CN109376543A - A kind of database encryption method based on aes algorithm - Google Patents

A kind of database encryption method based on aes algorithm Download PDF

Info

Publication number
CN109376543A
CN109376543A CN201810986261.3A CN201810986261A CN109376543A CN 109376543 A CN109376543 A CN 109376543A CN 201810986261 A CN201810986261 A CN 201810986261A CN 109376543 A CN109376543 A CN 109376543A
Authority
CN
China
Prior art keywords
key
data
encryption
byte
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810986261.3A
Other languages
Chinese (zh)
Inventor
李章维
宋焦朋
姚飞
陈安
周晓根
张贵军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN201810986261.3A priority Critical patent/CN109376543A/en
Publication of CN109376543A publication Critical patent/CN109376543A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of database encryption method based on AES, firstly, being directed to data base encryption problem, analysis safety present in data base encryption at this stage is low, easily cracks and the disadvantages of information leakage;Then, the big advantage of difficulty can be cracked according to attribute flexible setting for AES encryption algorithm for encryption intensity, key length and period of key;Finally, being used in the encryption of database, establishes a set of high safety, cracks the big database encryption method of difficulty.The present invention proposes a kind of high safety, cracks the big database encryption method based on aes algorithm of difficulty, by the way that encryption intensity, key length and period of key is arranged according to data attribute using aes algorithm.

