Research on Public Key Cryptography System Based on Network Information Security
DOI: 10.23977/cpcs.2022.060207 | Downloads: 8 | Views: 275
Author(s)
Houding Zhang 1
Affiliation(s)
1 University of Wollongong, Wollongong, Australia
Corresponding Author
Houding ZhangABSTRACT
Affected by viruses, hackers and other factors, computer network security incidents have shown a high incidence in recent years. The biggest advantage of the public key system is that it doesn't need to keep secret the key communication, only the public key needs to be transmitted, thus saving a costly key transmission channel. The network needs to strengthen the construction of public key cryptosystem, protect data information by various digital encryption methods, ensure the security of information, and meet the actual use needs of users. This paper expounds the basic principle and advantages of public key encryption algorithm for network information encryption, and explains how to apply public key encryption technology to identity authentication and digital signature technology.
KEYWORDS
Public key, Digital encryption, Information securityCITE THIS PAPER
Houding Zhang, Research on Public Key Cryptography System Based on Network Information Security. Computing, Performance and Communication Systems (2022) Vol. 6: 57-61. DOI: http://dx.doi.org/10.23977/cpcs.2022.060207.
REFERENCES
[1] Wang Qin. Discussion on computer network information security and encryption technology [J]. Science and Technology Innovation and Application, 2021, 11(33):4.
[2] Zhang Dapeng. Design of computer network information security optimization encryption algorithm [J]. Digital Communication World, 2018, 160(04):128+202.
[3] Liu L, Chen W, Li T, et al. Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks[J]. Sensors, 2019, 19(11):2452.
[4] Jiang Mingfu. Design of network information security encryption system based on chaotic sequence [J]. Modern Electronic Technology, 2018, 41(23):84-88.
[5] Xu Lijuan. Research on Data Encryption Technology in Computer Network Information Security [J]. Modern Communication, 2017(17):1.
[6] Shen Haitao. Application of data encryption in network information security [J]. Digital Technology and Application, 2019, 37(2):2.
[7] Li L. Integration of information security and network data mining technology in the era of big data[J]. Acta Technica CSAV (Ceskoslovensk Akademie Ved), 2017, 62(1):157-165.
[8] Wang S, Zhu L. A markov game model of network security in information system based on copula theory[J]. Boletin Tecnico/Technical Bulletin, 2017, 55(12):227-232.
[9] Shin J, You I, Seo J T. Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process[J]. Mobile Information Systems, 2020, 2020(3):1-11 .
[10] Jiang Xiaowei. Research on Encryption Algorithm and Application of Network Information Security Center [J]. Information Weekly, 2018(17):1.
[11] Liu Xiao. Network Information Security Data Encryption Technology in Computer Foundation [J]. Electronic Technology and Software Engineering, 2019(9):1.
Downloads: | 1759 |
---|---|
Visits: | 83411 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks