CN101320409A - Database encryption method based on Chinese remainder theorem - Google Patents

Database encryption method based on Chinese remainder theorem Download PDF

Info

Publication number
CN101320409A
CN101320409A CN 200810063098 CN200810063098A CN101320409A CN 101320409 A CN101320409 A CN 101320409A CN 200810063098 CN200810063098 CN 200810063098 CN 200810063098 A CN200810063098 A CN 200810063098A CN 101320409 A CN101320409 A CN 101320409A
Authority
CN
China
Prior art keywords
key
database
encryption
data
circleplus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200810063098
Other languages
Chinese (zh)
Other versions
CN100576226C (en
Inventor
陈庆章
戴国勇
陈遥
莫建华
王一娇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN 200810063098 priority Critical patent/CN100576226C/en
Publication of CN101320409A publication Critical patent/CN101320409A/en
Application granted granted Critical
Publication of CN100576226C publication Critical patent/CN100576226C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

A database encryption method based on Chinese residue theorem is provided, which comprises the following procedures: (1) Designating and storing a global key in the system table of the database; (2) Formulating and storing a table key and a key for each field in the system table of the database; (3) Generating a random record key for each piece of record in storing the data and completing the encrypted storage of data by combining the global key, the table key and the field key as well as transferring the encryption algorithm. Therefore, the invention provides a database encryption method that is based on Chinese residue theorem and can effectively enhance the deciphering efficiency.

