism.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... It is particularly important to note that in the last iteration, the left and right sides are not exchanged, but S 16 T 16 is used as the input of IP − 1 to get the ciphertext [16]. e design basis of DES is Shannon's replacement permutation network [17]. is encryption network takes a block of plaintext and a key as input and produces a block of ciphertext by interleaving several "rounds" (or "layers") of substitution and permutation operations. ...
Article
Full-text available
Data encryption is to convert plaintext data into ciphertext through a data encryption algorithm and then transmit the ciphertext. After the recipient receives the ciphertext, the ciphertext is restored to plaintext, which provides protection and technical support for information security. The main purpose of this article is to design a computer data encryption system based on nonlinear partial differential equations. This paper uses the DES encryption algorithm to encrypt data and implements an onion encryption system that encrypts the outer layer of the database and tests and analyzes the encryption efficiency and additional overhead of the database encryption system on a general database to verify the design application prospects of ideas. In addition, the overall scheme of the encryption system, the hardware, and software of the system are designed in detail, the system is debugged, the overall test is tested, and the data encryption and decryption are effective and feasible. The experimental results of this paper show that after the construction of a computer data encryption system based on nonlinear partial differential equations, the overall security of the data is increased by 25%. In addition, after comparison, the security performance of the onion-type data encryption system is higher than that of the MySQL-type data. The performance of the encryption system is 21% lower. It has certain practical value and significance to apply it to the computer data encryption system.
... Computer data encryption technology can be divided into symmetric encryption technology and asymmetric encryption technology. Computer information encryption the former means that the information sender and receiver use the same key to decrypt the data information, while the latter is the information sender and the receiver uses dif-ferent information keys to encrypt and decrypt the data [27]. The difference between these two methods is whether the same key is used to encrypt the data. ...
Article
Full-text available
Nowadays, the development of information technology can be described as extremely rapid, especially with the widespread use of the Internet; the security of communications in the network has become an important issue we are facing. The purpose of this article is to solve the problems in today’s network security data encryption algorithms. Starting from the computer network communication security data encryption algorithm, we discuss the effects of several different encryption methods on improving network security. The research results show that it is known that the application of link encryption algorithm in network communication security encryption algorithm can increase the security index by 25%, the node encryption algorithm can increase the security index by 35%, and the end-to-end encryption algorithm can make the cyber activity safety index to increase by 40%. Among them, RSA algorithm and DES algorithm are two very representative algorithms; they represent different encryption systems. From the perspective of network data link, there are three methods of encryption algorithm, namely, link encryption algorithm, node encryption algorithm, and end-to-end encryption algorithm.
... Game theory can be divided into different kinds according to different processes and orders, as shown in Figure 1. In the network security, the attack strategy (vulnerability attack, application attack, and so forth 15 ) is the attacker, and the defense strategy (firewall, data encryption, and so forth 16 ) is the defender. The outcome of the attacker and defender can be judged by the payoff. ...
Article
With the complication of attack means, the network security technology needs new changes. This study analyzed the establishment of the game model and strategy selection in the process of network security attack and defense confrontation. Firstly, the relevant theory of game theory was introduced; then the network attack and defense game model was established; the components of the model were analyzed; and finally, the Nash equilibrium of the hybrid strategy was solved to obtain the optimal defense strategy. The simulation results showed that the method could find the best attack and defense strategy {a3, d4} in the complex hybrid strategy. The calculation of payoff verified the correctness of the strategy. The experimental results show that the application of the attack‐defense confrontation in the network security field is feasible and it can effectively generate optimal attack‐defense strategy to realize network security.
... At present, in the current computer market, we often see disc encryption technology, hardware encryption technology and compression package encryption technology. The security of CD Encryption technology is relatively high, and its operation is relatively simple [5] . It can use the image file of CD to hide the important files. ...
