Research on Security Technology of Network Communication Information Based on Double Encryption

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Data is transmitted from the server to the terminal or the terminal to the server during the transmission process, the data information is easily monitored or tampered with, which will cause information leakage or data display false data. If the wrong instruction information may be received in the industrial control field, it will bring a lot to industrial production. Hazards and losses, so in order to ensure the reliability and data security of the network communication between the terminal and the server, industrial equipment and management system, it is very necessary to use secure communication connections and reliable data encryption algorithms to ensure communication and data security.This paper proposes an improved AES and MD5 hybrid encryption scheme, which uses SSL to encrypt the transmission channel during the communication process, uses the improved symmetric encryption algorithm AES to encrypt the data in network transmission, and encrypts the data at the sending end Then use the improved MD5 to generate a digital fingerprint for the encrypted data. At the receiving end, use MD5 to generate the same fingerprint for the encrypted data sent, and use the digest fingerprint verification to determine whether the data has been tampered with or lost during transmission. is possible to greatly improve the security and reliability of system communication and data.

Cite

CITATION STYLE

APA

Fan, X. (2021). Research on Security Technology of Network Communication Information Based on Double Encryption. In Journal of Physics: Conference Series (Vol. 1769). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/1769/1/012060

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free