Data encryption is one of the key technologies to realize network security, this paper first introduces the basic concept of encryption, then focuses on two kinds of the most common encryption technology: private key encryption and public key encryption, and detailed discussion of their characteristics, development and future research direction. Because of the rapid development of Internet, the security of encryption algorithm is paid more and more attention by people. Faced with the potential threat and attack of computer network, a computer network security administrator should build a powerful and secure means of protection for the network under his jurisdiction, which can be accomplished through the following six security levels: patching and preventing network vulnerabilities, encryption, authentication, firewalls, security protocols and legal matters. Data encryption technology is the most basic security technology in the network, mainly through data encryption of the information transmitted in the network to ensure its security, this is an active security defense strategy, at a very small cost can provide a considerable amount of security protection. First, the basic concept of encryption "encryption" is a restriction on the network to transmit data access to the technology. The encoded data produced by the original data (also known as plaintext, plaintext) by the cryptographic device (hardware or software) and key encryption is called ciphertext (ciphertext). The process of restoring ciphertext to the original plaintext is called decryption, which is the reverse processing of the encryption, but the decrypted person must decrypt the ciphertext with the same type of encryption device and key. The basic functions of encryption include: 1. Prevent uninvited guests from viewing confidential data files; 2. Prevent confidential data from being compromised or tampered with; 3. Prevent privileged users (such as system administrators) from viewing private data files; 4. So that intruders cannot easily find a system file. Data encryption is an important mechanism to ensure the security of computer network, although it is not popular in the network because of the complexity of cost, technology and management, but data encryption is one of the important means to realize data security in Distributed system and network environment. Data encryption can be implemented on multilayer network OSI Seven layer protocol, so from the logic of the application of encryption technology to see, there are three ways: ① link encryption: The network layer is usually the following encryption called link encryption, mainly for the protection of communication between the nodes transmitted data, encryption and decryption by the line on the password device implementation. According to the data of the synchronized mode can be divided into synchronous communication encryption and asynchronous communication encryption two, synchronous communication encryption also includes byte synchronous communication encryption and bit synchronization communication encryption. ② node Encryption: is an improvement on link encryption. Encryption on the protocol transport layer is mainly to encrypt the data between the source node and the target node, which is similar to the link encryption. Only the cryptographic algorithm is combined with the cryptographic modules attached to the nodes, which overcomes the disadvantage of the link encryption being easily accessed illegally at the node. ③ End-to-end Encryption: Encryption above the network layer is called End-to-end encryption. is to face the network layer body. The data information of the application layer is encrypted, it is easy to realize with software, and the cost is low, but the key management problem is difficult, it is mainly suitable for the transmission of information between multiple and consignee in large network system. Responsible Editor: Snowflake (TEL: (010) 68476636-8008) to force (0 votes) (0 votes) of nonsense (0 Votes) Professional (0 Votes) The title of the party (0 votes) passing (0 Votes) by the original: the most basic security technology in the network: Data encryption technology back to the network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.