RETRACTED: Application of Data Image Encryption Technology in Computer Network Information Security (Retracted Article)

被引:3
作者
Li, Li [1 ]
机构
[1] Xian Univ, Teachers Coll, Xian 710065, Peoples R China
关键词
D O I
10.1155/2022/8963756
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In order to solve the practical problem that the security of computer network information cannot be guaranteed, which seriously affects the network performance, the author proposes a public key data encryption system based on PKI. The system proposed by the author is based on the public key cryptographic algorithm RSA, including implementation of data encryption and digital signature and key distribution, an improved RSA algorithm is proposed for the slow speed of RSA. The result obtained is as follows: after reasonable selection of parameters and the use of optimized algorithms (also known as combined algorithms), the RSA algorithm is about 1.0% to 2% more efficient than the traditional algorithm, to a certain extent, the operation efficiency of the RSA algorithm is improved, and the purpose of improving the RSA algorithm is achieved. It is proved that the public key data encryption system is of great significance for modern computer network information encryption and maintaining a green and secure network environment.
引用
收藏
页数:7
相关论文
共 25 条
[1]  
Ahmed DW, 2021, J ENG SCI TECHNOL, V16, P1319
[2]   A secure image encryption scheme based on three different chaotic maps [J].
De, Supriyo ;
Bhaumik, Jaydeb ;
Giri, Debasis .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (04) :5485-5514
[3]   Study on fault identification of mechanical dynamic nonlinear transmission system [J].
Guo, Erfu ;
Jagota, Vishal ;
Makhatha, Mamookho Elizabeth ;
Kumar, Pawan .
NONLINEAR ENGINEERING - MODELING AND APPLICATION, 2021, 10 (01) :518-525
[4]  
Hashim Ashwaq T., 2021, Journal of Physics: Conference Series, DOI 10.1088/1742-6596/1973/1/012037
[5]   A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture [J].
He, Pengcheng ;
Sun, Kehui ;
Zhu, Congxu .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[6]   New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci Q-Matrix [J].
Hosny, Khalid M. ;
Kamal, Sara T. ;
Darwish, Mohamed M. ;
Papakostas, George A. .
ELECTRONICS, 2021, 10 (09)
[7]   Knowledge map visualization of technology hotspots and development trends in China's textile manufacturing industry [J].
Huang, Ruihang ;
Yan, Ping ;
Yang, Xiaoming .
IET COLLABORATIVE INTELLIGENT MANUFACTURING, 2021, 3 (03) :243-251
[8]   Analytic Study of a Novel Color Image Encryption Method Based on the Chaos System and Color Codes [J].
Kanwal, Shamsa ;
Inam, Saba ;
Cheikhrouhou, Omar ;
Mahnoor, Kinza ;
Zaguia, Atef ;
Hamam, Habib .
COMPLEXITY, 2021, 2021
[9]   A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things [J].
Khan, Prince Waqas ;
Byun, Yungcheol .
ENTROPY, 2020, 22 (02)
[10]  
Kumar D., 2019, 2019 International Conference on Signal Processing and Communication (ICSC), P64