Encryption algorithms for databases

Authors

  • Doina FUSARU Prof. Ph.D. Faculty of Financial-Accounting Management Spiru Haret University
  • Mariuţa ŞERBAN Assist. Prof. Ph.D. student Faculty of Financial-Accounting Management Spiru Haret University

Keywords:

encryption algorithms, database security, crypto-graphically, cipher

Abstract

For most cases, people use an ecrypted mode when sending personal information to a server, via an electronic form.  Whenever shopping is done online, the browser uses cryptographic methods to send to the server the credit card number and private information. Thanks to the surprising development of the Internet, and not to the structural models (OSI and TCP/IP) this technology is based on, the electronic commerce requires quality, security, reliability and, above all, the possibility of implementing all such concepts. It is interesting that none of the widely used cryptographic systems is mathematically demonstrated to be safe. As a matter of fact, the entire technology of cryptography is based on mathematical problems that are still unanswered to.Looking at the above, the study of the cryptographic and security methods, as well as finding strong crypto-systems is still a pivotal issue.

References

• Scout Oaks, Java Security, O’Reilly USA, May, 2001.

• Roşca Ion Gh., Comerţul electronic, concepte tehnologii şi aplicaţii, Editura Economică, 2004.

• Barefoot Coy, Revoluţia comerţului electronic, Amaltea Publishing House, 2004.

• Menezes A., Handbook of Applied Cryptography, CRC Press Inc. Publishing House, 1997.

• Young Adam, Malicious Cryptography, John Wiley & Sons Inc. Publishing House, 2004.

• Patriciu Victor Valeriu, Securitatea comerţului electronic, All Publishing House, 2001.

• Mao Webno, Modern Cryptography: Theory and Practice, Prentice Hall Publishing House, 2003.

• Cobb Chey, Cryptography for Dummies, John Wiley & Sons Publishing House, Inc. 2004.

• Piper Fred, Cryptography: A Very Short Introduction, Oxford University Press Publishing House, 2005.

• MSDN Library Security.

Downloads

Published

2010-06-30

How to Cite

FUSARU, D., & ŞERBAN, M. (2010). Encryption algorithms for databases. Annals of Spiru Haret University. Economic Series, 10(2), 207–214. Retrieved from https://anale.spiruharet.ro/economics/article/view/10223

Issue

Section

ACADEMIA PAPERS