Font Size: a A A

Research Of The Database Encryption Techniques Based On C/S Structure

Posted on:2016-07-22Degree:MasterType:Thesis
Country:ChinaCandidate:X W CaiFull Text:PDF
GTID:2308330461957088Subject:Mechanical and electrical engineering
Abstract/Summary:PDF Full Text Request
With the development of computer technology, database as a platform for storage and sharing of information system, its security has increasingly become a serious problem in the field of information systems. The existing security measures of the current database, including safety pre-warming, network firewall, access control, but in recent years, database spill occurred frequently, The main reasons that internal personnel for some reason and loopholes in the database system management cause leakage of information.To assure the security of data in the database is an important way to encrypted database, the database through the encryption, its security has been greatly improved. But the data type, length, storage space and so on need to be resolved after the plaintext is encrypted, and database management system does not recognize the ciphertext in the library, it is not possible to realize data ciphertext query, the database decrypted and then query that greatly reduces the efficiency of the system, seriously affecting the availability of the database.Based on the consideration of the efficiency of database, database encryption generally chooses the symmetric encryption algorithm. In symmetric encryption algorithm, each encryption granularity use a key, the entire database will need a lot of the keys and use the same key for encrypting and decrypting; In the database encryption technology, the symmetric encryption algorithm is public, and whether the ciphertext data security depends on the security of the encryption key, which involves a lot of key management issues to the database.This article is mainly from the security and efficiency of database. Security has been deeply discussed. The specific contribution as follows:1) In depth analysis of the encryption algorithm and the database encryption technology.2) Put forward the multilevel key management and certificate management measures, so as to ensure the safety and reliability of the key.3) To improve the safety and efficiency of aigorithm, the AES algorithm and the RSA algorithm is improved.4) To ensure the data with encryption strength enough,we use the AES aigorithm and RSA algorithm to achieve the encryption of data.
Keywords/Search Tags:Database encryption, Key management, AES aigorithm, RSA aigorithm
PDF Full Text Request
Related items