Encryption of accounting data using DES algorithm in computing environment

2020 ◽  
Vol 39 (4) ◽  
pp. 5085-5095
Author(s):  
Yanhong Wu ◽  
Xiuqing Dai

The more and more developed network has caused more and more impact on people’s life and work, providing convenient channels for people’s information exchange, and then improving people’s living and working conditions. However, when data is transmitted through the network, there are hidden security risks, especially important accounting data. Once intercepted and used by criminals, it may cause serious harm to the owner of the data. Based on the above background, the purpose of this article is to study the use of the DES algorithm to encrypt accounting data in a computing environment. This paper proposes an improved quantum genetic algorithm and applies it to the S-box design of the DES algorithm, which improves the non-linearity of the S-box, reduces the differential uniformity, and enhances the security of the DES algorithm. This improved DES algorithm reduces the number of iterations by increasing the key length and iterative processing using a two-round function, which further increases the security of the algorithm and improves the operation speed of the encryption process. It is found that the 64 ciphertexts of the DES algorithm and the number of changed bits compared to the original ciphertext fluctuates around 32 bits, which explains the problems that should be paid attention to when using the DES algorithm to encrypt accounting data. The validity of key characters should be guaranteed to prevent key loss or leakage. Shorter data encryption regular solution.

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Meixi Chen

With the application of computer and network technology in the field of accounting, the development of accounting informationization is an inevitable trend, and the construction of accounting statement data into the data warehouse will be the basis of intelligent decision-making. The complexity of industry accounting statements and the arbitrariness and diversity of users’ needs for obtaining information using statements limit the development, popularization, and application of industry accounting statements. As a block encryption algorithm, the Data Encryption Standard (DES) algorithm uses 64-bit packet data for encryption and decryption. Each eighth bit of the key is used as a parity bit; that is, the actual key length is 56 bits. Encryption and decryption use the same algorithm structure, but the order in which the subkeys are used is reversed. Under the control of the subkey, inputting 64-bit plaintext can produce 64-bit ciphertext output; otherwise, inputting 64-bit ciphertext can produce 64-bit plaintext output. The confidentiality of the DES algorithm depends on the key, and only a very small number of keys are considered weak keys, which can be easily avoided in practical applications. The 3DES algorithm is a cascade of the DES algorithm, and its encryption process is based on the DES algorithm principle. This article explains the encryption process of the DES algorithm and introduces the composition of the 3DES algorithm. The experimental results show that the 3DES encryption algorithm still has a better encryption effect and “avalanche effect” than before the improvement. In addition, for the 3DES algorithm, its encryption efficiency has not been greatly affected. The 3DES encryption algorithm achieves one encryption process at a time to some extent, can effectively resist exhaustive search attacks, and enhance the security of the DES algorithm.


