|
 |
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
 |
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
|
05 July-September 2023, Volume 38 Issue 4
|
|
|
Abstract
This research explores network data encryption and decryption strategies used in communication networks. The majority of network communication systems revolve around information sharing on mobile phones, networked PCs, and other internet-connected electronic devices. As information travels through several networks and is subject to numerous types of assaults, unsecure data can be read, altered, or faked by anybody with access to it. To defend against this form of assault, data encryption / decryption techniques are utilized. To illustrate the effects and evaluate the efficacy of each decoding and encryption method used in network technologies, Visual Basic simulation studies that encrypted and decrypt data were created, developed, and tested. Further study was for comparative analysis of Multi-Level Algorithm with different Security Algorithms for encrypting data approach.
Keyword
DES, AES, RSA, DSA, Cipher text, Symmetric encryption, Asymmetric encryption
PDF Download (click here)
|
|
|
|
|