Description

A kind of database encryption method based on aes algorithm
Technical field
The present invention relates to a kind of aes algorithm, database field, computer application field more particularly to one kind to be based on The database encryption method of aes algorithm.
Background technique
With the extensive use of database technology, the safety problem of the key problem of information security --- database is also Increasingly paid high attention to.Information in internet has become one of government, the strategic asset of enterprise-essential, network data Aggregation of the library as the network information, has become the indispensable core component of information-intensive society.In traditional network security study, Usually assume that database itself be it is safe, under the premise of this, resist external attack (such as hacker) or prevent some conjunctions Method user's unauthorized access data are the targets of database security.Simultaneously as the degree of opening of the network information is higher and higher, network Have a large amount of government, enterprise and individual privacy information in database, as state secret information, enterprise patent product information, Industry confidential information, personnel's archives and other confidentiality information resources, safety is most important, be related to national security, Enterprise's ups and downs and personal honor or disgrace.Therefore, the safety for how effectively guaranteeing Database Systems, has become the weight of exploratory development Want one of project.
In recent years, database information incident of leakage had generation more, and many is enterprise, personal sensitive information.For example, 2004, U.S.'s payment information handled company by hacker attacks, and the leakage of 40,000,000 user informations causes most tight in American history The leaking data event together of weight, bank and credit card company all clients that have nothing for it but rechange hair credit card, this not only makes At huge economic loss, it is often more important that, corporate image, user's confidence are caused greatly to hit.2005, Master letter It is attacked with card central database, up to ten million user informations are leaked.2007, kingston corporate client's information database By hacker attack, the personal information (including the information such as name, credit number) of the tens of thousands of clients in whole world a possibility that there are leakages. Information leakage may cause the fraudulent activities of identity theft, property loss and other serious damage individuals, society, and cause to dislike Bad social influence.
Some confidentiality private datas may need to save decades, notably persistence, this provides foot to attacker The enough time goes to obtain his conceivable data, what traditional database safeguard procedures (access control, intrusion detection etc.) provided Safety is no longer satisfied the needs of database security.Internal staff and legitimate user go beyond one's commission using data in order to prevent, Encrypting to the significant data in database is presently most effective one of safeguard measure.Even if invader is from data Data are achieved in library can not also decrypt ciphertext, to ensure that the safety of confidential information, largely avoid because of secret, privacy It is open to cause damages to data owner.
Therefore, by researching and analysing to database encryption method, find current data ciphering method in safety side Face has biggish defect, needs to improve.
Summary of the invention
In order to overcome, safety present in current data ciphering method is low, easily cracks and the shortcomings that information leakage, this hair It is bright to propose a kind of high safety, crack the big database encryption method based on aes algorithm of difficulty, pass through and utilizes aes algorithm root According to data attribute setting encryption intensity, key length and period of key.
The technical solution adopted by the present invention to solve the technical problems is:
A kind of database encryption method based on aes algorithm, the described method comprises the following steps:
1) logic module is created, encryption system is divided into five logic modules, is respectively as follows: cipher key storage block, key Engine modules, key information module, key management module and data memory module;
2) data key is classified, and creates master key in key management module and working key, master key are responsible for work Key encryption, working key are responsible for database table or data item encryption;
3) family key is created, data are grouped according to attribute or function, corresponding family key is created according to group number, it is close Each encryption key distribution in key race targetedly encrypted object;
4) period of key is set, reasonable enabling time is arranged according to the actual demand of system data when creating key With the destruction time, after key arrival enabling time is in active state, key starts to be responsible for the encryption of system data, decryption work Make, until whole life cycle terminates, expired key does not use forever, should be deleted from system immediately, guarantee will not again by It uses;
5) it is strong that different encryptions is arranged according to the attribute type of the execution efficiency of server and data in setting encryption intensity Degree, if it is some common privacy informations, is encrypted using some low intensive keys, reduces the pressure of server, mention The execution efficiency of high server;If design data trade secret, state secret or bank data, using the close of high intensity Key, although increasing the burden of server, data reading speed can be a little slower, ensure that the safety of data;
6) key length is selected, although the length of key has 128,192 and 256 three types in aes algorithm, 128 keys were not cracked so far, comprehensively considered from the execution efficiency of server, selected the key of 128 bit lengths;
7) S box is grouped as 4 × 4 state matrix by data encryption process, carries out ten encryption round number operations, every next round Function carries out following 4 operations:
7.1) S box converts, and as unit of byte, carries out non-linear permutation to the data of byte each in state matrix;
7.2) conversion is migrated, the S box after displacement is grouped as to 4 × 4 state matrix, every a line is measured do with a different shift Ring-type deviates to the left, and the first row is motionless, and the second row moves to left 1 byte, and the third line moves to left 2 bytes, and fourth line moves to left 3 words Section is indicated with formula (1):
