Application Research of Data Encryption Technology in Computer Network Security
Introduction
With the rapid development of the Internet and computer technology, people’s demand for network security is increasing. Protecting the privacy, integrity, and reliability of data during information exchange is essential. Data encryption technology is one of the important means to solve these problems.
This paper aims to explore the application research of data encryption technology in computer network security. Through literature review, research methods, and experimental results, we summarize and analyze previous research achievements, existing problems, and future development trends. We also conduct in-depth analysis and discussion on current popular encryption technologies.
Literature Review
- Overview of Data Encryption Technology
Data encryption is a process that transforms plaintext into unreadable or incomprehensible content to ensure that data cannot be tampered with or stolen during transmission. It currently widely used in computer network security involving multiple encryption algorithms and protocols such as DES, AES, RSA, MD5, etc.
- Problems with Data Encryption Technology
Although modern cryptography has protected most sensitive data well, cracking passwords has become easier with technological developments and improvements in computer processing speed. For example, some earlier encryption standards have now been proven to be insecure.
In addition, there are vulnerabilities and attack methods in the field of cryptography. For example, in public key encryption, if private keys are not adequately protected may lead to private key leakage which can be used by attackers; hash functions may also have hashing collision issues.
- Future Development Trends for Data Encryption Technology
To solve these problems mentioned above researchers are developing new cryptographic technologies to enhance network security. The hottest direction in recent years is quantum cryptography which uses special relationships between particles provided by quantum mechanics to protect information transmission’s safety.
At the same time, there are still many research works that need to carry out within ordinary cryptography fields such as verifiable computation homomorphic encryption multi-party computing etc., which provide vast opportunities for further development.
Research Method
- Research Scope
This paper mainly discusses the application and development of data encryption technology in computer network security. We focus on practicality, safety of existing encryption technologies, and future development direction.
- Method Design
This research adopts a combination of literature review and experimental analysis methods. Firstly, by collecting relevant literature, we summarize, classify and evaluate current popular data encryption technologies. Then, we use common attack methods to simulate experiments in selected typical scenarios to compare the effects and security of different algorithms.
- Instruments/Methods
To complete these experiments mentioned above, we need to use some tools or software such as Matlab, Python programming languages Wireshark protocol analyzer network testing tools.
- Steps
(1) Determine the research scope and objectives. (2) Literature review: Collect relevant literature and summarize them. (3) Experimental design: Determine experimental scenarios, attack modes, and test indicators. (4) Data collection: Run experiments and record data. (5) Data analysis: Evaluate algorithm effectiveness and security based on comparison results. (6) Conclusion and Discussion: Draw conclusions based on experiment results then discuss future trends.
Research Progress Table
| Activities | Estimated Time |
|---|---|
| Literature Review & Selection | 1 week |
| Experimental Design & Preparation | 2 weeks |
| Data Collection & Analysis | 3 weeks |
| Conclusion Summary & Discussion | 1 week |
Results and Conclusions
Through literature review, we learned about current popular data encryption technologies and their problems while conducting experiments; we found that different algorithms have different performances in different scenarios such as AES performs better than DES in high-speed network transmission scenarios whereas RSA is more suitable when dealing with large amounts of data.
In the future quantum cryptography will become an emerging field with potential for development while there still needs further in-depth research within ordinary cryptography fields such as verifiable computation, homomorphic encryption, multi-party computing etc. which provide vast opportunities for further development.
Reference
[1] Dong J H, Liang X B. Modern Cryptography[M]. Beijing: Tsinghua University Press, 2015.
[2] Huang Y X, Zhang X H, Ma M. Cryptography and Information Security[M]. Beijing: Science Press, 2007.
[3] Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography[J]. CRC press, 1996.
Acknowledgements
We would like to express our appreciation to our supervisor for guidance and support during this research. We also thank all students and teachers who provided literature and resources. Our research could not have been completed without your help and support.




