Encryption algorithms for databases
Keywords:
encryption algorithms, database security, crypto-graphically, cipherAbstract
For most cases, people use an ecrypted mode when sending personal information to a server, via an electronic form. Whenever shopping is done online, the browser uses cryptographic methods to send to the server the credit card number and private information. Thanks to the surprising development of the Internet, and not to the structural models (OSI and TCP/IP) this technology is based on, the electronic commerce requires quality, security, reliability and, above all, the possibility of implementing all such concepts. It is interesting that none of the widely used cryptographic systems is mathematically demonstrated to be safe. As a matter of fact, the entire technology of cryptography is based on mathematical problems that are still unanswered to.Looking at the above, the study of the cryptographic and security methods, as well as finding strong crypto-systems is still a pivotal issue.References
• Scout Oaks, Java Security, O’Reilly USA, May, 2001.
• Roşca Ion Gh., Comerţul electronic, concepte tehnologii şi aplicaţii, Editura Economică, 2004.
• Barefoot Coy, Revoluţia comerţului electronic, Amaltea Publishing House, 2004.
• Menezes A., Handbook of Applied Cryptography, CRC Press Inc. Publishing House, 1997.
• Young Adam, Malicious Cryptography, John Wiley & Sons Inc. Publishing House, 2004.
• Patriciu Victor Valeriu, Securitatea comerţului electronic, All Publishing House, 2001.
• Mao Webno, Modern Cryptography: Theory and Practice, Prentice Hall Publishing House, 2003.
• Cobb Chey, Cryptography for Dummies, John Wiley & Sons Publishing House, Inc. 2004.
• Piper Fred, Cryptography: A Very Short Introduction, Oxford University Press Publishing House, 2005.
• MSDN Library Security.