Font Size: a A A

Research And Implementation Of Database Encryption Technology In BLE Access Control System

Posted on:2018-11-17Degree:MasterType:Thesis
Country:ChinaCandidate:Z W QianFull Text:PDF
GTID:2348330518968781Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
The popularity of computers and smart phones accelerate the generation and dissemination of information.Information,has become one of the most important asset.Therefore,information security is suffering an unprecedented threat.With the development and application of database technology,the database becomes the gathering place of information.As the core part and the center of information storage and interaction,the traditional security measures can not guarantee the security of data storage.The database encryption is the last guardian.It converts the data into ciphertext data,and then store it.So,the data will not leak when it loses.This paper,for the BLE access control system,researched the database encryption technology.On the encryption algorithm,this article analyzes the design principles and encryption process of DES,3DES,AES symmetric encryption algorithm and RSA asymmetric encryption algorithm.In this paper,a simple encryption and decryption software is designed,and then 3DES and AES algorithm are used to encrypt different sizes of text files,comparing their efficiency.The advantages of AES algorithm are proved.At the same time,according to threats that the AES of each round keys can be upward or downward derived,this paper improves the AES key expansion algorithm,and reduces the correlation between each round of the key.After using Java programming and testing,the operation efficiency of two kinds of extended algorithm are almost close to.On the basis of not affecting encryption and decryption,it further ensures the the safety of AES.For the database encryption of BLE access control system,this paper uses a hybrid encryption system,that is to say it uses AES algorithm to encrypt and decrypt the data,and uses RSA algorithm to protect the AES key.On the one hand,it protects the security of AES algorithm.On the other hand,it avoids the shortcomings of the RSA algorithm,such as the too long key,the not high efficiency.In addition,according to the key management of the hybrid encryption system,the encryption dictionary is designed.After analysis of encryption and decryption process,using Java programming and JCE cooperation way realizes the design of encryption and decryption engine.This paper completed the BLE access control system design and development with the Java programming language,MyEclipse development environment and Navicat visual management for MySQL.By using the method of field level encryption granularity andDBMS outer layer encryption,it completed the design and implementation of the encryption design in the system.Finally,the results show that the design of the database encryption system is effective in the BLE access control system,which ensures the security and reliability of the data.
Keywords/Search Tags:database encryption, encryption algorithm, key, field
PDF Full Text Request
Related items