Abstract

With the rapid development of network technology and communication technology, modern society is rapidly transforming towards an information society based on big data. The single-chip microcomputer and embedded system have received widespread attention from all walks of life since they came out. Now it has fully penetrated into people’s daily work and life. In this regard, it is of great significance to study the encryption algorithms of automated single-chip microcomputers and embedded systems based on big data. The purpose of this article is to study the encryption algorithm of the automatic single-chip microcomputer and embedded system based on big data. This article adopts research methods such as literature data method, mathematical statistics method, and logical analysis method to study the encryption algorithm of automatic single-chip computer and embedded system based on big data. It mainly optimizes and adjusts the existing data encryption algorithm and strengthens the information. Through the normal test and abnormal test of the data encryption system, it can be seen that the system can encrypt and store data, which can be said to realize transparent encryption and decryption in the process of reading and writing. Studies have shown that although the system’s built-in function takes 5-6 seconds to open a file, the time it takes for the function to open a file is between 45-48 seconds, which takes a little longer. When reading the specified data from the specified file, the correct data can be read only by providing a consistent key. It can be seen that the system is equivalent to providing data security measures in two aspects: identity authentication and data encryption. This design scheme can effectively protect the data security of the system.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.