Font Size: a A A

Strength Analysis Of Ciphertext Database Security And Database Encryption Algorithm, Sub-key Generation Study

Posted on:2009-06-06Degree:MasterType:Thesis
Country:ChinaCandidate:H LiFull Text:PDF
GTID:2208360248453078Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer networks and communication technology, computers are widely used in the political, economic, military, and science technology, People's dependence on information systems increase highly. In many information systems, Because of storage a large number of important information and data, databases become a part of the core of these systems. However, in the application environment of network, the ways how to access the system are varied, Database system faces many threats, such as some non-authorized users may bypass the access control mechanisms of system to intrusion the database, Illegal access to data; the medium what store the data is lose, result in the data are leaked in database; Internal management make use of their own competence to misconduct and so on. The issue of information security has drawn extensive attention increasingly. How to ensure that sensitive information and data in database was not access and updated with illegal and unauthorized, so prevent data leakage and loss becomes particularly important.The existing technological conditions, the most effective way to protect the sensitive information and data in database is that to encrypt them after storage to the database, even if somebody are unlawful invasion into the system or steal the medium what stores data, illegal access to data and information, but because they did not know the encryption mechanism of database, no corresponding decryption keys, thus unable to encrypted data and information crack. Therefore, it is very important significance mat to encrypt database to ensure the security of data.This paper aims to design a database encryption system with strongly practical application and implementation of the project makes use of the existing encryption technology and database technology. And the project should have security, reliability and practical, truly become data protection barriers.In this paper, using middleware technology, through dynamically generated work key, using two key management methods, analysis of security vulnerabilities and strategy of database, basically to achieve the requirements of security access the database.
Keywords/Search Tags:Database, encryption, middleware, ADO.NET, algorithms, key management, dynamic key, data types
PDF Full Text Request
Related items