Research on Encryption and Decryption Methods of Data Security Transmission Based on AES Algorithm

XUE Xiao-ming

Computer & Telecommunication ›› 2025, Vol. 1 ›› Issue (4) : 43-46.

Computer & Telecommunication ›› 2025, Vol. 1 ›› Issue (4) : 43-46.

Research on Encryption and Decryption Methods of Data Security Transmission Based on AES Algorithm

  • XUE Xiao-ming
Author information +
History +

Abstract

In the digital era, the problem of data transmission security has become increasingly prominent, and traditional encryption methods have certain limitations. In order to improve the security of data transmission, this paper proposes an encryption and decryption method based on AES algorithm. Firstly, AES algorithm is used to generate data key, which is efficient, secure and widely used. During encryption, byte substitution and column are mixed, the former is nonlinear byte substitution through S-box, and the latter is linear transformation of data matrix column to enhance the degree of data confusion. At the same time, the artificial bee colony algorithm is used to optimize the confusion sequence composed of data and key, and give full play to its global search and adaptive ability to improve the encryption security and complexity. Experiments are carried out under different transmission bandwidths. The results show that compared with the existing methods, this method can resist brute force attack more effectively, the number of successful attacks is significantly reduced, and the data transmission security is guaranteed. After applying this method, the encryption and decryption time is shorter and the memory usage is reduced.

Key words

data transmission / security / encryption / decrypt / AES algorithm / artificial bee colony algorithm

Cite this article

Download Citations
XUE Xiao-ming. Research on Encryption and Decryption Methods of Data Security Transmission Based on AES Algorithm[J]. Computer & Telecommunication. 2025, 1(4): 43-46

References

[1] 杨亚涛,董辉,刘建韬,等.AEUR:基于uBlock轮函数的认证加密算法设计[J].通信学报,2023,44(8):168-178.
[2] 张磊,张仁飞,任冬.面向无线网络数据安全的非对称加密传输方法[J].信息技术,2024(2):132-137.
[3] 管迎春,牟令,杨德超,等.GA-BPNN的网络物理层传输安全加密方法[J].单片机与嵌入式系统应用,2023,23(4):24-27+32.
[4] 陈琳. 基于混沌序列和AES算法的数据库外层数据传输同步加密方法[J].黑龙江工程学院学报,2024,38(4):38-43.

Accesses

Citation

Detail

Sections
Recommended

/