preview

Annotated Bibliography On Database Encryption

Better Essays

1. INTRODUCTION Database Encryption is one of the technique used for securing the data in database. This method transforms information on a computer in such a way that it becomes unreadable. So, even if someone is able to gain access to a computer with personal data on it, they likely won’t be able to do anything with the data unless they have original data key, complicated or expensive software. The main function of encryption is essentially to translate normal text into cipher text. Encryption makes sure that data doesn’t get read by the wrong people, but can also ensure that data isn’t altered in transit, and verify the identity of the sender. Data Encryption method typically uses a specified parameter or key to perform the data transformation. Some encryption algorithms require the key to be the same length as the message to be encoded, yet other encryption algorithms can operate on much smaller keys relative to the message. Encryption is most used among transactions over insecure channels of communication, such as the internet. Encryption is also used to protect data being transferred between devices such as mobile telephones, automatic teller machines (ATMs), and many more. Encryption can be used to create digital signatures, which allow a message to be authenticated. When properly implemented, a digital signature gives the recipient of a message reason to believe the message was sent by the claimed sender. 2. THREATS TO DATABASE 2.1 Database Databases are the

Get Access