2020 ◽  
Vol 59 (04/05) ◽  
pp. 162-178
Author(s):  
Pouyan Esmaeilzadeh

Abstract Background Patients may seek health care services from various providers during treatment. These providers could serve in a network (affiliated) or practice separately (unaffiliated). Thus, using secure and reliable health information exchange (HIE) mechanisms would be critical to transfer sensitive personal health information (PHI) across distances. Studying patients' perceptions and opinions about exchange mechanisms could help health care providers build more complete HIEs' databases and develop robust privacy policies, consent processes, and patient education programs. Objectives Due to the exploratory nature of this study, we aim to shed more light on public perspectives (benefits, concerns, and risks) associated with the four data exchange practices in the health care sector. Methods In this study, we compared public perceptions and expectations regarding four common types of exchange mechanisms used in the United States (i.e., traditional, direct, query-based, patient-mediated exchange mechanisms). Traditional is an exchange through fax, paper mailing, or phone calls, direct is a provider-to-provider exchange, query-based is sharing patient data with a central repository, and patient-mediated is an exchange mechanism in which patients can access data and monitor sharing. Data were collected from 1,624 subjects using an online survey to examine the benefits, risks, and concerns associated with the four exchange mechanisms from patients' perspectives. Results Findings indicate that several concerns and risks such as privacy concerns, security risks, trust issues, and psychological risks are raised. Besides, multiple benefits such as access to complete information, communication improvement, timely and convenient information sharing, cost-saving, and medical error reduction are highlighted by respondents. Through consideration of all risks and benefits associated with the four exchange mechanisms, the direct HIE mechanism was selected by respondents as the most preferred mechanism of information exchange among providers. More than half of the respondents (56.18%) stated that overall they favored direct exchange over the other mechanisms. 42.70% of respondents expected to be more likely to share their PHI with health care providers who implemented and utilized a direct exchange mechanism. 43.26% of respondents believed that they would support health care providers to leverage a direct HIE mechanism for sharing their PHI with other providers. The results exhibit that individuals expect greater benefits and fewer adverse effects from direct HIE among health care providers. Overall, the general public sentiment is more in favor of direct data transfer. Our results highlight that greater public trust in exchange mechanisms is required, and information privacy and security risks must be addressed before the widespread implementation of such mechanisms. Conclusion This exploratory study's findings could be interesting for health care providers and HIE policymakers to analyze how consumers perceive the current exchange mechanisms, what concerns should be addressed, and how the exchange mechanisms could be modified to meet consumers' needs.


2013 ◽  
Vol 347-350 ◽  
pp. 3312-3316
Author(s):  
Hong Jun Chen ◽  
Xue Qin Wu

The positive factors of the cloud computing: the great commercial value, the cheap and convenient use, has been recognized widely. But there are many risks on security. These security risks will greatly restrict the development of cloud computing. Cloud security risks such as: the cloud platform is easily vulnerable, cloud resources is easily abused, the cloud platform data is accessed by unauthorized user or the data is missing, the violations in the network is difficult to trace and survey, and the service providers replacement will affect the migration of the users data and services. So we research the virtualization technology, data backup and disaster recovery technology, encryption technology of data storage and transmission, the authentication technology of service providers and users, risk assessment, and legal constraints and safety training. Our research is strived to obtain a secure cloud computing environment.


2014 ◽  
Vol 602-605 ◽  
pp. 2807-2810
Author(s):  
Quan Gang Wen

To protect the security of critical data and application system, generally, many companies or departments use a parallel way of intranet and internet. Because every kind of security technology has its limitations, traditional security products such as firewall, VPN, data encryption, intrusion detection and network vulnerability scanning can not completely solve various security problems in information exchange between different networks. It is not able to meet all the security needs of critical networks and security data with the general products only. The way of data exchange of most of the existing products of "GAP" is mainly logic isolation .This paper describes a design and implementation of a hot switch circuit card in way of physical isolation .The data exchange mode of this circuit card is a half-duplex which can physically completely isolate intranet and internet. Through functional test and performance test, we can draw a conclusion that the circuit card can effectively achieve our demand of data exchange between different networks.


Author(s):  
Alla Havrylova ◽  
Olha Korol ◽  
Stanyslav Milevskyi

The subject of the research is a mathematical model of authentication of the transmitted message based on the McEliese scheme on shortened and elongated modified elliptic codes using the modified UMAC algorithm. The aim of this work is to develop such a scheme for the information exchange over Internet commverification and integrity of the transmitted information, taking into account the prevention of an increase in the costs of the actions taken. Tasks: analysis of existing ways to increase the resistance to hacking of transmitted messages over telecommunication networks; analysis of a message transfer scheme using blockchain technology; formalized description of a mathematical model for providing clear text authentication using a modified UMAC algorithm, as the formation of key data, a crypto-code construction (CCC) is used on the McEliese scheme on modified elliptic codes (MEС); development of data encryption and decryption algorithms using CCC based on McEliese on the MEC and UMAC algorithm. Аn approach was proposed to verify the authentication and verification of the information packet during transmission and reception via telecommunication channels, which allows using already known hashing methods to compare generated codegrams and transmitted messages for their correspondence, which increases the level of cryptographic stability of the transmitted data and the reliability of the received data. The developed schemes of algorithms for generating codеgrams and their decryption using the proposed approach make it possible to gradually demonstrate the implementation of procedures for generating codegrams and their hash codes using both shortening and lengthening the code. Further research should prove from a practical point of view the effectiveness of using this approach when transmitting a message regarding the preservation of its integrity and authenticity. Therefore, it is necessary to develop a test system that should implement the proposed approach, as well as evaluate the results obtained.unication channels, which would ensure the proper level of


