scholarly journals Research on Improvement of Network Information Security Technology Based on Hybrid Encryption Algorithm

2021 ◽  
Vol 22 (11) ◽  
pp. 760-768
Author(s):  
Hye-Jin Kim
2020 ◽  
Vol 2 (2) ◽  
pp. 38
Author(s):  
Mengqi Li

<p>With the continuous innovation of science and technology, data and information security technology is widely used in various industries. The application of this technology can obviously enhance the security of network communication. This article discusses the significance and insecurity of network information security, and puts forward some measures for protecting data and information security for the reference.</p>


2015 ◽  
Vol 738-739 ◽  
pp. 1213-1216 ◽  
Author(s):  
Zhi Yong He ◽  
Yue Liang

The paper firstly analyzes security and stability existed in the DDS network, and then finds that present DDS regulations cannot guarantee information’s confidentiality and integrity when facing an attack. Based on this, the paper puts forward a core thought of data analysis. According to the draft of DDS information security regulation, the paper analyzes information security threats that the DDS system must face, provides corresponding information security strategies in accordance with data granularity and operation means, and designs and realizes an information security model based on DDS. The security model there into is divided into three levels: boundary security, transmission security and data application security of fine granularity. At the same time, the paper also analyzes several important elements which influence DDS network security in detail, and then designs again the data-centered publication/subscription model. Finally, through the model testing by a lot of experiments, the experimental results show that: the model not only largely improves security of DDS network information, but also has already promoted stability and reliability of data transmission process.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Caixia Li

In the field of information security, DNA cryptography based on DNA molecular configuration and special recognition mechanism between molecules has developed rapidly. DNA molecules have great development potential in the field of information security technology such as information encryption, hiding and authentication, which provides a new way for the development of modern cryptography. The nodes of traditional sensor networks are mostly distributed in the form of a net with strong openness. In the process of node data transmission, the information is likely to be stolen, tampered with, and destroyed at any time. In this paper, an information encryption method based on DNA nano self-assembled sensor technology is proposed, and the encryption software based on DNA nano self-assembled sensor array is designed. The information encryption algorithm is designed, tested, simulated and analysed, and compared with other designs. The simulation results show that the encryption algorithm system based on DNA nano self-assembled sensor array has good function and excellent performance, can fully meet the requirements of network real-time encryption, has good feasibility and security, and reveals the great application potential of DNA molecules in the field of information security.


2019 ◽  
Vol 267 ◽  
pp. 02013
Author(s):  
Xiaobo Ming ◽  
Ying Chen ◽  
Jinhua Guo

Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.


2020 ◽  
Vol 2 (3) ◽  
pp. 53
Author(s):  
Xiaofeng Ma ◽  
Norriza Hussin

<p>With the rapid development of computer network, the fully opened network has greatly changed people’s production and daily life and the traditional industries are no longer closed. However, there are also many network security problems. To deal with it, this article explores the computer applications based on management of network information security technology. It analyzes the main factors threatening network information security from the security problems caused by computer applications. Combining with the application practice, specific measures are put forward for reference.</p>


Sign in / Sign up

Export Citation Format

Share Document