Encryption algorithms for databases

Doina FUSARU, Mariuţa ŞERBAN

Abstract


For most cases, people use an ecrypted mode when sending personal information to a server, via an electronic form.  Whenever shopping is done online, the browser uses cryptographic methods to send to the server the credit card number and private information. Thanks to the surprising development of the Internet, and not to the structural models (OSI and TCP/IP) this technology is based on, the electronic commerce requires quality, security, reliability and, above all, the possibility of implementing all such concepts.

It is interesting that none of the widely used cryptographic systems is mathematically demonstrated to be safe. As a matter of fact, the entire technology of cryptography is based on mathematical problems that are still unanswered to.

Looking at the above, the study of the cryptographic and security methods, as well as finding strong crypto-systems is still a pivotal issue.


Keywords


encryption algorithms, database security, crypto-graphically, cipher

Full Text:

PDF

References


• Scout Oaks, Java Security, O’Reilly USA, May, 2001.

• Roşca Ion Gh., Comerţul electronic, concepte tehnologii şi aplicaţii, Editura Economică, 2004.

• Barefoot Coy, Revoluţia comerţului electronic, Amaltea Publishing House, 2004.

• Menezes A., Handbook of Applied Cryptography, CRC Press Inc. Publishing House, 1997.

• Young Adam, Malicious Cryptography, John Wiley & Sons Inc. Publishing House, 2004.

• Patriciu Victor Valeriu, Securitatea comerţului electronic, All Publishing House, 2001.

• Mao Webno, Modern Cryptography: Theory and Practice, Prentice Hall Publishing House, 2003.

• Cobb Chey, Cryptography for Dummies, John Wiley & Sons Publishing House, Inc. 2004.

• Piper Fred, Cryptography: A Very Short Introduction, Oxford University Press Publishing House, 2005.

• MSDN Library Security.




Copyright (c) 2010 author

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


As to respect GDPR, this site do not allow free registation. Please contact us at: ashues@spiruharet.ro

GDPR Policy:

Please read the statement below:
Processing of personal data and free movement of these data

Registering with this site the author agree with the collection, processing and use of his personal data, exclusively within the ASHUES journal.


 

AWARDS 

WILL BE CONFERRED AT THE END OF THE YEAR

To crown and encourage research efforts of the authors, at the end of a year of publishing our journal board will award online the best papers by distinctions:

1. Best Original Paper Award -  for the paper that has brought something completely new in the reader's attention (a new concept, a new trend, a new proposal in research, etc.)

2. Excellence Award - for the most cited paper and visualized in the online environment during the year

3. First, Second and Third Award- for the best documented and substantiated papers during the year

4. Special Award - to award PhD students and postdocs for the most well documented and substantiated paper


Administred:Rocsana B. Manea Tonis

http://icourses.wix.com/itmk