Security Vulnerability and Key Points of Encryption Technology of Computer Information Technology Data | IEEE Conference Publication | IEEE Xplore