Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm

Author:

Chen Meixi1ORCID

Affiliation:

1. School of Accounting, Fujian Jiangxia University, Fuzhou 350108, China

Abstract

With the application of computer and network technology in the field of accounting, the development of accounting informationization is an inevitable trend, and the construction of accounting statement data into the data warehouse will be the basis of intelligent decision-making. The complexity of industry accounting statements and the arbitrariness and diversity of users’ needs for obtaining information using statements limit the development, popularization, and application of industry accounting statements. As a block encryption algorithm, the Data Encryption Standard (DES) algorithm uses 64-bit packet data for encryption and decryption. Each eighth bit of the key is used as a parity bit; that is, the actual key length is 56 bits. Encryption and decryption use the same algorithm structure, but the order in which the subkeys are used is reversed. Under the control of the subkey, inputting 64-bit plaintext can produce 64-bit ciphertext output; otherwise, inputting 64-bit ciphertext can produce 64-bit plaintext output. The confidentiality of the DES algorithm depends on the key, and only a very small number of keys are considered weak keys, which can be easily avoided in practical applications. The 3DES algorithm is a cascade of the DES algorithm, and its encryption process is based on the DES algorithm principle. This article explains the encryption process of the DES algorithm and introduces the composition of the 3DES algorithm. The experimental results show that the 3DES encryption algorithm still has a better encryption effect and “avalanche effect” than before the improvement. In addition, for the 3DES algorithm, its encryption efficiency has not been greatly affected. The 3DES encryption algorithm achieves one encryption process at a time to some extent, can effectively resist exhaustive search attacks, and enhance the security of the DES algorithm.

Funder

Education Department Fujian Province 2020 Youth and Middle-Aged Teacher Education Research Project

Publisher

Hindawi Limited

Subject

Multidisciplinary,General Computer Science

Reference35 articles.

1. Encryption algorithm in cloud computing

2. Improving the security of Internet of Things using encryption algorithms;A. Safi;International Journal of Computer and Information Engineering,2017

3. A hybrid encryption method handling big data vulnerabilities

4. A resource-efficient encryption algorithm for multimedia big data

Cited by 19 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Computer Network Data Security Encryption Technology;2024 International Conference on Electrical Drives, Power Electronics & Engineering (EDPEE);2024-02-27

2. A Study of Big Data Prediction in Accounting Management Risks;Applied Mathematics and Nonlinear Sciences;2024-01-01

3. Artificial Intelligence Technology Empowers Practical Teaching of Higher Vocational Accounting Majors;Applied Mathematics and Nonlinear Sciences;2024-01-01

4. Probabilistic Model Checking for Unconfirmed Transmission in LoRaWAN on the MAC Layer;GLOBECOM 2023 - 2023 IEEE Global Communications Conference;2023-12-04

5. A Lightweight Security with Key Distribution Method in Mobile Ad-hoc Networks;2023 International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT);2023-11-23

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3