信息化背景下会计数据加密算法研究 ——以 DES算法为例
摘要
进而改善了人们的生活和工作条件。但是,当数据通过网络传输时,存在安全隐患,尤其是重要的会计数据。一
旦被犯罪分子截获和使用,可能会对数据所有者造成严重的危害。基于以上背景,本文的目的是研究在计算环境
中使用DES算法对会计数据进行加密。本文运用了一种改进的量子遗传算法,并将其应用到DES算法的S-盒设计
中,改善了S-盒的非线性,降低了差分均匀性,提高了DES算法的安全性。这种改进的DES算法通过使用两轮函
数增加密钥长度和迭代处理,减少了迭代次数,进一步提高了算法的安全性,提高了加密过程的运算速度。发现
DES算法的64个密文以及与原始密文相比改变的比特数在32位左右波动,说明了使用DES算法加密会计数据时应
注意的问题。为了防止密钥丢失或泄露,密钥的有效性需要得到保证,这样才能保证成批的较短数据进行加密时
保证它的安全性。1
关键词
全文:
PDF参考
[1]C.H. Chen, F.J. Hwang and H.Y. Kung, Travel
Time Prediction System Based on Data Clustering for Waste
Collection Vehicles, IEICE TRANSACTIONS on Information
and Systems 102(7) (2019), 1374–1383.
[2]Yang Jiang, Guangfu Li and Weilong Che, A neutral
dinuclear Ir (iii) complex for anti-counterfeiting and data
encryption, Chemical Communications 53(21) (2017), 3022–
3025.
[3]Liangliang Lu, Design of Wireless Blood Pressure
Monitor and Its Data Encryption Method, Chinese Journal of
Medical Instrumentation 42(3) (2018), 180–181.
[3] 陆靓亮 . 无线血压计设计及其数据加密方法 [J]. 中
国医疗器械杂志,2018,42(03):180-181+192.
[4]Amber Sultan, Xuelin Yang and A.A.E. Hajomer,
Chaotic Constellation Mapping for Physical-Layer Data
Encryption in OFDM-PON, IEEE Photonics Technology
Letters (99) (2018), 1–1.
[5]Chen Shuai and Zhong Xian-xin, Research of Cipher
Chip Core for Sensor Data Encryption, IEEE Sensors Journal
16(12) (2016), 1–1.
[6]Shadi Aljawarneh, Muneer Bani Yassein and We’am
Adel Talafha, A Multithreaded Programming Approach for
Multimedia Big Data: Encryption System, Multimedia Tools &
Applications 77(6) (2017), 1–20.
[7]Baojiang Cui, Zheli Liu and Lingyu Wang, KeyAggregate Searchable Encryption (KASE) for Group Data
Sharing via Cloud Storage, IEEE Transactions on Computers
65(8) (2015), 1–1.
[8]Yinghui Zhang, Dong Zheng and Qi Li, Online/offline
unbounded multiuthority attribute – based encryption for data
sharing in mobile cloud computing, Security & Communication
Networks 9(16) (2016), 3688–3702.
[9]D. Prashar, G. Chakraborty and S. Jha, Energy efficient
Laser based embedded system for blind turn traffic control,
Journal of Cybersecurity and Information Management 2(2)
(2020), 35–43.
[10]Iti Sharma and C.P. Gupta, Making data in cloud
secure and usable: Fully homomorphic encryption with
symmetric keys, International Journal of Communication
Networks & Distributed Systems 14(4) (2015), 379.
[11]Ghassan Sabeeh Mahmood, Dong Jun Huang and
Baidaa Abdulrahman Jaleel, Data Security Protection in Cloud
Using Encryption and Authentication, Journal of Computational
& Theoretical Nanoscience 14(4) (2017), 1801–1804.
[12]Fu-Kuo Tseng and Rong-Jaye Chen, Towards
Position- Aware Symbol-Based Searches on Encrypted Data
from Symmetric Predicate Encryption Schemes, Ieice Trans
Fundamentals A(1) (2016), 426–428.
[13]H. Abdel-Kader, M. Abd-El Salam and M.
Mohamed, Hybrid Machine Learning Model for Rainfall
Forecasting, Journal of Intelligent Systems and Internet of
Things 1(1) (2020), 5–12.
[14]Sha Ma, Yi Mu and Willy Susilo, A Generic Scheme
of Plaintext-Checkable Database Encryption, Information
Sciences 429 (2017), 88–101.
DOI: http://dx.doi.org/10.12361/2661-376X-04-13-85003
Refbacks
- 当前没有refback。