7.3) column obscure conversion, by being respectively listed in based on finite field gf (2 for state matrix S (x)8) under conditions of,
Each column and a fixed polynomial multiplications, as shown in formula (2):
As described in formula (2), new state matrix S ' (x) is obtained, as shown in formula (3):
Wherein, element { 01 }, { 02 }, { 03 } are fixed field elements;
7.4) InvAddRoundKey converts, by each of state matrix byte and the byte in corresponding respective loops into Row XOR operation;
8) data decrypting process, data deciphering are the inverse operations of encryption, successively carry out retrograde displacement, inverse S box converts, it is close to take turns Key adds transformation and inverse column to obscure Four processes, and the ciphertext generated by Encryption Algorithm is converted into readable original text, and InvAddRoundKey becomes It changes as ciphering process, other three-step process are as follows:
8.1) it drives in the wrong direction and is displaced, transformed 4 × 4 byte matrix is subjected to displacement of driving in the wrong direction, the first row remains stationary, with row It is displaced exactly the opposite, the second row moves to right a byte, and the third line moves to right two bytes, and fourth line moves to right three bytes;
8.2) inverse S box converts, and by inverse S box operational transformation is original byte by each byte;
8.3) inverse column obscure transformation, and state matrix S (x) is multiplied with a fixed polynomial by column, obtains matrix S " (x), conversion process such as formula (4) is described:
Wherein, { 09 }, { 0b }, { 0d }, { 0e } are fixed field element.
Further, in the step 1), encryption system is divided into five logic modules by the creation logic module, The function of each module is as described below:
1.1) cipher key storage block: storage operation and safeguard measure for handling master key and working key;
1.2) key engine module: the module of key Encrypt and Decrypt operation is really executed;
1.3) information such as the details of key, including family key, period of key key information module: are recorded;
1.4) key management module: the key in management cipher key storage block and key information module;
1.5) data memory module: management needs to be encrypted the data of protection.
Beneficial effects of the present invention are mainly manifested in: present invention safety according to present in current database encryption method It is low, easily crack and the shortcomings that information leakage, propose a kind of by the way that encryption intensity, close is arranged according to data attribute using aes algorithm Key length and period of key provide a set of high safety, crack the big database encryption method of difficulty.
Detailed description of the invention
Fig. 1 is a kind of flow chart of database encryption method based on AES;
Fig. 2 is family key instance graph;
Fig. 3 is ciphering process S box Transformation Graphs;
Fig. 4 is that ciphering process migrates transition diagram.
Specific embodiment
The present invention will be further described with reference to the accompanying drawing.
Referring to Fig.1~Fig. 4, a kind of database encryption method based on AES, comprising the following steps:
1) logic module is created, encryption system is divided into five logic modules, is respectively as follows: cipher key storage block, key Engine modules, key information module, key management module and data memory module;
2) data key is classified, and creates master key in key management module and working key, master key are responsible for work Key encryption, working key are responsible for database table or data item encryption;
3) family key is created, data are grouped according to attribute or function, corresponding family key is created according to group number, it is close Each encryption key distribution in key race targetedly encrypted object, as shown in Figure 2;
4) period of key is set, reasonable enabling time is arranged according to the actual demand of system data when creating key With the destruction time, after key arrival enabling time is in active state, key starts to be responsible for the encryption of system data, decryption work Make, until whole life cycle terminates, expired key does not use forever, should be deleted from system immediately, guarantee will not again by It uses;
5) it is strong that different encryptions is arranged according to the attribute type of the execution efficiency of server and data in setting encryption intensity Degree, if it is some common privacy informations, is encrypted using some low intensive keys, reduces the pressure of server, mention The execution efficiency of high server;If design data trade secret, state secret or bank data, using the close of high intensity Key, although increasing the burden of server, data reading speed can be a little slower, ensure that the safety of data;
6) key length is selected, although the length of key has 128,192 and 256 three types in aes algorithm, 128 keys were not cracked so far, comprehensively considered from the execution efficiency of server, selected the key of 128 bit lengths;
7) S box is grouped as 4 × 4 state matrix by data encryption process, carries out ten encryption round number operations, every next round Function carries out following 4 operations:
7.1) S box converts, and as unit of byte, carries out non-linear permutation to the data of byte each in state matrix, such as Shown in Fig. 3;
7.2) conversion is migrated, the S box after displacement is grouped as to 4 × 4 state matrix, every a line is measured do with a different shift Ring-type deviates to the left, and the first row is motionless, and the second row moves to left 1 byte, and the third line moves to left 2 bytes, and fourth line moves to left 3 words Section is indicated with formula (1):
7.3) column obscure conversion, by being respectively listed in based on finite field gf (2 for state matrix S (x)8) under conditions of,
Each column and a fixed polynomial multiplications, as shown in formula (2), as shown in Figure 4:
As described in formula (2), new state matrix S ' (x) is obtained, as shown in formula (3):
Wherein, element { 01 }, { 02 }, { 03 } are fixed field elements;
7.4) InvAddRoundKey converts, by each of state matrix byte and the byte in corresponding respective loops into Row XOR operation;