Description

Database encryption method based on Chinese remainder theorem
Technical field
The present invention relates to a kind of database encryption method.
Background technology
Current information society, each enterprise, government organs and military service all extensively adopt database application system to store various data and data.Quite a few is arranged in these data is confidential information, these confidential datas are if store easily by opponent's unauthorized theft with form expressly, thereby enterprise is caused enormous economic loss, and the loss that confidential information is leaked for government, military service will be catastrophic.Therefore be necessary these confidential datas are taked necessary safeguard measure, even if the opponent steals the definite implication that these data also can't be known these data.
Usually can adopt technology such as fire wall, intrusion detection and authentication on different levels, to come the safety of protected data storage in the database application system.Yet for experienced hacker, these safeguard measures of Gonna breakthrough are not to be difficult to; Can not avoid directly stealing the data leak that data storage medium brings in addition.Data are encrypted the best method that storage is the protection confidential data.
Existing database encryption technology mainly contains based on the encryption of file and based on the encryption two big classes of data item.But this two class is encrypted and is all come with some shortcomings.Based on the data base encryption of file be database file as a complete unit, utilize encryption key and corresponding cryptographic algorithm to encrypt, thus the integrality of protected data and confidentiality.But adopt this method no matter database manipulations such as modification or increase, deletion all must be encrypted entire database deciphering earlier again, greatly increased on time and the space expense.Therefore, abandoned substantially based on file ground database encryption technology in actual use.And meet the characteristic of database based on the encryption of data item, relatively be fit to the data base encryption operation.But owing under the sizable situation of data volume in the database, each data item content is all moved a cryptographic algorithm (for example traditional DES algorithm), performance loss is in time well imagined; This in addition method is generally each data item and will specifies different keys in order to make the assurance secret key safety, and data volume is big more just to mean that the quantity of key is big more, and this has also brought great difficulty to key management.
The data base encryption scheme can be divided into two kinds again from technology realizes: the one, realize encryption function in the database core, and this method fulfillment database is more up hill and dale encrypted and checking, and efficient is also higher, but a certain Database Systems of must combining closely.Another kind method is to have expanded the encryption and decryption functional layer outside the database core, and the user can use the database that has encryption function by this functional layer, and this implementation can make the different Database Systems of product support.
Summary of the invention
The invention provides a kind of database encryption method based on Chinese remainder theorem that can effectively improve encryption and decryption efficient.
The technical solution adopted for the present invention to solve the technical problems is:
A kind of database encryption method based on Chinese remainder theorem, described database encryption method may further comprise the steps:
(1), the specified database global secret, and be saved in system's table of database;
(2), named list key and each field key, and be saved in system's table of database;
(3), for each bar record produces a record key at random, and binding data storehouse global secret, table key and field key call cryptographic algorithm and finish the encryption of data and store during data in storage, the processing procedure of cryptographic algorithm comprises:
(3.1), dynamically produce data item key: K by key generator Ij=g (DBK, TK, R i, F j), wherein DBK is the database global secret, TK is table key, R iBe i record key, F jBe j field key; G is an one-way function on the cryptography, and it is defined as: g ( DBK , TK , R i , F j ) = MD 5 ( DBK ⊕ TK ⊕ R i ⊕ F j ) , MD5 is meant the MD5 algorithm in the cryptography,
Figure A20081006309800062
Expression step-by-step XOR;
(3.2), generate one group of positive integer (d of prime number each other in twos at random 1, d 2, d 3... d i... d n), 1≤i≤n calculates D = Π i = 1 n d i , D i = d / d i , ∏ represents product calculation, and chooses Y iSatisfy D iY i=1 (mod d i), mod represents modulo operation; Make e i=D iY i(1≤i≤n), with (e 1, e 2, e 3... e i... e n) as the real encryption key of record, and (d 1, d 2, d 3... d i... d n) be real decruption key;
(3.3), carry out the encryption formula: C = Σ j = 1 n e j ( F ij ⊕ K ij ) ( mod D ) , F wherein IjBe plaintext value, C is the ciphertext value, and ∑ is represented summation operation;
(4), during reading of data, read key, call decipherment algorithm and finish the reading of data process, the processing procedure of decipherment algorithm is from system's table of database:
(4.1), the cipher key calculation K that reads according to system's table Ij, computation process is with (3.1)
(4.2), carry out the deciphering formula: F ij = C ( mod d i ) ⊕ K ij ( 1 ≤ i ≤ n ) .
Adopt (separating) close pattern of transparent adding, outside the database core, increase an encryption and decryption layer in order to finish all encryption and decryption operations.
Technical conceive of the present invention is: at first, according to Chinese remainder theorem, be no longer necessary for cryptographic algorithm of each data item operation, and only need be to cryptographic algorithm of whole record operation, compare the number of times that has directly reduced the operation cryptographic algorithm with the data item cipher mode, thereby improve the time performance of encrypting; Secondly, data item is encrypted the back ciphertext and ciphertext is one to one, and this programme is encrypted the corresponding ciphertext of the whole record in back, thereby has destroyed the expressly corresponding relation between the ciphertext, has also improved safety of data to a certain extent.At last, adopt multilayer key management mode dynamically to generate the problem that key has effectively solved cipher key management difficult.
Beneficial effect of the present invention mainly shows: 1, can effectively improve encryption and decryption efficient; 2, dynamically generate the complicacy that key reduces key management.
Description of drawings
Fig. 1 is the principle schematic based on the database encryption method of Chinese remainder theorem.
Fig. 2 creates the database synoptic diagram for the user.
Fig. 3 is the enciphering and deciphering algorithm process flow diagram based on the data base encryption of Chinese remainder theorem.
Embodiment
Below in conjunction with accompanying drawing the present invention is further described.
With reference to Fig. 1~Fig. 3, a kind of database encryption method based on Chinese remainder theorem, described database encryption method may further comprise the steps:
(1), the specified database global secret, and be saved in system's table of database;
(2), named list key and each field key, and be saved in system's table of database;
(3), for each bar record produces a record key at random, and binding data storehouse global secret, table key and field key call cryptographic algorithm and finish the encryption of data and store during data in storage, the processing procedure of cryptographic algorithm comprises:
(3.1), dynamically produce data item key: K by key generator Ij=g (DBK, TK, R i, F j), wherein DBK is the database global secret, TK is table key, R iBe i record key, F jBe j field key; G is an one-way function on the cryptography, and it is defined as: g ( DBK , TK , R i , F j ) = MD 5 ( DBK ⊕ TK ⊕ R i ⊕ F j ) , MD5 is meant the MD5 algorithm in the cryptography,
Figure A20081006309800072
Expression step-by-step XOR;
(3.2), generate one group of positive integer (d of prime number each other in twos at random 1, d 2, d 3... d i... d n), 1≤i≤n calculates D = Π i = 1 n d i D i = d / d i , ∏ represents product calculation, and chooses Y iSatisfy D iY i=1 (mod d i), mod represents modulo operation; Make e i=D iY i(1≤i≤n), with (e 1, e 2, e 3... e i... e n) as the real encryption key of record, and (d 1, d 2, d 3... d i... d n) be real decruption key;
(3.3), carry out the encryption formula: C = Σ j = 1 n e j ( F ij ⊕ K ij ) ( mod D ) , F wherein IjBe plaintext value, C is the ciphertext value, and ∑ is represented summation operation;
(4), during reading of data, read key, call decipherment algorithm and finish the reading of data process, the processing procedure of decipherment algorithm is from system's table of database:
(4.1), the cipher key calculation K that reads according to system's table Ij, computation process is with (3.1)
(4.2), carry out the deciphering formula: F ij = C ( mod d i ) ⊕ K ij ( 1 ≤ i ≤ n ) .
Adopt (separating) close pattern of transparent adding, outside the database core, increase an encryption and decryption layer in order to finish all encryption and decryption operations.
The concrete course of work of present embodiment is:
At first, the user creates database, and acquiescence is created system's table when creating database, is used to deposit whether follow-up data encrypt and information such as encryption key; While specified database level key.
The user designs the tables of data that needs, and defines sensitivity (secret) information field in this table, and these fields will be encrypted storage in database, and other information will be stored with the plaintext form.For example: define certain enterprise staff information table, may include fields such as employee's name, sex, age, position, technical title, affiliated function, monthly pay.Monthly pay in these fields, age may be sensitive information for the employee, so just can define this two field encryption storages.Also be these two field specific field keys simultaneously.
When database adds data, determine according to encryption indicator in system's table whether this field encrypts storage, encrypt storage if desired and then call cryptographic algorithm generation ciphertext and storage according to the key in system's table.This process is transparent to the user.
Equally, also determine according to the encryption indicator in system's table whether needs are decrypted processing during data query.If query portion field information then do not need whole record is decrypted only.In above-mentioned example, if inquiry employee's name, sex, monthly pay information, according to the encryption indicator in system's table as can be known name and sex all be stored in clear, do not need decryption processing; Monthly pay is to encrypt storage, need call decipherment algorithm and be decrypted.Another encrypted fields age is not queried to does not just need to be decrypted processing.This process also is transparent concerning the user.
The disabled user walks around the encrypt data that can only obtain not having practical significance when the encryption and decryption parts are stolen data.
The computation process of enciphering and deciphering algorithm more specifically, can be described with following example.All directly use the value type data in the computation process example for describing more compactly, other categorical data can be got two bytes successively according to binary data and carry out similar calculating.
Algorithm computation process example: suppose that cryptographically a plaintext records three fields formations, their value is respectively: F 1=5, F 2=6, F 3=2; Producing an ergin number at random is: d 1=31, d 2=37, d 3=41; The K that key generator generates 1=11, K 2=22, K 3=33, be calculated as follows so:
Preparation is calculated:
D=d 1*d 2*d 3=47027;
D 1=D/d 1=47027/31=1517;
D 2=D/d 2=47027/37=1271;
D 3=D/d 3=47027/41=1147;
Y 1=15;
Y 2=20;
Y 3=40;
e 1=D 1*Y 1=22755;
e 2=D 2*Y 2=25420;
e 3=D 3*Y 3=45880;
Carry out and encrypt formula: C = [ e 1 * ( F 1 ⊕ . K 1 ) + e 2 * ( F 2 ⊕ K 2 ) + e 3 * ( F 3 ⊕ K 3 ) ] ModD ( 5 ⊕ 11 ) + 25420 * ( 6 ⊕ 22 ) + 45880 * ( 2 ⊕ 33 )
Carry out the deciphering formula:
F 1 = ( C Mod d 1 ) ⊕ K 1 = ( 26767 Mod 31 ) ⊕ 11 = 5 ;
F 2 = ( C Mod d 2 ) ⊕ K 2 = ( 26767 Mod 37 ) ⊕ 22 = 6 ;
F 3 = ( C Mod d 3 ) ⊕ K 3 = ( 26767 Mod 41 ) ⊕ 33 = 2 .

