Research Article
The Application of Data Encryption Technology in Computer Network Communication Security
| Project A | Project B | Conflict risk | Conflict resolution proposal |
| XOR | XOR | High | Get rid of A or B | DES | RSA | Low | Do not deal with them | DES | AES | Low | Do not deal with them | Add | Subtraction | Medium | Get rid of A or B | RSA | AES | Medium | Get rid of A |
|
|