8) data decrypting process, data deciphering are the inverse operations of encryption, successively carry out retrograde displacement, inverse S box converts, it is close to take turns Key adds transformation and inverse column to obscure Four processes, and the ciphertext generated by Encryption Algorithm is converted into readable original text, and InvAddRoundKey becomes It changes as ciphering process, other three-step process are as follows:
8.1) it drives in the wrong direction and is displaced, transformed 4 × 4 byte matrix is subjected to displacement of driving in the wrong direction, the first row remains stationary, with row It is displaced exactly the opposite, the second row moves to right a byte, and the third line moves to right two bytes, and fourth line moves to right three bytes;
8.2) inverse S box converts, and by inverse S box operational transformation is original byte by each byte;
8.3) inverse column obscure transformation, and state matrix S (x) is multiplied with a fixed polynomial by column, obtains matrix S " (x), conversion process such as formula (4) is described:
Wherein, { 09 }, { 0b }, { 0d }, { 0e } are fixed field element.
Further, in the step 1), encryption system is divided into five logic modules by the creation logic module, The function of each module is as described below:
1.1) cipher key storage block: storage operation and safeguard measure for handling master key and working key;
1.2) key engine module: the module of key Encrypt and Decrypt operation is really executed;
1.3) information such as the details of key, including family key, period of key key information module: are recorded;
1.4) key management module: the key in management cipher key storage block and key information module;
1.5) data memory module: management needs to be encrypted the data of protection.
By taking a set of Education Administration Information System as an example, a kind of database encryption method based on AES, comprising the following steps:
1) logic module is created, encryption system is divided into five logic modules, is respectively as follows: cipher key storage block, key Engine modules, key information module, key management module and data memory module;
2) data key is classified, and creates master key in key management module and working key, master key are responsible for work Key encryption, working key are responsible for database table or data item encryption;
3) family key is created, data are grouped according to attribute or function, corresponding family key is created according to group number, it is close Each encryption key distribution in key race targetedly encrypted object;
4) period of key is set, reasonable enabling time is arranged according to the actual demand of system data when creating key With the destruction time, after key arrival enabling time is in active state, key starts to be responsible for the encryption of system data, decryption work Make, until whole life cycle terminates, expired key does not use forever, should be deleted from system immediately, guarantee will not again by It uses;
5) it is strong that different encryptions is arranged according to the attribute type of the execution efficiency of server and data in setting encryption intensity Degree, if it is some common privacy informations, is encrypted using some low intensive keys, reduces the pressure of server, mention The execution efficiency of high server;If design data trade secret, state secret or bank data, using the close of high intensity Key, although increasing the burden of server, data reading speed can be a little slower, ensure that the safety of data;
6) key length is selected, although the length of key has 128,192 and 256 three types in aes algorithm, 128 keys were not cracked so far, comprehensively considered from the execution efficiency of server, selected the key of 128 bit lengths;
7) S box is grouped as 4 × 4 state matrix by data encryption process, carries out ten encryption round number operations, every next round Function carries out following 4 operations:
7.1) S box converts, and as unit of byte, carries out non-linear permutation to the data of byte each in state matrix;
7.2) conversion is migrated, the S box after displacement is grouped as to 4 × 4 state matrix, every a line is measured do with a different shift Ring-type deviates to the left, and the first row is motionless, and the second row moves to left 1 byte, and the third line moves to left 2 bytes, and fourth line moves to left 3 words Section is indicated with formula (1):
7.3) column obscure conversion, by being respectively listed in based on finite field gf (2 for state matrix S (x)8) under conditions of, Mei Yilie With a fixed polynomial multiplications, as shown in formula (2):
As described in formula (2), new state matrix S ' (x) is obtained, as shown in formula (3):
Wherein, element { 01 }, { 02 }, { 03 } are fixed field elements;
7.4) InvAddRoundKey converts, by each of state matrix byte and the byte in corresponding respective loops into Row XOR operation;
8) data decrypting process, data deciphering are the inverse operations of encryption, successively carry out retrograde displacement, inverse S box converts, it is close to take turns Key adds transformation and inverse column to obscure Four processes, and the ciphertext generated by Encryption Algorithm is converted into readable original text, and InvAddRoundKey becomes It changes as ciphering process, other three-step process are as follows:
8.1) it drives in the wrong direction and is displaced, transformed 4 × 4 byte matrix is subjected to displacement of driving in the wrong direction, the first row remains stationary, with row It is displaced exactly the opposite, the second row moves to right a byte, and the third line moves to right two bytes, and fourth line moves to right three bytes;
8.2) inverse S box converts, and by inverse S box operational transformation is original byte by each byte;
8.3) inverse column obscure transformation, and state matrix S (x) is multiplied with a fixed polynomial by column, obtains matrix S " (x), conversion process such as formula (4) is described:
Wherein, { 09 }, { 0b }, { 0d }, { 0e } are fixed field element.
Described above is the good results that one embodiment that the present invention provides is shown, it is clear that the present invention is not It is suitable only for above-described embodiment, without departing from essence spirit of the present invention and without departing from the premise of content involved by substantive content of the present invention Under can do many variations to it and be implemented.

