检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张恒 刘戈威 黄锐 Zhang Heng;Liu Gewei;Huang Rui(Information Technology Department,China Mobile Communications Group Fujian Co.,Ltd.,Fuzhou 350000,China)
机构地区:[1]中国移动通信集团福建有限公司信息技术部,福建福州350000
出 处:《网络安全与数据治理》2025年第3期17-21,共5页CYBER SECURITY AND DATA GOVERNANCE
摘 要:为了提高信息网络安全性和隐私性,加强对网络攻击的防御能力,提出了融合数据加密技术的信息网络安全改进策略。首先对链路、节点以及端到端进行加密,实现信息传输全过程加密。然后融合ZUC算法与SM2算法,ZUC算法负责较长报文的加密解密,SM2算法用于改善ZUC算法中秘钥分配问题,提高加解密过程效率。实验结果表明,融合ZUC算法与SM2算法数据传输效率达到1100 Mibit/s,计算资源空间占用为10 MB RAM。当字节长度为512 bit、明文数据在200 KB时,加密时间为2.2 s,用时最短。当字节长度为512 bit、明文数据为300 KB时,加密和解密的用时分别为3.74 s和4.12 s,在所有算法中加解密效率最高。因此,所提策略可有效维持安全的网络环境,提高用户信息的隐私性。In order to improve the security and privacy of information network and strengthen the defense ability against network attacks,this paper proposes an information network security improvement strategy based on data encryption.Firstly,the links,nodes and end-to-end encryption are implemented to realize the whole process of information transmission encryption.Then,ZUC algorithm and SM2 algorithm are integrated.ZUC algorithm is responsible for encrypting and decrypting long packets,and SM2 algorithm is used to improve the secret key allocation problem in ZUC algorithm and improve the efficiency of encryption and decryption process.The experimental results show that the data transmission efficiency of the fusion ZUC algorithm and SM2 algorithm reaches 1100 Mibit/s,and the computing resource space is 10 MB RAM.When the byte length is 512 bit and the plaintext data is 200 KB,the encryption time is 2.2 s,which is the shortest.When the byte length is 512 bit and the plaintext data is 300 KB,the encryption and decryption times are 3.74 s and 4.12 s respectively,which is the highest encryption and decryption efficiency among all algorithms.Therefore,the proposed strategy can effectively maintain a secure network environment and improve the privacy of user information.
关 键 词:数据加密技术 信息网络安全 全过程加密 ZUC算法 SM2算法
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.147