Research Article
Research on Enterprise Financial Accounting Information Security Model Based on Big Data
Table 2
Memory usage for encrypting transmitted data using the three methods/%.
| Packet number | Proposed | DES data encryption algorithm | ECC data encryption algorithm |
| Group 1 | 5.7 | 12.7 | 17.5 | Group 2 | 5.4 | 18.6 | 16.7 | Group 3 | 4.8 | 14.8 | 21.3 | Group 4 | 5.3 | 15.6 | 15.3 | Group 5 | 5.2 | 16.4 | 22.7 |
|
|