{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T07:24:18Z","timestamp":1767165858604,"version":"build-2238731810"},"reference-count":35,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T00:00:00Z","timestamp":1622764800000},"content-version":"vor","delay-in-days":154,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Education Department Fujian Province 2020 Youth and Middle-Aged Teacher Education Research Project","award":["JAS20210"],"award-info":[{"award-number":["JAS20210"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>With the application of computer and network technology in the field of accounting, the development of accounting informationization is an inevitable trend, and the construction of accounting statement data into the data warehouse will be the basis of intelligent decision\u2010making. The complexity of industry accounting statements and the arbitrariness and diversity of users\u2019 needs for obtaining information using statements limit the development, popularization, and application of industry accounting statements. As a block encryption algorithm, the Data Encryption Standard (DES) algorithm uses 64\u2010bit packet data for encryption and decryption. Each eighth bit of the key is used as a parity bit; that is, the actual key length is 56 bits. Encryption and decryption use the same algorithm structure, but the order in which the subkeys are used is reversed. Under the control of the subkey, inputting 64\u2010bit plaintext can produce 64\u2010bit ciphertext output; otherwise, inputting 64\u2010bit ciphertext can produce 64\u2010bit plaintext output. The confidentiality of the DES algorithm depends on the key, and only a very small number of keys are considered weak keys, which can be easily avoided in practical applications. The 3DES algorithm is a cascade of the DES algorithm, and its encryption process is based on the DES algorithm principle. This article explains the encryption process of the DES algorithm and introduces the composition of the 3DES algorithm. The experimental results show that the 3DES encryption algorithm still has a better encryption effect and \u201cavalanche effect\u201d than before the improvement. In addition, for the 3DES algorithm, its encryption efficiency has not been greatly affected. The 3DES encryption algorithm achieves one encryption process at a time to some extent, can effectively resist exhaustive search attacks, and enhance the security of the DES algorithm.<\/jats:p>","DOI":"10.1155\/2021\/7212688","type":"journal-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T18:50:05Z","timestamp":1622832605000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["[Retracted] Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7438-556X","authenticated-orcid":false,"given":"Meixi","family":"Chen","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.07.452"},{"key":"e_1_2_10_2_2","first-page":"558","article-title":"Improving the security of Internet of Things using encryption algorithms","volume":"11","author":"Safi A.","year":"2017","journal-title":"International Journal of Computer and Information Engineering"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijcc.2019.10025552"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.3923\/jeasci.2018.2382.2387"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4333-y"},{"key":"e_1_2_10_6_2","first-page":"28","article-title":"Secure data sharing on cloud using tripel-DES algorithm","volume":"4","author":"Bhagat A.","year":"2020","journal-title":"International Journal of Advent Research in Computer and Electronics"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.48161\/qaj.v1n2a38"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.31202\/ecjse.571030"},{"key":"e_1_2_10_9_2","first-page":"2026","article-title":"A new security mechanism for VCC based on the newly modified structure of DES-3L algorithm using FC system","volume":"7","author":"Kumar A. S.","year":"2020","journal-title":"European Journal of Molecular & Clinical Medicine"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-018-0386-3"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2017.1419835"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3063127"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.4018\/ijmdem.2021040104"},{"key":"e_1_2_10_14_2","first-page":"129","article-title":"A comparative study on homomorphic encryption algorithms for data security in cloud environment","volume":"11","author":"Devi P.","year":"2020","journal-title":"International Journal of Electrical Engineering & Technology"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-021-06206-8"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.10.009"},{"key":"e_1_2_10_17_2","first-page":"10788","article-title":"Design and implementation of crypto based water marking techniques for EHR security","volume":"82","author":"Srivastava J. G. M.","year":"2020","journal-title":"Test Engineering and Management"},{"key":"e_1_2_10_18_2","first-page":"75","article-title":"Cloud computing data security using encryption algorithms","volume":"10","author":"Rithvik K.","year":"2019","journal-title":"IIOAB Journal"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00438-y"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.06.010"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7453-3"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1177\/0165551518787699"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02535-5"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v17i6.13201"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2976782"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2020edl8147"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.2118\/205014-PA"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2020.105240"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2018.2855047"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.001.1900301"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3026191"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899x\/745\/1\/012039"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.3012393"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-179821"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2018.5654"}],"updated-by":[{"DOI":"10.1155\/2023\/9856582","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T00:00:00Z","timestamp":1692144000000},"record-id":"50794"},{"DOI":"10.1155\/2023\/9856582","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T00:00:00Z","timestamp":1692144000000}}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/7212688.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/7212688.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/7212688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T18:32:25Z","timestamp":1723228345000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/7212688"}},"subtitle":[],"editor":[{"given":"Zhihan","family":"Lv","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/7212688"],"URL":"https:\/\/doi.org\/10.1155\/2021\/7212688","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-04-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-20","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7212688"}}