| 注册
首页|期刊导航|网络安全与数据治理|融合数据加密技术的信息网络安全改进策略

融合数据加密技术的信息网络安全改进策略

张恒 刘戈威 黄锐

网络安全与数据治理2025,Vol.44Issue(3):17-21,5.
网络安全与数据治理2025,Vol.44Issue(3):17-21,5.DOI:10.19358/j.issn.2097-1788.2025.03.003

融合数据加密技术的信息网络安全改进策略

Information network security improvement strategy based on fusion data encryption technology

张恒 1刘戈威 1黄锐1

作者信息

  • 1. 中国移动通信集团福建有限公司 信息技术部,福建 福州 350000
  • 折叠

摘要

Abstract

In order to improve the security and privacy of information network and strengthen the defense ability against network attacks,this paper proposes an information network security improvement strategy based on data encryption.Firstly,the links,nodes and end-to-end encryption are implemented to realize the whole process of information transmission encryption.Then,ZUC algorithm and SM2 algorithm are integrated.ZUC algorithm is responsible for encrypting and decrypting long packets,and SM2 algorithm is used to improve the secret key allocation problem in ZUC algorithm and improve the efficiency of encryption and decryption process.The experimental results show that the data transmission efficiency of the fusion ZUC algorithm and SM2 algo-rithm reaches 1 100 Mibit/s,and the computing resource space is 10 MB RAM.When the byte length is 512 bit and the plaintext data is 200 KB,the encryption time is 2.2 s,which is the shortest.When the byte length is 512 bit and the plaintext data is 300 KB,the encryption and decryption times are 3.74 s and 4.12 s respectively,which is the highest encryption and decryption effi-ciency among all algorithms.Therefore,the proposed strategy can effectively maintain a secure network environment and improve the privacy of user information.

关键词

数据加密技术/信息网络安全/全过程加密/ZUC算法/SM2算法

Key words

data encryption technology/information network security/whole process encryption/ZUC algorithm/SM2 algorithm

分类

信息技术与安全科学

引用本文复制引用

张恒,刘戈威,黄锐..融合数据加密技术的信息网络安全改进策略[J].网络安全与数据治理,2025,44(3):17-21,5.

网络安全与数据治理

2097-1788

访问量0
|
下载量0
段落导航相关论文