Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Why did the authors select binary logistic regression in the research? With the continuous development of information network technology, communication information security technology has become
Why did the authors select binary logistic regression in the research?
With the continuous development of information network technology, communication information security technology has become an important technical field, which has been widely concerned by the society, the army and the government Chinas financial, government and other important areas have entered the era of information network. Following the important areas of airspace, territorial sea and territory, information network has become the focus of national attention At present, the security of Corresponding author. Bo Su School of Aerospace Science and Technology, Xidian University, Xian China. Email: sunyanxa@cncom. network system is low, which can not effectively prevent the information from being illegally modified and stolen in the process of network communication, and restricts the application of computer network technology in daily work Under the above background, information encryption technology has been developed and applied in network communication information encryption, which improves the security of network information communication The current encryption algorithm for network communication information has the problems of low information integrity, low information availability and low encryption efficiency. It is necessary to analyze and study the encryption algorithm for network communication information ISSN $ IOS Press and the authors. All rights reserved B Su et al Encryption algorithm for network communication information Reference proposes an encryption algorithm for network communication information based on attribute encryption, which obtains the private key of communication information through Hash function. On the basis of the corresponding access privileges of different communication information, the access control tree is obtained by using attribute encryption algorithm, and the access privileges of different user attributes are calculated. According to the calculation results, the matching of user attributes and information privileges is realized by combining the access control tree, and the encryption of network communication information is completed. The difference between the encrypted communication information and the original communication information achieved by the algorithm is large, and there is a problem of low availability of information. Reference proposes an encryption algorithm for network communication information based on SM rounds of function design. Combining generalized Feistel structure and molecular cipher SM standard, a general structure design is obtained. Using mixed integer programming method, collisionresistant attacks are taken as security objectives to obtain different structures with different efficiency and size. Using the above structure, authentication encryption algorithm and message authentication code are constructed. and the authentication code is constructed, and the network communication information is encrypted by constructing authentication encryption algorithm. In the process of encrypting the communication information, the data is easy to be tampered with and stolen, and the integrity of the information is low. Reference proposes an encryption algorithm for network communication information based on improved genetic algorithm, which processes communication information by segmental encoding. On the basis of association rules, feature quantities of communication information are extracted. Data hiding of encoding information is designed by vector quantization fusion method. The improved genetic algorithm is used to construct the encryption key of network communication information, and the communication information is quantified and encrypted to complete the encryption of network communication information. This algorithm takes a long time to quantify the encoding of communication information and has the problem of low encrypting efficiency. Reference proposes an encryption algorithm for network communication information based on block cipher synchronization information. Random number is randomly acquired as synchronization information. Synchronization information is encrypted and protected by block cipher algorithm. Random number is used as key seed in sequence cipher algorithm, which is sequentially encrypted to obtain ciphertext. Synchronization information and ciphertext after encryption are transmitted to each other.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started