Abstract

To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable. Database security policies are guidelines for present and future decisions regarding the maintenance of the database security. Database security mechanisms are the functions used to enforce the database security policies. There are number of security policies that can be applied on data in order to protect the data against unauthorized access. Protecting the data is the prime need of an organization.

Highlights

  • To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies

  • As we know that we have number of encrypted methods so the cipher text depends upon the plain text and the secret key used for the encryption

  • Decryption Algorithm: It performs on cipher text and gives the original message as an output

Read more

Summary

CONVENTIONAL ENCRYPTION

The Conventional encryption was the only encryption available before the introduction of public key encryption. It is called symmetric encryption or single key encryption. A conventional encryption scheme has five stages: Cryptography is the practice and study of techniques for secure communication in the presence of third parties. It is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation

DATA ENCRYPTION
TECHNIQUES USED FOR ENCRYPTION
SUBSTITUTION CIPHER
PUBLIC KEY ENCRYPTION
Advantages
Disadvantages
RSA PUBLIC KEY ENCRYPTION ALGORITHM
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.