Database security, data encryption definition, types with the example, Caesar code process, data encryption techniques are particularly used for what.
Database security
Securing database importance
For increasing database security always have to be serious.
Data encryption
The process of converting data into other forms from the main form is called data encryption.
Data encryption techniques are particularly used for what?
Data encryption techniques are particularly used for sending data from one place to another place securely. We need to convert data into other forms from the main form. By this, between the processes of data sending, no one else can not able to understand or access these.
Many processes are used for data encrypting. As example:
- Caesar code
- Data encryption standard (DES)
- International data Encryption Algorithm (IDEA)
Here we will discuss Caesar's code.
Caesar code
The Caesar code is also called as shift chipper, is one of the oldest and simplest forms of encrypting messages. In this process, a letter is a shift with its previous or next letters. Shift amounts May 1, 2, 3, etc.
Before encrypting data what we able to read is called plain text. After encrypting data when it is in the sending process it stays in a different structure. It is called the Ciphertext.
Before the receiving point, the data needs to achieve its original structure. The process of again getting the original structure is called data decryption. After that receiver will get again the plain text what which was the original data.
Data encryption standard example
Here is an example of encryption.
“Book” is a plain text.
The next step is in the encryption process and it is by Caesar code. Here we applied 1 shift encryption. So every letter will be changed with its next letter. That’s why we will get ciphertext “Cpl”.
Before it’s received by the receiver we need to make it usable. So, we have to apply the decryption process. By this, we will get “Book”. Finally, this will be received by the receiver.
Types of encryption
Encryption is mainly two types. They are:
- Symmetric encryption
- Asymmetric encryption
Symmetric encryption
In this type of encryption, the same type of key is used for encrypting and decrypting.
Asymmetric encryption
Different types of keys are used for encrypting and decrypting.
Here one key is used for the encrypting process that is called the primary key. And another key is used for the decrypting process. That key is called the secondary key.
So, this is an overall discussion on Database security.
0 Comments