Font Size: a A A

Research And Design Of The Database Encryption Techniques Base On C/S Structure

Posted on:2007-09-18Degree:MasterType:Thesis
Country:ChinaCandidate:L X ChangFull Text:PDF
GTID:2178360185950033Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Computer security now has been the focus of information community. Therefore, how to assure and enhance the security of database has been the hot topic which is expected to be solved urgently.The key technology dealing with information security is encryption, decryption and authentication. This paper introduces and deeply researches the basic theory and application of symmetrical and asymmetrical cryptography .In order to solve the database encryption, this paper also puts forward a scheme named Security Database System, whose core is CA authentication and Information encryption.There are some differents between database encrypt and files encrypt, there are demand and characteristic of itself compared with traditional encrypt technical .The traditional encrypt algorithm use message as unit encrypt or decrypt it from begin to end. We must decrypt the records quickly when it is in conformity and has been retrieved. Specifically, the contribution of this paper includes:(1) Provides the full solution of database encryption on any database system. The encryption of database is performed in the way that plus the encryption system over the DBMS, sensitive data is encrypted in the unit of segment. The way of database encryption is feasible and can be used for reference.(2) Adopts the CA authentication mode, and combines the user certificate and Role Based Access Control, which enhances authentication and simplifies the way of access control.(3) Brings forward the ways of the user certificate management and two-layer privacy key's management, which ensures the reality and credibility of the privacy key and realizes the dynamic management of the privacy key.(4) Realizes the data encryption by IDEA arithmetic and RSA arithmetic in theDesign and Implementation, which ensures the intensity of encryption.(5) The Database Encrypt System, which is built on the three-tier C/S mode, has the properties such as high efficiency, easy to maintain, security etc.This paper uses the JCE package of Java language and the encrypt database is SQL Server.
Keywords/Search Tags:Database, Symmetrical Encryption Algorithm, Dissymmetrical Encryption Algorithm, Double Encryption Key
PDF Full Text Request
Related items