Current location - Education and Training Encyclopedia - Graduation thesis - Application of Computer Network Security Data Encryption Technology
Application of Computer Network Security Data Encryption Technology
Application of Computer Network Security Data Encryption Technology

In the process of computer network operation, the application system is inseparable from data transmission, and all kinds of services and the most basic operations must be transmitted through data. Therefore, ensuring the security of data transmission is the core of ensuring the security of computer network. The application of authentication technology can effectively verify users' personal information and ensure network security, and the most common authentication method is digital signature technology.

With the increasing popularity of information technology, the problem of network security is becoming more and more prominent, which leads to many threats inside and outside the network. Encryption technology is the key technology to ensure network security and plays an important role in network security protection. Based on the above background, this paper analyzes the current situation of computer network security and the application of encryption technology, and on this basis, focuses on the specific application of data encryption technology in network security.

Keywords: computer network security; Data encryption; App application

With the increasing popularity of computer networks, there are more and more network security incidents. Therefore, users have more and more strict requirements for network security performance, especially the confidentiality of information and data. Effectively protecting network security is a huge challenge at present. On the one hand, the old anti-virus technology can no longer meet the requirements of current encryption standards. On the other hand, malicious attacks against the network emerge one after another. Encryption technology is the main technology to solve the network security problem, and it is widely used in computer networks at present, which improves the security of information and data transmission to a certain extent.

Main factors threatening 1 computer network security

1. 1 There is a vulnerability in the operating system.

The operating system of a computer is the environment in which all programs run. As the supporting software of the whole machine, if there are hidden dangers in the operating system, intruders may further operate the operating system of the whole machine by stealing the user's password and obtain the personal information left by the user in various programs. If there are hidden dangers in the CPU program of the system and the memory in charge of the system, intruders can use the loopholes to paralyze the computer or server; If there are security holes in network installation programs, uploading files, etc., intruders can use spyware to monitor during user transmission. These hidden dangers enter the operating system through unsafe programs, so in the daily operation process, we should try to avoid using unfamiliar software.

1.2 network security risks

The network is a very free platform to obtain and publish all kinds of information, which also leads to more threats to the network. Network security attacks include transmission line attacks, computer software and hardware attacks, network protocol attacks and so on. Among them, the unsafe factors of network protocols are the most critical. Computer protocols mainly include TCP/IP protocol, FTP\NFS protocol, etc. If an intruder exploits a loophole in the protocol, he can get the password of the machine by searching the user name and attack the firewall of the computer.

2 the principle of data encryption technology

In the process of computer network operation, the application system is inseparable from data transmission, and all kinds of services and the most basic operations must be transmitted through data. Therefore, ensuring the security of data transmission is the core of ensuring the security of computer network. Data encryption technology is to process the original file or data according to some algorithm to make it the same as the original? Clear text? Into an unreadable piece of code? Ciphertext? This code can only be read with the corresponding key, and its original content can be displayed. In this way, the data can be protected from being stolen and read by intruders.

Application of data encryption technology in computer network security

3. 1 data encryption

According to the determined cryptographic algorithm, sensitive plaintext data is converted into illegible ciphertext data. By using different keys, the same plaintext can be encrypted into different ciphertexts with the same algorithm. The data protection method is called data encryption. The main methods of data encryption are node encryption, link encryption and end-to-end encryption. Are you online? Online banking? On the premise of rising, the security of bank network system is very important. As a new security measure, data encryption system has shown many advantages and has been adopted by major banks. Through the linkage between data encryption technology and network switching equipment, that is, during the operation of the switch or firewall, all kinds of data stream information are reported to the security equipment, and the digital encryption system detects the reported information and data stream. Take targeted actions when network security risks are found, and send the response actions of security incidents to the firewall. Close or disconnect the port accurately through the switch or firewall to achieve good security effect.

3.2 Key technologies

Keys are used to encrypt and decode data and are divided into private and public. At present, the security of private key is relatively high, because it is recognized by both users. But when different uses need different keys, there will be troubles and mistakes, and the operation of public key is simple, which can make up for this shortcoming. In the operation, the sender uses the public key and the receiver uses the private key, which solves the problem well and has high data security. For example, when using a credit card, the merchant's terminal decryption key can unlock and read the user's information, and then send the information to the company that issued the credit card, so that the user's right to use can be determined, but the user's information can not be obtained, achieving a convenient and safe effect.

3.3 Total signatures

The application of authentication technology can effectively verify users' personal information and ensure network security, and the most common authentication method is digital signature technology. This technology is based on encryption technology, verification encryption and decryption technology, and the most widely used is the digital signature of public key and private key. As mentioned above, the digital signature of the private key is verified by both parties, and one party may tamper with the information. At this time, it is necessary to introduce third-party authentication, and the public key avoids this trouble. For example, in the domestic tax industry, digital signature authentication provides security for online tax business.

4 conclusion

To sum up, with the development of economy, the update of information age is very rapid, malicious attacks and Trojan viruses on the network are also emerging one after another, and no matter how high the operating system technology is, there will still be security loopholes. Therefore, it is necessary to establish a perfect protection system and attach importance to the management of network security applications in order to effectively guarantee information security. Therefore, technicians should keep up with the pace of network development and constantly improve the security protection system in order to better protect users' information security.

refer to

[1] Guo Qibiao. Security data fusion analysis of wireless sensor networks based on homomorphic encryption [J]. Network security technology and application, 20 15, (5):76-79.

[2] Yu Hailong. Information Encryption in Network Security [J]. Youth, 20 15, (4):574-575.

[3] Li Shuai. Analysis on the Application of Encryption Technology in Network Security [J]. Computer Knowledge and Technology, 20 15,11(18): 23-24, 28.

;