LING Yun. Network Node Optimization Method for Against the Attack[J]. Microelectronics & Computer, 2011, 28(9): 151-154.
Citation: LING Yun. Network Node Optimization Method for Against the Attack[J]. Microelectronics & Computer, 2011, 28(9): 151-154.

Network Node Optimization Method for Against the Attack

  • Research question, in view of the network encryption network, the transfer of the process, when encryption appear delay, delay process, the network node vulnerable to outside attack, cause safety hazard.This paper presents a Feistel algorithm based on improved the data encryption technology, through the key technology to combine traditional divided into four levels, greatly saving algorithm calculated time, solve the problem of time delay.Experimental results show that the new algorithm in computing time, reduced sharply, increased the safety and good results have been achieved.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return