Claims (2)

1. a kind of database encryption method based on AES, which is characterized in that the described method comprises the following steps:
1) logic module is created, encryption system is divided into five logic modules, is respectively as follows: cipher key storage block, key engine Module, key information module, key management module and data memory module;
2) data key is classified, and creates master key in key management module and working key, master key are responsible for working key Encryption, working key are responsible for database table or data item encryption;
3) family key is created, data are grouped according to attribute or function, corresponding family key, family key are created according to group number In each encryption key distribution targetedly encrypted object;
4) period of key is set, reasonable enabling time and pin are arranged according to the actual demand of system data when creating key The time is ruined, after key arrival enabling time is in active state, key starts encryption, the decryption work of being responsible for system data, Until whole life cycle terminates, expired key does not use forever, should delete from system immediately, and guarantee will not be made again With;
5) according to the attribute type of the execution efficiency of server and data different encryption intensities is arranged, such as in setting encryption intensity Fruit is some common privacy informations, is encrypted using some low intensive keys, and the pressure of server is reduced, and improves service The execution efficiency of device;If design data trade secret, state secret or bank data, using high-intensitive key, although The burden of server is increased, data reading speed can be a little slower, but ensure that the safety of data;
6) key length is selected, although the length of key has 128,192 and 256 three types in aes algorithm, 128 The key of position was not cracked so far, comprehensively considered from the execution efficiency of server, selected the key of 128 bit lengths;
7) S box is grouped as 4 × 4 state matrix by data encryption process, carries out ten encryption round number operations, each round function Carry out following 4 operations:
7.1) S box converts, and as unit of byte, carries out non-linear permutation to the data of byte each in state matrix;
7.2) conversion is migrated, the S box after displacement is grouped as to 4 × 4 state matrix, every a line is measured do ring-type with a different shift It deviates to the left, the first row is motionless, and the second row moves to left 1 byte, and the third line moves to left 2 bytes, and fourth line moves to left 3 bytes, uses Formula (1) indicates:
7.3) column obscure conversion, by being respectively listed in based on finite field gf (2 for state matrix S (x)8) under conditions of, it is each to arrange and one Fixed polynomial multiplications, as shown in formula (2):
As described in formula (2), new state matrix S ' (x) is obtained, as shown in formula (3):
Wherein, element { 01 }, { 02 }, { 03 } are fixed field elements;
7.4) InvAddRoundKey converts, and each of state matrix byte and the byte progress in corresponding respective loops is different Or operation;
8) data decrypting process, data deciphering are the inverse operations of encryption, successively carry out drive in the wrong direction displacement, inverse S box transformation, InvAddRoundKey Transformation and inverse column obscure Four processes, and the ciphertext generated by Encryption Algorithm is converted into readable original text, InvAddRoundKey transformation with Ciphering process is the same, other three-step process are as follows:
8.1) it drives in the wrong direction and is displaced, transformed 4 × 4 byte matrix is subjected to displacement of driving in the wrong direction, the first row remains stationary, and moves with line position Exactly the opposite, the second row moves to right a byte, and the third line moves to right two bytes, and fourth line moves to right three bytes;
8.2) inverse S box converts, and by inverse S box operational transformation is original byte by each byte;
8.3) inverse column obscure transformation, and state matrix S (x) is multiplied with a fixed polynomial by column, obtains matrix S " (x), become It is described to change process such as formula (4):
Wherein, { 09 }, { 0b }, { 0d }, { 0e } are fixed field element.
2. a kind of database encryption method based on AES as described in claim 1, which is characterized in that in the step 1), institute The creation logic module stated, the function of each module are as follows:
1.1) cipher key storage block: storage operation and safeguard measure for handling master key and working key;
1.2) key engine module: the module of key Encrypt and Decrypt operation is really executed;
1.3) details of key, including family key and period of key information key information module: are recorded;
1.4) key management module: the key in management cipher key storage block and key information module;
1.5) data memory module: management needs to be encrypted the data of protection.
CN201810986261.3A 2018-08-28 2018-08-28 A kind of database encryption method based on aes algorithm Pending CN109376543A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810986261.3A CN109376543A (en) 2018-08-28 2018-08-28 A kind of database encryption method based on aes algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810986261.3A CN109376543A (en) 2018-08-28 2018-08-28 A kind of database encryption method based on aes algorithm

Publications (1)

Publication Number Publication Date
CN109376543A true CN109376543A (en) 2019-02-22

Family

ID=65404056

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810986261.3A Pending CN109376543A (en) 2018-08-28 2018-08-28 A kind of database encryption method based on aes algorithm

Country Status (1)

