Database security, data encryption definition, types with the example, Caesar code process, data encryption techniques are particularly used for what.

Database security

Database security

Read about the differences between sorting and indexing


Securing database importance

Database security is one of the most important parts of a database management system. Without securing the database, there is always a is a risk for any management or institution. We need to secure database, networks between senders and receivers and also many areas where the databases haves accessibility.

For increasing database security always have to be serious.

Data encryption

The process of converting data into other forms from the main form is called data encryption. 

Data encryption techniques are particularly used for what?


Data encryption techniques are particularly used for sending data from one place to another place securely. We need to convert data into other forms from the main form. By this, between the processes of data sending, no one else can not able to understand or access these.


Many processes are used for data encrypting. As example:
  1. Caesar code
  2. Data encryption standard (DES)
  3. International data Encryption Algorithm (IDEA)
Here we will discuss Caesar's code.

Caesar code


The Caesar code is also called as shift chipper, is one of the oldest and simplest forms of encrypting messages. In this process, a letter is a shift with its previous or next letters. Shift amounts May 1, 2, 3, etc.

Before encrypting data what we able to read is called plain text. After encrypting data when it is in the sending process it stays in a different structure. It is called the Ciphertext.

Before the receiving point, the data needs to achieve its original structure. The process of again getting the original structure is called data decryption. After that receiver will get again the plain text what which was the original data.

Data encryption standard example



Caesar code



Here is an example of encryption. 
“Book” is a plain text. 

The next step is in the encryption process and it is by Caesar code. Here we applied 1 shift encryption. So every letter will be changed with its next letter. That’s why we will get ciphertext “Cpl”.

 Before it’s received by the receiver we need to make it usable. So, we have to apply the decryption process. By this, we will get “Book”. Finally, this will be received by the receiver.



Types of encryption


Encryption is mainly two types. They are:
  1. Symmetric encryption
  2. Asymmetric encryption

Symmetric encryption

In this type of encryption, the same type of key is used for encrypting and decrypting. 

Symmetric encryption


Asymmetric encryption

Different types of keys are used for encrypting and decrypting.
Here one key is used for the encrypting process that is called the primary key. And another key is used for the decrypting process. That key is called the secondary key.

Asymmetric encryption



So, this is an overall discussion on Database security.