Application and Performance Evaluation of DES Data Encryption Algorithm in Computer Information Security Technology
DOI: 10.23977/jaip.2024.070301 | Downloads: 13 | Views: 259
Author(s)
Ying Ding 1
Affiliation(s)
1 IT Solution Consulting, MOYI Inc, New York, NY, USA
Corresponding Author
Ying DingABSTRACT
This article delves into the application and performance evaluation of the Data Encryption Standard (DES) algorithm in computer information security technology. With the rapid development of information technology, information security issues are becoming increasingly prominent, especially in terms of confidentiality in data transmission and storage. In response to the inefficiency and increasingly complex security threats of traditional firewall technology, this article proposes a suggestion to use the DES algorithm as a more effective means of confidentiality. By evaluating and analyzing the performance of the DES algorithm in practical applications, the experimental results show that the DES algorithm performs well in maintaining encryption speed and decryption efficiency, but there are also some potential security vulnerabilities. This article aims to explore the application prospects of DES algorithm in the field of information security in depth, and propose improvement strategies to compensate for its security deficiencies. Our research will provide important references and insights for further development in the field of information security, helping to enhance the security and confidentiality of computer systems.
KEYWORDS
Information technology, Confidentiality, encryption algorithms, DES algorithms, Information confidentiality technology, Performance evaluation, Information securityCITE THIS PAPER
Ying Ding, Application and Performance Evaluation of DES Data Encryption Algorithm in Computer Information Security Technology. Journal of Artificial Intelligence Practice (2024) Vol. 7: 1-6. DOI: http://dx.doi.org/10.23977/jaip.2024.070301.
REFERENCES
[1] Yan L. Research on Crude Oil Trade Procurement Model Based on DEA-Malmquist Algorithm [J]. Scientific programming, 2021, (14): 20-21.
[2] Reinhold A G. System And Method For Securely Encrypting Data: US17125887 [P]. US20210152532A1 [2024-04-14].
[3] Shan Huilin, Zhang Yinsheng. Sound wave encrypted transmission system based on improved DEA algorithm [J]. Electronic technology application, 2019, (4): 5. DOI: CNKI: SUN: DZJY.0.2019-04-024.
[4] Hao W U. Data encryption means based on DES Algorithm and RSA Algorithm [J]. Journal of Jiaozuo Institute of Technology, 2002.
[5] Wu H, Wu H. Research on Computer Network Information Security Problems and Prevention Based on Wireless Sensor Network[C]. Asia-Pacific Conference on Image Processing, Electronics and Computers. 2021. DOI:10.1109/ IPEC51340.2021.9421303.
[6] Huilin S, Yinsheng Z. The acoustic encryption transmission system based on improved DEA [J]. Application of Electronic Technique, 2019.
[7] Wu Y, Dai X. Encryption of accounting data using DES algorithm in computing environment [J]. Journal of intelligent & fuzzy systems: Applications in Engineering and Technology, 2020, (1): 39.
[8] Guo Y, Xu J, Yuan H, et al. Research on Enterprise Computer Network Security Protection Technology Based on Information Technology[C]. International Conference on Automation, Electronics and Electrical Engineering. 2020. DOI:10.1109/AUTEEE50969.2020.9315704.
Downloads: | 9117 |
---|---|
Visits: | 246685 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks