Font Size: a A A

Database Cryptograph Index And Secret Key Management Technology

Posted on:2008-04-18Degree:MasterType:Thesis
Country:ChinaCandidate:D WangFull Text:PDF
GTID:2178360212495265Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Cryptograph index in database and secret key management are emphasis and difficult points on the research of database encryption. At present, it is the beginning of studying on cryptograph index in database and secret key management, which are juvenile in every respect and have some limitation. This paper analyzed synthetically the above-mentioned technologies, on the basis of which a new way of constructing cryptograph index and creating secret key was proposed, the details was stated as follows.Firstly, the technology of constructing cryptograph index using bucket partition was studied. By analyzing and comparing synthetically the cryptograph operation in being, combining with the technology of secret homeostasis, a new way named multiple cryptograph index was proposed, which can take on comparisons of cryptograph data directly and provided with better security intensity and query efficiency.Secondly, the technology of determination and clearing up to the leak of cryptograph index information were studied. This paper introduced the determination term, K- cryptonym, which is used in view security, to the determination of security of cryptograph index sequence. And two projects were proposed to clear up effectively the information leak resulted from constructing cryptograph index by constructing Hash function, carrying out bucket partition to multiple-sensitive property and creating cryptograph index.Thirdly, the technology of balance between the security and the query efficiency of cryptograph index was studied. This paper proposed an optimal bucket partition strategy, which can get an optimal query target-shoot and less query cost by using bucket partition to create cryptograph index, so as to get a balance between the security and the query efficiency of cryptograph index inthe case of that the amount of sub region using bucket partition is limited, because the security is requested.Lastly, the technology of secret key is studied. Owing to redundant secret key, worse security and difficulty in management at the moment that the encryption granularity at a rank of data item is used, a mode of creating secret key dynamically was proposed, and a theory test was given to validate the security and validity of this mode.
Keywords/Search Tags:Cryptograph Index, Secret Key Management, Bucket Partition, Information Leak, Query Target-Shoot
PDF Full Text Request
Related items