Pervasive computing evolved tremendously as an exciting new paradigm to provide data collection, computing, and communication services all the time and everywhere. It has introduced a new world of computing and became an integral part of many fields and application domains. It allows users to interact with wired and wireless networks that support any information technology. In spite of many advantages associated with pervasive computing, communication services have some security risks. For sensitive and confidential data there should be some security mechanisms. In this paper, we present privacy issues and challenges that are preventing people from adopting the pervasive computing environment and we give a survey on the solutions that have been carried to minimize risks


2021 ◽  
Vol 4 (1) ◽  
pp. 50-56
Author(s):  
Devlin Iskandar Saragih ◽  
Paska Marto Hasugian

One of the algorithms in cryptography that can be used for school database security is the IDEA (International Data Encryption Algorithm) algorithm. The IDEA algorithm is one of the cryptographic algorithms that has various applications in secure data transmission in the scope of networks and distributed measurement systems. Encryption results appear in the form of a notepad. The Open data button is used to find data that will be used for the encryption process. The key checklist is used to input the key length that will be used for the encryption decryption security process. The system displays the IDEA Cryptographic key, can use the IDEA Cryptographic key, the encryption and decryption change process is clearly visible. Encryption is done on the SMK Pembangunan school database with IDEA algorithm and designing the student database encryption application based on the name of the SMK Pembangunan using Visual Basic programming language.


Author(s):  
Achmad Fanany Onnilita Gaffar ◽  
Rheo Malani ◽  
Arief Bramanto Wicaksono Putra

In principle, the image encryption algorithm produces an encrypted image. The encrypted image is composed of arbitrary patterns that do not provide any clues about the plain image and its cipher key. Ideally, the encrypted image is entirely independent of its plain image. Many functions can be used to achieve this goal. Based on the functions used, image encryption techniques are categorized into: (1) Block-based; (2) Chaotic-based; (3) Transformation-based; (4) Conventional-based; and (5) Miscellaneous based. This study proposes a magic cube puzzle approach to encrypt an 8-bit grayscale image. This approach transforms a plain image into a particular size magic cube puzzle, which is consists of a set of blocks. The magic cube puzzle algorithm will diffuse the pixels of the plain image as in a Rubik’s Cube game, by rotating each block in a particular direction called the transposition orientation. The block’s transposition orientation is used as the key seed, while the generation of the cipher key uses a random permutation of the key seed with a certain key length. Several performance metrics have been used to assess the goals, and the results have been compared to several standard encryption methods. This study showed that the proposed method was better than the other methods, except for entropy metrics. For further studies, modification of the method will be carried out in such a way as to be able to increase its entropy value to very close to 8 and its application to true color images. In essence, the magic cube puzzle approach has a large space for pixel diffusion that is possibly supposed to get bigger as a series of data has transformed into several magic cubes. Then, each magic cube has transposed with a different technique. This proposed approach is expected to add to a wealth of knowledge in the field of data encryption.


Author(s):  
Shuying Wang ◽  
Jizi Li ◽  
Shihua Ma

In this paper, by analyzing the characteristics of data exchange process of SaaS-based collaboration supporting platform for industrial chain, a dynamic and secure business data exchange model for the platform is established. On this basis, methods for business data automatic obtain and format conversion, client authentication based on encryption lock and SOAP extension, business data encryption based on public key of the platform, and instant key created by client is discussed. The implementation of these methods is studied based on a .NET environment. Furthermore, the dynamic and secure business data exchange model is used in the SaaS platform of the automotive industry chain and SaaS platform of the injection industry chain, as it meets the multi-source and heterogeneous information exchange requirements.


Sign in / Sign up

Export Citation Format

Share Document