Claims (2)

1, a kind of database encryption method based on Chinese remainder theorem, it is characterized in that: this method specifically may further comprise the steps:
(1), the specified database global secret, and be saved in system's table of database;
(2), named list key and each field key, and be saved in system's table of database;
(3), for each bar record produces a record key at random, and binding data storehouse global secret, table key and field key call cryptographic algorithm and finish the encryption of data and store during data in storage, the processing procedure of cryptographic algorithm comprises:
(3.1), dynamically produce data item key: K by key generator Ij=g (DBK, TK, R i, F j), wherein DBK is the database global secret, TK is table key, R iBe i record key, F jBe j field key; G is an one-way function on the cryptography, and it is defined as:
g ( DBK , TK , R i , F i ) = MD 5 ( DBK ⊕ TK ⊕ R i ⊕ F i ) , MD5 is meant the MD5 algorithm in the cryptography,
Figure A2008100630980002C2
Expression step-by-step XOR;
(3.2), generate one group of positive integer (d of prime number each other in twos at random 1, d 2, d 3... d i... d n), 1≤i≤n calculates D = Π i = 1 n d i , D i = d / d i , ∏ represents product calculation, and chooses Y iSatisfy D iY i=1 (mod d i), mod represents modulo operation; Make e i=D iY i(1≤i≤n), with (e 1, e 2, e 3... e i... e n) as the real encryption key of record, and (d 1, d 2, d 3... d i... d n) be real decruption key;
(3.3), carry out the encryption formula: C = Σ j = 1 n e j ( F ij ⊕ K ij ) ( mod D ) , F wherein IjBe plaintext value, C is the ciphertext value, and ∑ is represented summation operation;
(4), during reading of data, read key, call decipherment algorithm and finish the reading of data process, the processing procedure of decipherment algorithm is from system's table of database:
(4.1), the cipher key calculation K that reads according to system's table Ij, computation process is with (3.1)
(4.2), carry out the deciphering formula: F ij = C ( mod d i ) ⊕ K ij ( 1 ≤ i ≤ n ) .
2, the database encryption method based on Chinese remainder theorem as claimed in claim 1 is characterized in that: increase by one in order to finish the encryption and decryption layer of all encryption and decryption operations outside the database core.
CN 200810063098 2008-07-10 2008-07-10 Database encryption method based on Chinese remainder theorem Expired - Fee Related CN100576226C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200810063098 CN100576226C (en) 2008-07-10 2008-07-10 Database encryption method based on Chinese remainder theorem

