Database encrytpion
The application of database on storing data of computer applications is nowadays very common. Whether the system is a simple or a complex one, the security of the data should be remain important if the systems do deal with private and confidential data. Security countermeasures need to be taken in b...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Published: |
2014
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utm-ep.48389 |
---|---|
record_format |
uketd_dc |
spelling |
my-utm-ep.483892017-07-26T05:00:01Z Database encrytpion 2014 Abukar Sufi, Abdul Kadir QA76 Computer software The application of database on storing data of computer applications is nowadays very common. Whether the system is a simple or a complex one, the security of the data should be remain important if the systems do deal with private and confidential data. Security countermeasures need to be taken in both whether before and after the intrusion of the database system. This project focusing on postintrusion domain, which the attacker have been successfully access the database file and the data became exposed to the attacker. Counter measuring this attack, it is common that the system admin encrypts some columns, that containing private and confidential data, of the database. Related to that domain, this project goal is to investigate the computational time performance of two cryptography algorithms known as AES and DES, on encrypting and decrypting the critical columns of the databases. In this project, AES and DES algorithms are implemented in a prototype database-equipped application. The prototype is developed using Microsoft VB.NET 2010 and Microsoft SQL Server. The DES uses 64-bit long plaintext and 56-bit encryption key (8 bits of parity) and produce output of 64-bit block. The AES in the other part uses three different key length such as 128, 198 and 256 bits. From the comparison of results, it is found that the computational time of AES(128-bit) is faster than the other schemes, followed by the DES(58-bit), AES(198-bit) and AES(265-bit), subsequently 2014 Thesis http://eprints.utm.my/id/eprint/48389/ masters Universiti Teknologi Malaysia, Faculty of Computing Faculty of Computing |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Abukar Sufi, Abdul Kadir Database encrytpion |
description |
The application of database on storing data of computer applications is nowadays very common. Whether the system is a simple or a complex one, the security of the data should be remain important if the systems do deal with private and confidential data. Security countermeasures need to be taken in both whether before and after the intrusion of the database system. This project focusing on postintrusion domain, which the attacker have been successfully access the database file and the data became exposed to the attacker. Counter measuring this attack, it is common that the system admin encrypts some columns, that containing private and confidential data, of the database. Related to that domain, this project goal is to investigate the computational time performance of two cryptography algorithms known as AES and DES, on encrypting and decrypting the critical columns of the databases. In this project, AES and DES algorithms are implemented in a prototype database-equipped application. The prototype is developed using Microsoft VB.NET 2010 and Microsoft SQL Server. The DES uses 64-bit long plaintext and 56-bit encryption key (8 bits of parity) and produce output of 64-bit block. The AES in the other part uses three different key length such as 128, 198 and 256 bits. From the comparison of results, it is found that the computational time of AES(128-bit) is faster than the other schemes, followed by the DES(58-bit), AES(198-bit) and AES(265-bit), subsequently |
format |
Thesis |
qualification_level |
Master's degree |
author |
Abukar Sufi, Abdul Kadir |
author_facet |
Abukar Sufi, Abdul Kadir |
author_sort |
Abukar Sufi, Abdul Kadir |
title |
Database encrytpion |
title_short |
Database encrytpion |
title_full |
Database encrytpion |
title_fullStr |
Database encrytpion |
title_full_unstemmed |
Database encrytpion |
title_sort |
database encrytpion |
granting_institution |
Universiti Teknologi Malaysia, Faculty of Computing |
granting_department |
Faculty of Computing |
publishDate |
2014 |
_version_ |
1747817378344861696 |