101. Methods for database ciphering
- Author
-
Dalal Abdulmohsin Hammood, Maitham Ali Naji, and Nuha Abdul Razik Al Debagh
- Subjects
Control and Optimization ,Computer Networks and Communications ,Computer science ,Text file ,Caesar cipher ,computer.software_genre ,01 natural sciences ,Data access object ,0103 physical sciences ,Ciphertext ,Electrical and Electronic Engineering ,Database security ,010301 acoustics ,Database ,Plaintext ,Vigenere cipher ,Object (computer science) ,Vigenère cipher ,Hardware and Architecture ,Signal Processing ,Key (lock) ,Table (database) ,computer ,Information Systems - Abstract
In this paper Caesar and Vigenere methods have been used for table ciphering. Each record has unique and independent keys to the next record to get high security. The cipher text stored in script file that separates the content of fields by semicolon. The second part is the process of creating a new database using the Object called Data Access Object (DAO) and then create table and it is fields. The program gets plaintext of the table by applying the decryption rules of two methods.
- Published
- 2020
- Full Text
- View/download PDF