Security model and design of network communication system based on data encryption algorithm

Author(s):  
Xiaoshu Ma ◽  
Qing Liu
2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Yifeng He ◽  
Nan Ye ◽  
Rui Zhang

Nowadays, the development of information technology can be described as extremely rapid, especially with the widespread use of the Internet; the security of communications in the network has become an important issue we are facing. The purpose of this article is to solve the problems in today’s network security data encryption algorithms. Starting from the computer network communication security data encryption algorithm, we discuss the effects of several different encryption methods on improving network security. The research results show that it is known that the application of link encryption algorithm in network communication security encryption algorithm can increase the security index by 25%, the node encryption algorithm can increase the security index by 35%, and the end-to-end encryption algorithm can make the cyber activity safety index to increase by 40%. Among them, RSA algorithm and DES algorithm are two very representative algorithms; they represent different encryption systems. From the perspective of network data link, there are three methods of encryption algorithm, namely, link encryption algorithm, node encryption algorithm, and end-to-end encryption algorithm.


2012 ◽  
Vol 482-484 ◽  
pp. 39-42
Author(s):  
Ying Li Wei ◽  
Tian Huang Chen

Security of messaging middleware is the key issue to ensure the integrity of news transmission. By analyzing the defects on safety of current JMS-based messaging middleware communication model, elaborating several safety problems of messaging middleware from authentication, authorization, encapsulation and audit, this paper proposes a messaging middleware security model based on data encryption and digital signature technology, it encrypt messages with symmetric and asymmetric encryption algorithm and audit some safety-related events, then the security of message transmission has improved.


2013 ◽  
Vol 734-737 ◽  
pp. 3180-3185
Author(s):  
Yong Liu ◽  
Jian Hua Wu

This paper discusses an in-depth analysis of various encryption technologies, such as RSA, DES, SHA-1, improves DES algorithm and combines their advantages, then put forward a new communication security model based on various algorithms. Thus increasing the security of asynchronous network communication system.


Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


Sign in / Sign up

Export Citation Format

Share Document