Country Link
CN (1) CN109376543A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110336819A (en) * 2019-07-09 2019-10-15 四川新网银行股份有限公司 The self-service combined method of encryption and decryption based on machine learning
CN111064562A (en) * 2019-12-12 2020-04-24 北京计算机技术及应用研究所 Implementation method of AES algorithm on FPGA
CN111262684A (en) * 2020-01-13 2020-06-09 燕山大学 Power battery traceability management coding encryption method based on improved AES algorithm
CN114286129A (en) * 2021-12-02 2022-04-05 赛轮集团股份有限公司 Audio and video data encryption and decryption method and device
CN116155620A (en) * 2023-04-14 2023-05-23 深圳市聚力得电子股份有限公司 Transaction data secure transmission method for card reader

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100095113A1 (en) * 2008-10-11 2010-04-15 Blankenbeckler David L Secure Content Distribution System
CN106506142A (en) * 2016-11-22 2017-03-15 北京航空航天大学 A kind of AES integration encryption and decryption device implementation methods of low complex degree
CN106549963A (en) * 2016-11-05 2017-03-29 北京工业大学 Safe storage system based on HDFS

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100095113A1 (en) * 2008-10-11 2010-04-15 Blankenbeckler David L Secure Content Distribution System
CN106549963A (en) * 2016-11-05 2017-03-29 北京工业大学 Safe storage system based on HDFS
CN106506142A (en) * 2016-11-22 2017-03-15 北京航空航天大学 A kind of AES integration encryption and decryption device implementation methods of low complex degree

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李刚彪: "数据库加密技术的研究与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
王劲东: "目基于高级数据加密标准AES的数据库加密技术研究与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110336819A (en) * 2019-07-09 2019-10-15 四川新网银行股份有限公司 The self-service combined method of encryption and decryption based on machine learning
CN111064562A (en) * 2019-12-12 2020-04-24 北京计算机技术及应用研究所 Implementation method of AES algorithm on FPGA
CN111262684A (en) * 2020-01-13 2020-06-09 燕山大学 Power battery traceability management coding encryption method based on improved AES algorithm
CN114286129A (en) * 2021-12-02 2022-04-05 赛轮集团股份有限公司 Audio and video data encryption and decryption method and device
CN114286129B (en) * 2021-12-02 2023-07-25 赛轮集团股份有限公司 Audio and video data encryption and decryption method and device
CN116155620A (en) * 2023-04-14 2023-05-23 深圳市聚力得电子股份有限公司 Transaction data secure transmission method for card reader

Similar Documents

Publication Publication Date Title
CN109376543A (en) A kind of database encryption method based on aes algorithm
Sriramya et al. Providing password security by salted password hashing using bcrypt algorithm
CN104917617B (en) A kind of encryption group ranking obscures method
CN108595989A (en) Mobile APP security protection systems and method under a kind of iOS
CN106778292B (en) A kind of quick restoring method of Word encrypted document
Rai et al. A Systematic Review of Encryption and Keylogging for Computer System Security
Yu Encryption technology for computer network data security protection
Prianga et al. Evolutionary survey on data security in cloud computing using blockchain
CN107733936A (en) A kind of encryption method of mobile data
IBRAHIM et al. A novel data encryption algorithm to ensure database security
Osmani et al. Cloud Computing Security Challenges, Threats and Vulnerabilities
Wang et al. Research on some relevant problems in computer forensics
George et al. GLEnc Algorithm to Secure Data in Public Cloud Environment
Patel et al. Negative database for data security
CN109495455A (en) A kind of data processing system, method and apparatus
Glen Security Risks in Computer Networks and Application of Data Encryption Techniques
Geng et al. Securing Relational Database Storage with Attribute Association Aware Shuffling
CN102096641A (en) Double-factor shadow password protection method for mobile storage medium data safety
Zhu et al. The analysis and design of accounting information security system based on AES algorithm
Ma Embedded Network Database Encryption System Optimization Considering the B/S Structure and Software Optimization
Song Investigating Data Encryption Technology's Use to Improve Security for Computer Network Communication
Ling et al. Code Obfuscation Technology Based on Chaotic Asymmetric Encryption Algorithm
Pawar et al. Enhancement of Data Leakage Detection Using Encryption Technique
Genn et al. The Grand Diversion Cipher-A proposed Information Security Protection Mechanisms and Cryptography
Chen et al. Multisensor-based Verification Mechanism with Encryption and Decryption on Fault-tolerant Databases.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190222