Network Information Security Data Protection Based on Data Encryption Technology

Han Ping
DOI: https://doi.org/10.1007/s11277-022-09838-0
IF: 2.017
2022-06-24
Wireless Personal Communications
Abstract:Data encryption technology can protect data from illegal theft. This study analyzed the Rivest, Shamir, and Adleman (RSA) algorithm, the Advanced Encryption Standard (AES) algorithm, and their encryption and decryption processes, compared their merits and demerits, and combined them to from the AES + RSA algorithm to achieve network data protection. It was found from the performance analysis that the AES algorithm only took a short time to encrypt and decrypt, while the RSA algorithm, due to asymmetric encryption, spent a much longer time in decryption than in encryption; the total time consumed by the AES algorithm for encryption and decryption increased hundreds of times, but the operation time of the AES + RSA algorithm was only slightly longer than that of the AES algorithm. Also, from the perspective of security analysis, both AES and RSA algorithms had high confidentiality, which could meet the needs of information security. The results show that the combination of AES and RSA algorithms is effective in information security, which can be further popularized and applied in reality.
telecommunications
What problem does this paper attempt to address?