Research on Data Encryption Technology

Hongjiang Duan, Weilong Huang, Guangxu Zhu

Article ID: 411
Vol 1, Issue 1, 2018

VIEWS - 497 (Abstract) 525 (PDF)

Abstract


Data cryptography is the core technology of network and information security. Its basic design idea is to use the carrier form (called cipher text) after the various transformations (called encryption algorithm) to send the message (plaintext) For the storage and transmission, the authorized recipient with the corresponding transformation (known as the decryption algorithm) to restore the plaintext, the illegal interceptors are not visible or understand the plaintext, so as to achieve the purpose of information security.

Full Text:

PDF


References


1. SY Wang. Talking about data encryption technology [J]. Journal of Chaohu University, 2013 (6): 88-89.

2. Y Zheng, CS Yang. Encryption and decryption combat entry [M]. Beijing: Electronic Industry Press, 2006.

3. GP Zhang. Network security in the application of information encryption [J]. Consumer Guide, 2008.

4. [XY Xie, BF Wei. Analysis of network information encryption technology [J]. Technology Square, 2007 (5): 129.

5. YH Li. Application of DES encryption algorithm in data security protection in file transmission [J]. Hubei: School of Electric

6. Power and Electronic Engineering, North China Electric Power University, 2012, (3): 06-009.

7. XL Cao. DES-based encryption algorithm [J]. Henan Vocational and Technical College, 2011, (4): 295-296,309.

8. J Li , XY Li. Data encryption in the DES encryption algorithm [J]. 2012, (2): 82-84.

9. XL Zhao. Network security technology course [M]. Beijing: National Defense Industry Press, 2014, (6): 93-95.

10. JW Hu. Network security and confidentiality [M]. Xi'an: Xi'an University of Electronic Science and Technology Press, 2013, (3): 112-114.


Refbacks

  • There are currently no refbacks.




Creative Commons License

This site is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.