RETRACTED: Application Research of Data Encryption Technology in Computer Network Information Security (Retracted Article)

被引:0
|
作者
Wang, Meilin [1 ]
机构
[1] Inner Mongolia Presch Educ Coll Nationalities, Ordos 017000, Inner Mongolia, Peoples R China
关键词
ALGORITHM;
D O I
10.1155/2022/6485195
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to ensure the rights and interests of computer users, a method of data encryption technology in computer network information security is proposed. According to the symmetric encryption AES algorithm, the ECC system has higher security, slower decoding speed, smaller storage space occupation, and lower bandwidth requirements. The experimental results show that the safety mode length can reach 5 : 1, 6 : 1, 10 : 1 or even 35 : 1. Conclusion. The use of a hybrid cryptosystem based on MD5, AES, and elliptic curve keys can effectively make up for various problems and loopholes encountered in data transmission in current network security, and improve the security of information transmission in today's social network.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] RETRACTED: Application Research of Wireless Sensor Network Based on Computer BIM Technology and ZigBee in Interior Art Design (Retracted Article)
    Hu, Dong
    Hao, Xintian
    Liu, Chao
    [J]. JOURNAL OF SENSORS, 2022, 2022
  • [42] RETRACTED: Application of Data Mining Technology in Software Intrusion Detection and Information Processing (Retracted Article)
    Zhao, Xuemin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [43] RETRACTED: Research on the QoS Control Technology in Overlay Network Based on Distribution Application (Retracted Article)
    Li, Dengshi
    Yan, Bin
    Guo, Xi
    [J]. 2011 INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL SCIENCE-ICEES 2011, 2011, 11
  • [44] RETRACTED: Research on Computer-Aided Product Design Technology (Retracted Article)
    Song, Wei
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [45] Research on Computer Network Security Based on Data Encryption Technology
    Zhang, Yicong
    Zhou, Shujun
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1383 - 1387
  • [46] RETRACTED ARTICLE: Research on financial management model based on computer information technology
    Miao Zhang
    [J]. Annals of Operations Research, 2023, 326 : 23 - 23
  • [47] Application of the Data Encryption Technology in the Computer Network Communication Security
    Hu, Xiaoling
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 283 - 283
  • [48] RETRACTED: The Application of a Computer Monitoring System Using IoT Technology (Retracted Article)
    Zhao, Zhu
    Hu, Qian
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [49] The Application of Data Encryption Technology in Computer Network Communication Security
    Gong, Lina
    Zhang, Li
    Zhang, Wei
    Li, Xuhong
    Wang, Xia
    Pan, Wenwen
    [J]. 2017 5TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2017), 2017, 1834
  • [50] The Application of Data Encryption Technology in Computer Network Communication Security
    Liu, Guanxiu
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022