Abstract
Nowadays, people increasingly rely on communication software to communicate. Users can use communication software for daily life information communication and involve work, transactions, or some private content. Moreover, time or money can be lost if that information is leaked. Therefore, ensuring communication security becomes a critical issue. Communication security generally involves two aspects: information transmission and data storage. Attackers do more than attack the transmitted information. It can also steal data that is already stored. This paper first introduces the encryption algorithm of information transmission. And then, this paper introduces secure data storage methods for information encryption.Rivest-Shamir-Adleman (RSA) and Advanced Encryption Standard (AES) algorithms are mature encryption algorithms currently used. Using RSA to encrypt the AES key in information transmission can make the information more secure and reliable. In addition, adding RSA algorithm-supported digital signature verification technology can ensure the authenticity and integrity of messages. Data storage is just as necessary as information encryption. Data needs to be stored in a database. Besides, this paper introduces how the security mechanism of the MySQL database controls user access to the database.
Publisher
Darcy & Roy Press Co. Ltd.
Reference10 articles.
1. BJ, S. K., Nair, A., & VK, R. R. (2017, April). Hybridization of RSA and AES algorithms for authentication and confidentiality of medical images. In 2017 international conference on communication and signal processing (ICCSP) (pp. 1057-1060). IEEE.
2. Karakra, A., & Alsadeh, A. (2016, July). A-RSA: Augmented RSA. In 2016 SAI Computing Conference (SAI) (pp. 1016-1023). IEEE.
3. Nadjia, A., & Mohamed, A. (2015, March). Aes ip for hybrid cryptosystem rsa-aes. In 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15) (pp. 1-6). IEEE.
4. Yang, T., Zhang, Y., Xiao, S., & Zhao, Y. (2021). Digital signature based on ISRSAC. China Communications, 18(1), 161-168.
5. N. Bodapati, N. Pooja, E. A. Varshini and R. N. S. Jyothi, "Observations on the Theory of Digital Signatures and Cryptographic Hash Functions," 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 2022, pp. 1-5, doi: 10.1109/ICSSIT53264.2022.9716495.