Font Size: a A A

Database For Encryption And Decryption Key Technology Research

Posted on:2010-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:H S XuFull Text:PDF
GTID:2178330332987689Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Construction of the database is an important foundation for information systems, database security has become an important information security research field. At present most of the database are stored in clear text and there is no authentication mechanism, using a general authentication and access control and identification technology and can not fully guarantee the security of the database. This paper discusses the data to the database stored ciphertext and the corresponding authentication mechanism.Encrypted in the database, the paper analyzes a number of encryption technology has some databases that generate sub-key encryption technology, the most appropriate field. Based on this we propose an improved connections on the sub-key generation algorithm, as well as user information based on multi-level key management technology, which can generate the effective management of key sub-fields required for key encryption technology, can be adapted to the client or server-side encryption and decryption of the situation.Authentication in the database, the paper analyzes a number of others to verify some of the database technology, and presents a record of field-based verification technology. The technology to improve field-based security authentication technologies, while preserving the field-based authentication technology, flexibility and efficiency.Finally, developing a database encryption system prototype, preliminary test, running in good condition.
Keywords/Search Tags:database encryption, The structure of the database encryption system design, Database encryption algorithm, Database of key management
PDF Full Text Request
Related items