Font Size: a A A

Research And Application Of Database Encryption Technology Based On B/S Architecture

Posted on:2016-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:G L HuangFull Text:PDF
GTID:2298330467488356Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Nowadays, computers have had huge impact on people’s life. There are a lotof information security problems existing in the computer, such as stealing andmodifying the sensitive information, it has been concerned by many academics.The key of information’s safety is ensuring the security of the database. Databasesystem play an important role in the center position in the computer informationsystem. At the same time, the data and lots of user information in database mustbe protected majorly. Currently, people are most concerned about is how toprotect the security of the data.In this article, introducing an optimized encryption algorithm of advancedencryption standard encryption to realize data encryption. Taking into account theprevious iterations AES algorithm which is less than88, cannot reach themaximum cycle; affine transformation cycle cannot meet the maximum, I proposean improved scheme that the new S box is construced by a mechanism which isthrough affine transformation to multiplicative inverse then to affinetransformation. It is proved that the new S box enhances the ability of againstattact because the iterative output cycle, affine transformation and the number ofexpression have better algebraic properties.This paper constructs a DSP model based on the B/S structure, the DSPmodel is similar to the B/S in structure and C/S in data flow, ensure that the userhold the dominant position.DSP model combines the advantages of the twoeffectively. Finally, the improved encryption algorithm is applied to the database,using Java,Eclipse, SQLservr and other tools to give the code programming of theentire database encryption implementation process.It proves that useing databaseencryption technology can effectively protect data and user information.
Keywords/Search Tags:AES encryption algorithm, DSP model, database encryption
PDF Full Text Request
Related items