STEMM Institute Press
Science, Technology, Engineering, Management and Medicine
Analysis of the Application of Data Encryption Technology in Computer Network Security
DOI: https://doi.org/10.62517/jbdc.202301409
Author(s)
Xinyang Jia
Affiliation(s)
Institute of Problem Solving, Xi'an FanYi University, Xi'an, Shaanxi, China
Abstract
The application of data encryption technology in computer network security has become an important means to protect sensitive information and ensure secure data transmission. This paper first provides an overview of data encryption technology, including basic concepts, classification of encryption algorithms, and encryption principles. A comparison between symmetric and asymmetric encryption algorithms is also presented. The paper then explores the application of data encryption technology in network transmission, network storage, and network communication. In addition, the basic concepts of digital signature technology are introduced, along with its implementation modes and application scenarios in network security. Furthermore, the paper discusses the basic concepts of security protocols and provides detailed explanations of the TLS/SSL security protocol and IPsec protocol. The development trends of data encryption technology are also analyzed, including the combination of multiple technologies, big data encryption, quantum encryption technology, and verification encryption. In conclusion, the application of data encryption technology in computer network security is diverse and will continue to play an important role in future developments.
Keywords
Data Encryption Technology; Computer Network Security; Network Transmission; Network Storage; Network Communication; Digital Signature Technology; Security Protocols
References
[1] Ahmadi S. Challenges and Solutions in Network Security for Serverless Computing[J]. International Journal of Current Science Research and Review, 2024, 7(1): 218-229. [2] Liu J. Research on Computer Network Secure Communication and Encryption Algorithm Based on Machine Learning[C]//2023 Asia-Europe Conference on Electronics, Data Processing and Informatics (ACEDPI). IEEE, 2023: 113-117. [3] Peng Y. Research on the Technology of Computer Network Security Protection[J]. Journal of Applied Data Sciences, 2023, 4(1): 22-29. [4] Adeniyi A E, Abiodun K M, Awotunde J B, et al. Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach[J]. Multimedia Tools and Applications, 2023: 1-15
Copyright @ 2020-2035 STEMM Institute Press All Rights Reserved