{"title":"计算机信息技术数据安全漏洞及加密技术要点","authors":"Min Sun","doi":"10.1109/ICDCECE57866.2023.10151186","DOIUrl":null,"url":null,"abstract":"With the continuous development of computer information technology, data storage and processing methods have changed, which has a great impact on information security. This paper describes the work done in this field at home and abroad. In combination with the emergence of new technologies such as network technology and cloud computing in the current era, it provides us with convenient conditions. At the same time, it also discusses how to apply these new science and technology to reality, and puts forward corresponding measures for reference and suggestions. This paper first introduces the data storage and processing methods of computer information technology and related concepts, and then briefly describes and analyzes computer information technology and information security. An encryption technology model for security vulnerabilities is designed to test the encryption technology performance of the model. The test results show that when the key is public key encryption, the running time is less than that of private key encryption, which means that with the increase of the number of files, the computational complexity increases at a relatively fast linear speed.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Vulnerability and Key Points of Encryption Technology of Computer Information Technology Data\",\"authors\":\"Min Sun\",\"doi\":\"10.1109/ICDCECE57866.2023.10151186\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the continuous development of computer information technology, data storage and processing methods have changed, which has a great impact on information security. This paper describes the work done in this field at home and abroad. In combination with the emergence of new technologies such as network technology and cloud computing in the current era, it provides us with convenient conditions. At the same time, it also discusses how to apply these new science and technology to reality, and puts forward corresponding measures for reference and suggestions. This paper first introduces the data storage and processing methods of computer information technology and related concepts, and then briefly describes and analyzes computer information technology and information security. An encryption technology model for security vulnerabilities is designed to test the encryption technology performance of the model. The test results show that when the key is public key encryption, the running time is less than that of private key encryption, which means that with the increase of the number of files, the computational complexity increases at a relatively fast linear speed.\",\"PeriodicalId\":221860,\"journal\":{\"name\":\"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDCECE57866.2023.10151186\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDCECE57866.2023.10151186","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Vulnerability and Key Points of Encryption Technology of Computer Information Technology Data
With the continuous development of computer information technology, data storage and processing methods have changed, which has a great impact on information security. This paper describes the work done in this field at home and abroad. In combination with the emergence of new technologies such as network technology and cloud computing in the current era, it provides us with convenient conditions. At the same time, it also discusses how to apply these new science and technology to reality, and puts forward corresponding measures for reference and suggestions. This paper first introduces the data storage and processing methods of computer information technology and related concepts, and then briefly describes and analyzes computer information technology and information security. An encryption technology model for security vulnerabilities is designed to test the encryption technology performance of the model. The test results show that when the key is public key encryption, the running time is less than that of private key encryption, which means that with the increase of the number of files, the computational complexity increases at a relatively fast linear speed.