Education, Science, Technology, Innovation and Life
Open Access
Sign In

Exploration of the Encrypted Transmission Technology of Network Communication Information Based on AES Algorithm

Download as PDF

DOI: 10.23977/jeis.2024.090216 | Downloads: 8 | Views: 109

Author(s)

Ying Ding 1

Affiliation(s)

1 IT Solution Consulting, MOYI Inc, New York, USA

Corresponding Author

Ying Ding

ABSTRACT

With the rapid progress and wide application of Internet technology, the security problem of network communication has become increasingly prominent; this has become a major bottleneck restricting the development of information society. Therefore, this research aims to develop an innovative encryption transmission technology based on AES algorithm to meet the security requirements of network communication. By using AES algorithm as the core encryption mechanism, we build a new network communication information encryption transmission model, and adopt the strategy of information isolation to enhance the security of data. At the same time, we design an efficient encryption transmission platform to improve the encryption efficiency and effectively resist potential information theft. The experimental results show that our technology significantly reduces the risk of information theft and provides a reliable and innovative solution for network communication security problems. This research has important theoretical and practical significance in the field of network communication security, and provides a strong support for the future development of network security technology.

KEYWORDS

AES Algorithm, Network Security, Data Transmission, Secure Communication, Encryption Technology, Information Privacy

CITE THIS PAPER

Ying Ding, Exploration of the Encrypted Transmission Technology of Network Communication Information Based on AES Algorithm. Journal of Electronics and Information Science (2024) Vol. 9: 127-131. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2024.090216.

REFERENCES

[1] Nair S, Jerichow A, S Bykampadi N. Security Management In Communication Systems With Network Function Assisted Mechanism To Secure Information Elements: EP20190157496[P]. EP3528456B1[2024-04-13].
[2] Kashmar D. Efficient Image Encryption Schemes Based On Developing Aes Algorithm With Fuzzy Function[J]. IEEE, 2021. DOI:10.47832/Minar.
[3] Kageyama K, Arai S, Hamano H, et al. Parallel Software Encryption of AES Algorithm by Using CAM-Based Massive-Parallel SIMD Matrix Core for Mobile Accelerator [J]. Journal of Advances in Information Technology, 2023.
[4] Zhang X, Parhi K K. High-speed VLSI architectures for the AES algorithm [J]. IEEE Transactions on Very Large Scale Integration Systems, 2004, 12(9): 957-967. DOI:10.1109/TVLSI.2004.832943.
[5] Yan J J. Chaos-Based Synchronized Dynamic Keys and Their Application to Image Encryption with an Improved AES Algorithm [J]. Applied Sciences, 2021, 11. DOI:10.3390/app11031329.
[6] Mushtaq M, Akram A, Bhatti M K, et al. Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm[C]. 2018 Global Information Infrastructure and Networking Symposium, 2018. DOI:10.1109/ GIIS. 2018.8635767.
[7] Mehta B B. Big Data Privacy[J]. IEEE, 2017. DOI:10.14293/S2199-1006.1.SOR-COMPSCI.CLULSWF.v1.
[8] Pfister N A, Vemuri S, Lutz D R. Processing of iterative operation:US201916368930[P]. US10970070B2[2024-04-14].
[9] Savari M, Montazerolzohour M, Thiam Y E. Comparison of ECC and RSA algorithm in multipurpose smart card application [J]. IEEE, 2012. DOI:10.1109/CyberSec.2012.6246121.

Downloads: 8521
Visits: 282275

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.