Journal of Guangxi Normal University(Natural Science Edition) ›› 2011, Vol. 29 ›› Issue (3): 125-130.

Previous Articles     Next Articles

Technology Research about Two-stage Encryption Key of DatabaseSecurity Based on DES Encryption Algorithm

HOU You-li, YANG Xiong   

  1. College of Information Science and Technology,Hainan University,Haikou Hainan 570228,China
  • Received:2011-05-16 Online:2011-08-20 Published:2018-12-03

Abstract: One encryption design mechanism based on sensitive fields is mainly adopted in database encryption,which sensitive fields is correspondence to keys one by one.But if all the keys are fixed in advance,new security problemwill emerge.So how to generate and save the encryption keys is of grent importance.One derivative echanism of two-stage encryption key is adopted,including management keys and encryption keys.encryption keys which come from thetransformed results in sixty round of DES encryption algorithm on main keys areused to encrypt sensitive fields.Only a few management keys are needed to set in advance,but the encryption keys are dynamically generated by programming.What the user needs to do is to store several management keys safely,without considering the security storage and communication of theencryption keys.The way of deriving encryption keys by DES Encryption Algorithmcan meet the needs of encryption keys in database encryption,and derive 256 times encryption keys for the safety storage and management of the encryption keys.

Key words: DES encryption algorithm, double encryption-key, management key, encryption key

CLC Number: 

  • TP309.2
[1] Erez Shmueli,Ronen Vaisenberg,Yuval Elovici,et al.Database encryption:an overview of contemporary challenges and design considerations[J].ACM SIGMOD Record,2010,38:29-34.
[2] 孙萍萍.基于表字段的数据库加密服务器的设计与实现[J].计算机与现代化,2009,11(6):6-11.
[3] 咸鹤群,凤登国.支持属性粒度数据库加密的查询重写算法[J].计算研究与发展,2008,45(8):1307-1314.
[4] 蒙杨,卿斯汗,刘克龙.等级加密体制中的密钥管理研究[J].计算机工程,2001,12(8):1147-1153.
[5] KüHN U.Analysis of adatabase and index encryption scheme-problems and fixes[M]//Lecture Notes in Computer Science:Vol 4165.Berlin:Springer,2006:146-159.
[6] 冯朝胜,袁丁.一种基于剩余定理的密钥分配方案[J].计算机工程,2006,32(14):146-148.
[7] 徐江峰,马瑶.一种基于动态密钥的数据库加密方案[J].微计算机信息,2009,25(12-3):27-29.
[8] 安然,陈驰,徐震.数据库加密中间件的设计与实现[J].计算机工程与设计,2009,30(14):3261-3264.
[9] DONG Chang-yu,RUSSELLO G,DULAY N.Shared and searchable encrypted data for untrusted servers[M]//Lecture Notes in Computer Science:Vol 5094.Berlin:Springer,2008:127-143.
[10] üNAY O,GüNDEM T I.A survey on querying encrypted XML documents for databases as a service[J].ACM SIGMOD Record,2008,37:12-20.
[11] HACGüMü H,LYER B,MEHROTRA S.Query optimization in encrypted database systems[J].Lecture Notes in Computer Science.2005,3453:43-55.
[1] ZHOU Yan-yan, FENG Jia-li. Algorithm of Digital Audio Watermarking Based on Qualitative Mapping [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(2): 200-204.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!