Font Size: a A A

The Study Of Redundancy Encryption And Application

Posted on:2013-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y X WangFull Text:PDF
GTID:2248330392453332Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Information technology has played an important role in our lives with the rapiddevelopment of science and technology. Electronic Commerce security problem hasbecome a vital issue to everybody while E-Commerce showing its power on oureconomy. Solving the information security problem of quotation system is significantto that of E-Commerce as it is one of most important parts of E-Commerce.Based on analysis the characteristics of the two important parts of quotation system,this thesis applied Redundancy Encryption to quotation system. We use AESalgorithm as the base encryption algorithm of the new redundancy encryption plan.AES makes sure of the security of our plan as it’s the best encryption algorithm of theworld.Encryption ensures the confidentiality of sensitive data, but it will degradesystem performance for data losing all original characteristics makes databasemanagement system have to decrypt all cipher data before executing query process.This thesis proposes a practical technique to store and organize encrypted data tosolve this problem. The later experiment shows that this approach greatly increasesquery speed, therefore improves the quotation system performance. New approachgives different strategies of redundancy: using salt and B+tree for quotation databasesystem; using compression, salt and check code for quotation files to improve thetransmission performance and data accuracy and integrity.In the end, a lots of tests and simulations is carried out to verify the systemperformance of the redundancy encryption approach we designed. It shows thatsystem performs well after data being redundancy encrypted.
Keywords/Search Tags:redundancy encryption, database encryption, encryption algorithm, checkcode, commpression algorithm
PDF Full Text Request
Related items