Methods for database ciphering
In this paper Caesar and Vigenere methods have been used for table ciphering. Each record has unique and independent keys to the next record to get high security. The cipher text stored in script file that separates the content of fields by semicolon. The second part is the process of creating a new...
Saved in:
Main Authors: | , , |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2020-03-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 01767 am a22003133u 4500 | ||
---|---|---|---|
001 | ijeecs19818_13537 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Ali Naji, Maitham |e author |
100 | 1 | 0 | |e contributor |
700 | 1 | 0 | |a Mohsin Hammood, Dalal Abdul |e author |
700 | 1 | 0 | |a Razik Al Debagh, Nuha Abdul |e author |
245 | 0 | 0 | |a Methods for database ciphering |
260 | |b Institute of Advanced Engineering and Science, |c 2020-03-01. | ||
500 | |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/19818 | ||
520 | |a In this paper Caesar and Vigenere methods have been used for table ciphering. Each record has unique and independent keys to the next record to get high security. The cipher text stored in script file that separates the content of fields by semicolon. The second part is the process of creating a new database using the Object called Data Access Object (DAO) and then create table and it is fields. The program gets plaintext of the table by applying the decryption rules of two methods. | ||
540 | |a Copyright (c) 2019 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc/4.0 | ||
546 | |a eng | ||
690 | |||
690 | |a Database security, Data access object, Caesar cipher, Vigenere cipher, Text file | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 17, No 3: March 2020; 1499-1505 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v17.i3 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/19818/13537 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/19818/13537 |z Get fulltext |