Affiliation:
1. College of Information Technology, Shangqiu Normal University, Shangqiu 476000, Henan, China
Abstract
With the development of computer network and the popularization of information system, the security of databases, as platforms for centralized storage and sharing of information system data, has increasingly become a serious problem in the field of information security, so data encryption technology has come into people’s sight. However, the current data encryption technology still has certain shortcomings, such as the inconsistency of the code text of the encryption and decryption technology, and the low efficiency of decoding and encryption. The purpose of this paper is to study the application of data encryption technology in computer network communication to provide better suggestions and explore better methods for improving network communication security system. This article, through the analysis of the database threat model and database application system structure, puts forward a design scheme of database encryption system model. A complete database encryption system can be divided into five logic modules: a key storage module, key engine module, key information module, key management module, and data storage module, and provides an in-depth analysis of the various parts and implementation details related to these modules. Finally, the designed encryption system model is programmed to be implemented; with the help of online examination system, the function and performance of the encryption system were tested; and the transmission efficiency of data encryption is maintained at more than 95%, which proves the effectiveness of the system.
Funder
Key Scientific Research Project of Colleges and Universities in Henan Province
Subject
Computer Networks and Communications,Computer Science Applications
Reference25 articles.
1. Power consumption analysis method based on data encryption standard mask;T. Wenqing;Computer Engineering,2015
2. Formal specification and verification of fully asynchronous implementations of the data encryption standard;W. Serwe;Computer Science,2015
3. Chaotic reconfigurable ZCMT precoder for OFDM data encryption and PAPR reduction;C. Han;Optics Communications,2017
4. Chaotic constellation mapping for physical-layer data encryption in OFDM-PON;A. Sultan;IEEE Photonics Technology Letters,2018
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献