A database encryption method based on an AES algorithm

An encryption method and database technology, applied in the field of database encryption based on the AES algorithm, can solve the problems of easy-to-crack information, low security, leakage, etc., and achieve the effect of high difficulty in cracking and strong security

Inactive Publication Date: 2019-02-22
ZHEJIANG UNIV OF TECH
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to overcome the shortcomings of low security, easy cracking and information leakage in the current data encryption methods, the present invention pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A database encryption method based on an AES algorithm
  • A database encryption method based on an AES algorithm
  • A database encryption method based on an AES algorithm

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] The present invention will be further described below with reference to the accompanying drawings.

[0044] refer to Figure 1 to Figure 4 , an AES-based database encryption method, comprising the following steps:

[0045] 1) Create a logic module, and divide the encryption system into five logic modules, namely: key storage module, key engine module, key information module, key management module and data storage module;

[0046] 2) Data key classification, create a master key and a working key in the key management module, the master key is responsible for encrypting the working key, and the working key is responsible for encrypting the database table or data item;

[0047] 3) Create a key family, group the data according to attributes or functions, and create a corresponding key family according to the number of groups. Each key in the key family is assigned a targeted encryption object, such as figure 2 shown;

[0048] 4) Set the key period. When creating the key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a database encryption method based on AES. Firstly, aiming at the database encryption problem, the shortcomings of the present database encryption such as low security, easy to crack, information leakage and the like are analyzed. Then, according to the encryption strength of AES encryption algorithm, the key length and key period can be set flexibly according to the attributes, which is difficult to crack. Finally, the method is used in database encryption to establish a set of database encryption method with strong security and great difficulty to crack. The invention provides a database encryption method based on an AES algorithm which is strong in security and difficult to crack. The encryption strength, the key length and the key period are set according to the data attribute by using the AES algorithm.

Description

technical field [0001] The invention relates to an AES algorithm, the database field and the computer application field, in particular to a database encryption method based on the AES algorithm. Background technique [0002] With the wide application of database technology, the core issue of information security——database security has been paid more and more attention. The information in the Internet has become one of the important strategic assets of the government and enterprises. As the gathering place of network information, the network database has become an indispensable core component of the information society. In traditional network security research, it is usually assumed that the database itself is safe. Under this premise, the goal of database security is to resist external attacks (such as hackers) or prevent some legitimate users from accessing data without authorization. At the same time, due to the increasing openness of network information, there are a larg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/602G06F21/6218G06F2221/2107
Inventor 李章维宋焦朋姚飞陈安周晓根张贵军
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products