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200810063098 CN100576226C (en) 2008-07-10 2008-07-10 Database encryption method based on Chinese remainder theorem

Publications (2)

Publication Number Publication Date
CN101320409A true CN101320409A (en) 2008-12-10
CN100576226C CN100576226C (en) 2009-12-30

Family

ID=40180453

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200810063098 Expired - Fee Related CN100576226C (en) 2008-07-10 2008-07-10 Database encryption method based on Chinese remainder theorem

Country Status (1)

Country Link
CN (1) CN100576226C (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107579987A (en) * 2017-09-22 2018-01-12 郑州云海信息技术有限公司 A kind of encryption of server high in the clouds diagnostic system rule base two level, access method and system
CN111324897A (en) * 2018-12-13 2020-06-23 中国科学院深圳先进技术研究院 Image encryption method and device and image decryption method and device
WO2022141056A1 (en) * 2020-12-29 2022-07-07 杭州趣链科技有限公司 Data transmission optimization method, apparatus and system based on chinese remainder theorem

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6959288B1 (en) * 1998-08-13 2005-10-25 International Business Machines Corporation Digital content preparation system
DE10143728B4 (en) * 2001-09-06 2004-09-02 Infineon Technologies Ag Device and method for calculating a result of a modular exponentiation

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107579987A (en) * 2017-09-22 2018-01-12 郑州云海信息技术有限公司 A kind of encryption of server high in the clouds diagnostic system rule base two level, access method and system
CN111324897A (en) * 2018-12-13 2020-06-23 中国科学院深圳先进技术研究院 Image encryption method and device and image decryption method and device
WO2022141056A1 (en) * 2020-12-29 2022-07-07 杭州趣链科技有限公司 Data transmission optimization method, apparatus and system based on chinese remainder theorem

Also Published As

Publication number Publication date
CN100576226C (en) 2009-12-30

Similar Documents

Publication Publication Date Title
US9813389B2 (en) System and method for wireless data protection
Bösch et al. A survey of provably secure searchable encryption
CN104486315B (en) A kind of revocable key outsourcing decryption method based on contents attribute
CN103875001B (en) Method and system for protecting execution of cryptographic hash functions
CN104363215B (en) A kind of encryption method and system based on attribute
US7634091B2 (en) System and method of hiding cryptographic private keys
JP6144992B2 (en) Searchable cryptographic processing system and method
CN101821746B (en) Device and method for backup of rights objects
CN105100083B (en) A kind of secret protection and support user's revocation based on encryption attribute method and system
CN105262843A (en) Data anti-leakage protection method for cloud storage environment
CN105933281B (en) A kind of quantum homomorphism symmetrically can search for the method and system of encryption
CN106533663B (en) Data ciphering method, encryption method, apparatus and data decryption method, decryption method, apparatus
CN101582760A (en) Key encrypting and storing method based on tree structure
CN105282167A (en) Searchable certificateless public key encryption method
CN106936820B (en) Data variable length modification method and application thereof in big data encryption
CN101859306B (en) Method and equipment for generating blind index table, and united keyword search method and equipment
JP6961324B2 (en) Searchable cryptographic processing system
CN100576226C (en) Database encryption method based on Chinese remainder theorem
Abo-Alian et al. Auditing-as-a-service for cloud storage
CN100531032C (en) Method for storing cipher key
CN112134701B (en) Encryption method capable of repudiating editing of sensitive keywords
Dave et al. Securing SQL with access control for database as a service model
KR101105384B1 (en) Side channel attack resistant key management method based on the key encryption and shuffling method
Sarma An Asymmetric Key based Disk Encryption Scheme
Gupta et al. An enhanced python based approach of secret sharing scheme with encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091230

Termination date: 20120710