Research Article

The Application of Data Encryption Technology in Computer Network Communication Security

Table 2

List of conflicts.

Project AProject BConflict riskConflict resolution proposal

XORXORHighGet rid of A or B
DESRSALowDo not deal with them
DESAESLowDo not deal with them
AddSubtractionMediumGet rid of A or B
RSAAESMediumGet rid of A