Research Article

A Student Information Management System Based on Fingerprint Identification and Data Security Transmission

Table 1

The byte conversion table of optimized AES algorithm.

ā€‰0123456789abcdef

0637c777bf26b6f5c3001672bfed7ab76
c6f8eef6ffd6de916002ce56e7b54dec
a584998d0dbdb1549003a97d1962e69a

1ca82c97dfa5947f0add4a2af9ca472c0
8f1f89faefb28efb41b35f452353e49b
459d408715ebc90bec67fdeabff7965b

2b7fd9326363ff7cc34a5e5f171d83115
75e13d4c6c7ef5836851d1f9e2ab622a
c21cae6a5a41024f5cf434089373533f

304c723c31896059a071280e2eb27b275
0895469d30370a2f0e241bdfcd4e7fea
0c52655e28a10fb509369b3d2669cd9f

409832c1a1b6e5aa0523bd6b329e32f84
121d583436dcb45ba476b77d52dd5e13
1b9e742e2db2eefbf6d461ce7b3e7197

553d100ed20fcb15b6acbbe394a4c58cf
a6b902c140e379b6d48d67729498b085
f568022c601fc8edbe46d94bded4e84a

6d0efaafb434d338545f9027f503c9fa8
bbc54fed869a66118ae904fea078254b
6b2ae516c5d75594cf100681f044bae3

751a3408f929d38f5bcb6da2110fff3d2
a25d80053f2170f16377af2420e5fdbf
f3fec08aadbc4804dfc17563301a0e6d

8cd0c13ec5f974417c4a77e3d645d1973
811826c3be35882e9355fc7ac8ba32e6
4c14352fe1a2cc3957f28247ace72b95

960814fdc222a908846eeb814de5e0bdb
c0199ea344543b0b8cc76b28a7bc16ad
a098d17f667eab83ca29d33c79e21d76

ae0323a0a4906245cc2d3ac629195e479
db647414920c48b89fbd43c43931d3f2
3b564e1edb0a6ce45d6eefa6a8a4378b

be7c8376d8dd54ea96c56f4ea657aae08
d58b6eda01b19c49d8acf3cfcaf44710
324359b78c64d2e0b4fa0725af8ee918

cba78252e1ca6b4c6e8dd741f4bbd8b8a
6ff04a5c38577397cba1e83e96610d0f
d5886f7224f1c751237c9c21dddc8685

d703eb5664803f60e613557b986c11d9e
e07c71cc9006f71cc26aae6917993a27
9042c4aad8050112a35ff9d0915827b9

ee1f8981169d98e949b1e87e9ce5528df
d9eb2b22d2a907332d3c15c987aa50a5
3813b333bb7089a7b622922049ff787a

f8ca1890dbfe6426841992d0fb054bb16
0359091a65d784d042295a1e7ba86d2c
8ff88017da31c6b8c3b07711cbfcd63a