Font Size: a A A

The Research On Database Encryption Algorithm And Key Technology

Posted on:2012-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:Z H WangFull Text:PDF
GTID:2218330338965745Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the continuous development of computer technology, database systems are increasingly being applied to various fields. Because the database stores large amounts of data information, some of which involve confidential data. And because the characteristics of resource sharing database, its data and information from a wide range of security has been a huge threat. Database security has become the focus of attention, and foreign computer experts have also increased the security of the database, but have also published a number of domestic and international protection of computer information security standards. Protection of database security technology, many such as:user authentication, access control, view mechanism, database encryption, auditing functions, and database encryption is an important means to ensure database security.The main contents of this paper is on the relational database analysis and study of encryption technology. By analyzing the advantages and disadvantages of different encryption granularity, confirmed the feasibility of field size for the encryption. Field-based encryption mode, the symmetric encryption algorithms and public key encryption algorithm combining organic, multi-level key based on the idea, proposed by using symmetric encryption algorithm to generate keys to encrypt sensitive data fields, and using public key algorithm to generate the private key to protect the data key. And to enable more secure key management, the paper also proposed the use of the user's own password to protect the private key way to try to improve the system's ease of using. By a simple test model database encryption to validate the design is feasible.
Keywords/Search Tags:database encryption, encryption algorithms, key management
PDF Full Text Request
Related items