首页出版说明中文期刊中文图书环宇英文官网付款页面

信息化背景下会计数据加密算法研究 ——以 DES算法为例

吴 艳红
湛江科技学院

摘要


高速发展的网络对人们的工作和生活带来了越来越多的影响,也为人们的信息交流提供了便捷的渠道,
进而改善了人们的生活和工作条件。但是,当数据通过网络传输时,存在安全隐患,尤其是重要的会计数据。一
旦被犯罪分子截获和使用,可能会对数据所有者造成严重的危害。基于以上背景,本文的目的是研究在计算环境
中使用DES算法对会计数据进行加密。本文运用了一种改进的量子遗传算法,并将其应用到DES算法的S-盒设计
中,改善了S-盒的非线性,降低了差分均匀性,提高了DES算法的安全性。这种改进的DES算法通过使用两轮函
数增加密钥长度和迭代处理,减少了迭代次数,进一步提高了算法的安全性,提高了加密过程的运算速度。发现
DES算法的64个密文以及与原始密文相比改变的比特数在32位左右波动,说明了使用DES算法加密会计数据时应
注意的问题。为了防止密钥丢失或泄露,密钥的有效性需要得到保证,这样才能保证成批的较短数据进行加密时
保证它的安全性。1

关键词


DES算法;会计数据;数据加密;加密算法

全文:

PDF


参考


[1]C.H. Chen, F.J. Hwang and H.Y. Kung, Travel

Time Prediction System Based on Data Clustering for Waste

Collection Vehicles, IEICE TRANSACTIONS on Information

and Systems 102(7) (2019), 1374–1383.

[2]Yang Jiang, Guangfu Li and Weilong Che, A neutral

dinuclear Ir (iii) complex for anti-counterfeiting and data

encryption, Chemical Communications 53(21) (2017), 3022–

3025.

[3]Liangliang Lu, Design of Wireless Blood Pressure

Monitor and Its Data Encryption Method, Chinese Journal of

Medical Instrumentation 42(3) (2018), 180–181.

[3] 陆靓亮 . 无线血压计设计及其数据加密方法 [J]. 中

国医疗器械杂志,2018,42(03):180-181+192.

[4]Amber Sultan, Xuelin Yang and A.A.E. Hajomer,

Chaotic Constellation Mapping for Physical-Layer Data

Encryption in OFDM-PON, IEEE Photonics Technology

Letters (99) (2018), 1–1.

[5]Chen Shuai and Zhong Xian-xin, Research of Cipher

Chip Core for Sensor Data Encryption, IEEE Sensors Journal

16(12) (2016), 1–1.

[6]Shadi Aljawarneh, Muneer Bani Yassein and We’am

Adel Talafha, A Multithreaded Programming Approach for

Multimedia Big Data: Encryption System, Multimedia Tools &

Applications 77(6) (2017), 1–20.

[7]Baojiang Cui, Zheli Liu and Lingyu Wang, KeyAggregate Searchable Encryption (KASE) for Group Data

Sharing via Cloud Storage, IEEE Transactions on Computers

65(8) (2015), 1–1.

[8]Yinghui Zhang, Dong Zheng and Qi Li, Online/offline

unbounded multiuthority attribute – based encryption for data

sharing in mobile cloud computing, Security & Communication

Networks 9(16) (2016), 3688–3702.

[9]D. Prashar, G. Chakraborty and S. Jha, Energy efficient

Laser based embedded system for blind turn traffic control,

Journal of Cybersecurity and Information Management 2(2)

(2020), 35–43.

[10]Iti Sharma and C.P. Gupta, Making data in cloud

secure and usable: Fully homomorphic encryption with

symmetric keys, International Journal of Communication

Networks & Distributed Systems 14(4) (2015), 379.

[11]Ghassan Sabeeh Mahmood, Dong Jun Huang and

Baidaa Abdulrahman Jaleel, Data Security Protection in Cloud

Using Encryption and Authentication, Journal of Computational

& Theoretical Nanoscience 14(4) (2017), 1801–1804.

[12]Fu-Kuo Tseng and Rong-Jaye Chen, Towards

Position- Aware Symbol-Based Searches on Encrypted Data

from Symmetric Predicate Encryption Schemes, Ieice Trans

Fundamentals A(1) (2016), 426–428.

[13]H. Abdel-Kader, M. Abd-El Salam and M.

Mohamed, Hybrid Machine Learning Model for Rainfall

Forecasting, Journal of Intelligent Systems and Internet of

Things 1(1) (2020), 5–12.

[14]Sha Ma, Yi Mu and Willy Susilo, A Generic Scheme

of Plaintext-Checkable Database Encryption, Information

Sciences 429 (2017), 88–101.




DOI: http://dx.doi.org/10.12361/2661-376X-04-13-85003

Refbacks

  • 当前没有refback。