Article
Full-text available
With the continuous development of computer technology, computers have been integrated into our lives. It can be said that the computer Internet has brought tremendous changes to people’s lives. Indeed, in many cases, the portability that the online world brings is a good aspect that we can experience. However, on the other hand, people’ s computer equipment also faces many security incidents, such as network system vulnerabilities, human errors, hackers and viruses [1] . Based on this background, this article analyzes the application of data encryption technology in computers in order to provide solutions for the security of computer network equipment and software applications.
Chapter
Full-text available
Nowadays, the use of the internet is overgrowing throughout the world, which makes security a major concern for users. Data is any information that is stored on a digital platform. Security is about the protection of data. Data security means digital protective measures which are applied to prevent data from hackers. Data encryption is one of the security measures which is used on data. If somehow anyone steals the data, he could not access the data if data is already encrypted. Data Encryption algorithms are developed in computer science to secure the data of senders and receivers. The security of communication is a crucial issue on the internet. Various encryption algorithms depend on data such as text, voice, picture, video, etc. In daily life, security has become a wide necessity. Information protection is perhaps the most important of all. The data is open to high potential risks in our framework. We adopt diverse methods for various security reasons. Now we are all relying on the security and storage cloud platform but also vulnerable to multiple threats. The data in the cloud is not well-secured because anyone who can enter our credentials can access it, and cloud providers do have fair access to us. This paper discusses various data encryption techniques and much more.
Chapter
With the advancement of science and technology today, the application of computer technology is becoming more and more common, and electronic information technology supports the efficient operation of most industries. As a form of information technology, the network requires scientific and reasonable development planning so that the network information technology can continuously meet the needs of the development of modern society. However, everything has two sides, and there are many security issues in the process of information transmission. It is easy to cause the leakage of confidential documents, the loss of economic property, and the system paralysis caused by virus intrusion. This requires computer network security data encryption technology to ensure the security of information. Computer network security data encryption technology is also the core work of network security work. In order to study the encrypted data in computer network security data, this paper uses in-depth research and analysis of the mixed encryption algorithm body and proposes a technical solution that uses multiple encryption technologies to ensure the secure transmission of information. Through experimental comparison, it can be seen that for files within 40k, the encryption time is almost the same, but for the same number of keys, the time required for decryption is longer than the time required for encryption. This solution can realize fast and secure transmission of data information, provides an effective means for the network transmission of confidential files, and has good application prospects.
Chapter
In the information age, the development and application of big data technology has provided great conveniences to people’s production and life, but at the same time, it has also deteriorated the safe operating environment of computer networks, and has brought greater threats to user privacy, property and data security. The research on computer network security under big data combines the current data encryption, analysis of reasons affecting computer security, and the effective use of data encryption for computer security as the main basis. From the introduction of data encryption technology, data encryption in computer security analysis and research on effective value, destruction of data by illegal means, destruction of data by virus intrusion, determination of data encryption direction, the research on encryption technology and the application of digital encryption technology, its purpose is to strengthen the operation of data encryption technology, in order to improve the computer security, providing reference materials for related research.
Article
The traditional algorithm does not take account of the authentication problem of terminal and server. It has poor security, heavy computation of encryption or decryption, and low efficiency. To address these problems, a new intelligent encryption algorithm for network communication parallel data of information release terminal is proposed in this paper. After users' registration, the registered ID, user password, and two random numbers are entered. The first authentication data is obtained by calculating and then transferred through a secure channel to the server for the first authentication. After the success of the identity authentication in the information release terminal and the server, the user of the information release terminal obtains the release authority. Self-inverse key matrix is generated with MapReduce parallel mechanism. Source release information data file is divided into blocks in the communication process, and each block is encrypted with key matrix. After dividing the plaintext matrix and the key matrix, the plaintext is encrypted according to the Hill encryption principle. After obtaining the ciphertext and key matrix, the plaintext is decrypted according to the principle of Hill decryption principle. Experimental results show that the proposed algorithm has high security and efficiency.
ResearchGate has not been able to resolve any references for this publication.