The Application of Data Encryption in Network Security

Article Preview

Abstract:

. With the rapid development of internet computer viruses, Trojan horses and other safety hazards already have been a serious problem which is not ignored. By analyzing the status of network security, we use data encryption technology to ensure the security of information which is already an accepted, but there are many encryption methods. How to select the appropriate method In this paper, we purpose corresponding encryption system by the current status of the network, and it prepared for select the encryption algorithm next.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

549-551

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] H W Lenstra. Factoring integers with elliptic curves [J]. Annals of Mathematics, 1987, 126: 649–673.

DOI: 10.2307/1971363

Google Scholar

[2] Zhao Yongzhe, Wang Liou. Information-Exchange Using the Ergodic Matrices in GF(2)[C]. Applied Cryptography and Network Security Technical Track Proceedings, 2nd International Conference ACNS 2004, 2004: 388-397.

Google Scholar

[3] Nicolas Courtois. The security of Hidden Field Equations (HFE)[C]. Cryptographers' Track RSA Conference 2001, 2001: 266-281.

DOI: 10.1007/3-540-45353-9_20

Google Scholar

[4] Adi Shamir, Jacques Patarin. Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations [J]. Springer, 2000: 392-407.

DOI: 10.1007/3-540-45539-6_27

Google Scholar

[5] M E Briggs. An introduction to the general number field sieve. Master's thesis [D]. Virginia Polytechnic Institute and State University, (1998).

Google Scholar

[6] Nicolas T Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir. Efficient algorithms for solving overdefined systems of multivariate polynomial equations [J]. EUROCRYPT 2000 proceedings of the 19th international annual conference on the theory and application of cryptographic techniques, 2000: 392–407.

DOI: 10.1007/3-540-45539-6_27

Google Scholar