Loading [a11y]/accessibility-menu.js
A Big Data Encryption Method based on Lorenz and Feistel Structures | IEEE Conference Publication | IEEE Xplore

A Big Data Encryption Method based on Lorenz and Feistel Structures


Abstract:

With the development of information technology, the information network has entered the era of big data. The dissemination and storage of a large amount of data will not ...Show More

Abstract:

With the development of information technology, the information network has entered the era of big data. The dissemination and storage of a large amount of data will not only create value, but also increase the risk of data leakage. Data privacy protection is an important research topic in the field of network security, and the existing encryption methods make it difficult to give attention to the confidentiality and efficiency of big data encryption at the same time. Therefore, this paper proposes a hybrid encryption method based on the Lorenz system and Feistel structure, which is applied to large data encryption. It takes advantage of the randomness of a chaotic system, the confidentiality of hybrid encryption, and the high efficiency of symmetric encryption to ensure the speed and security of large data encryption at the same time.
Date of Conference: 22-24 July 2022
Date Added to IEEE Xplore: 17 August 2022
ISBN Information:
Conference Location: Shijiazhuang, China

I. Introduction

With the rapid development of big data and cloud computing, information networks have entered the era of big data, and information security has been given more attention. At the same time, the rapid development of cryptanalysis technology and information technology has had a great impact on the security of cryptographic algorithms. Traditional symmetric and asymmetric encryption methods cannot guarantee the speed of large data transmission and the confidentiality of information at the same time, so it has become a new research direction in the field of cryptography to adopt different cryptographic algorithm design methods.

Contact IEEE to Subscribe

References

References is not available for this document.