Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Why did the authors select binary logistic regression in the research? With the continuous development of information network technology, communication information security technology has become

Why did the authors select binary logistic regression in the research?
With the continuous development of information network technology, communication information security technology has become an important technical field, which has been widely concerned by the society, the army and the government [1]. Chinas financial, government and other important areas have entered the era of information network. Following the important areas of airspace, territorial sea and territory, information network has become the focus of national attention [2]. At present, the security of Corresponding author. Bo Su, School of Aerospace Science and Technology, Xidian University, Xian, China. E-mail: sunyanxa@21cn.com. network system is low, which can not effectively prevent the information from being illegally modified and stolen in the process of network communication, and restricts the application of computer network technology in daily work [3]. Under the above background, information encryption technology has been developed and applied in network communication information encryption, which improves the security of network information communication [4]. The current encryption algorithm for network communication information has the problems of low information integrity, low information availability and low encryption efficiency. It is necessary to analyze and study the encryption algorithm for network communication information [5]. ISSN 1064-1246/20/$35.002020 IOS Press and the authors. All rights reserved 1628 B. Su et al./ Encryption algorithm for network communication information Reference [6] proposes an encryption algorithm for network communication information based on attribute encryption, which obtains the private key of communication information through Hash function. On the basis of the corresponding access privileges of different communication information, the access control tree is obtained by using attribute encryption algorithm, and the access privileges of different user attributes are calculated. According to the calculation results, the matching of user attributes and information privileges is realized by combining the access control tree, and the encryption of network communication information is completed. The difference between the encrypted communication information and the original communication information achieved by the algorithm is large, and there is a problem of low availability of information. Reference [7] proposes an encryption algorithm for network communication information based on SM4 rounds of function design. Combining generalized Feistel structure and molecular cipher SM4 standard, a general structure design is obtained. Using mixed integer programming method, collision-resistant attacks are taken as security objectives to obtain different structures with different efficiency and size. Using the above structure, authentication encryption algorithm and message authentication code are constructed. and the authentication code is constructed, and the network communication information is encrypted by constructing authentication encryption algorithm. In the process of encrypting the communication information, the data is easy to be tampered with and stolen, and the integrity of the information is low. Reference [8] proposes an encryption algorithm for network communication information based on improved genetic algorithm, which processes communication information by segmental encoding. On the basis of association rules, feature quantities of communication information are extracted. Data hiding of encoding information is designed by vector quantization fusion method. The improved genetic algorithm is used to construct the encryption key of network communication information, and the communication information is quantified and encrypted to complete the encryption of network communication information. This algorithm takes a long time to quantify the encoding of communication information and has the problem of low encrypting efficiency. Reference [9] proposes an encryption algorithm for network communication information based on block cipher synchronization information. Random number is randomly acquired as synchronization information. Synchronization information is encrypted and protected by block cipher algorithm. Random number is used as key seed in sequence cipher algorithm, which is sequentially encrypted to obtain ciphertext. Synchronization information and ciphertext after encryption are transmitted to each other.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Professional Android 4 Application Development

Authors: Reto Meier

3rd Edition

1118223853, 9781118223857

More Books

Students also viewed these Programming questions

Question

=+2. Have you given John and Nancy a list of parts?

Answered: 1 week ago