河豚的算法来增强MYSQL数据库的安全性

H. G. Simanullang, A. P. Silalahi
{"title":"河豚的算法来增强MYSQL数据库的安全性","authors":"H. G. Simanullang, A. P. Silalahi","doi":"10.46880/mtk.v4i1.58","DOIUrl":null,"url":null,"abstract":"The limitations of humans to maintain the security and confidentiality of stored data can have a bad impact if it is used by unauthorized parties. One way to secure shipping is to convert data into one that is not understood by encoding and insertion using cryptographic techniques. Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is a modern cryptographic algorithm symmetrical key-shaped block cipher. The Blowfish algorithm is quite simple but strong enough because it has a long keyspace, making it difficult to attack. Encryption is done by using a certain key, so as to produce ciphertext (files that have been encrypted or encoded) that cannot be read or understood. The ciphertext can be restored as if it was decrypted using the same key when encrypting the file. The key length used can affect the security of the algorithm. The decryption flow is almost the same as the Blowfish Algorithm encryption, except in the P-array (P1, P2, ..., P18) done by invading. Information of a system is certainly stored in a database that is always possible to attack but using cryptography then the problem can be overcome. By using the Blowfish algorithm, information security in a MySQL database can be improved.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"ALGORITMA BLOWFISH UNTUK MENINGKATKAN KEAMANAN DATABASE MYSQL\",\"authors\":\"H. G. Simanullang, A. P. Silalahi\",\"doi\":\"10.46880/mtk.v4i1.58\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The limitations of humans to maintain the security and confidentiality of stored data can have a bad impact if it is used by unauthorized parties. One way to secure shipping is to convert data into one that is not understood by encoding and insertion using cryptographic techniques. Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is a modern cryptographic algorithm symmetrical key-shaped block cipher. The Blowfish algorithm is quite simple but strong enough because it has a long keyspace, making it difficult to attack. Encryption is done by using a certain key, so as to produce ciphertext (files that have been encrypted or encoded) that cannot be read or understood. The ciphertext can be restored as if it was decrypted using the same key when encrypting the file. The key length used can affect the security of the algorithm. The decryption flow is almost the same as the Blowfish Algorithm encryption, except in the P-array (P1, P2, ..., P18) done by invading. Information of a system is certainly stored in a database that is always possible to attack but using cryptography then the problem can be overcome. By using the Blowfish algorithm, information security in a MySQL database can be improved.\",\"PeriodicalId\":384219,\"journal\":{\"name\":\"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.46880/mtk.v4i1.58\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46880/mtk.v4i1.58","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

人类在维护存储数据的安全性和机密性方面的局限性,如果被未经授权的各方使用,可能会产生不良影响。确保传输安全的一种方法是使用加密技术将数据转换为无法通过编码和插入理解的数据。密码学是对系统安全性的研究,其中系统需要免受来自不负责任方的干扰或威胁。其中一种加密算法是河豚算法。Blowfish算法是一种对称密钥型分组密码的现代密码算法。Blowfish算法非常简单,但足够强大,因为它有一个很长的键空间,使其难以攻击。加密是通过使用一定的密钥,从而产生无法读取或理解的密文(已加密或编码的文件)。可以恢复密文,就像在加密文件时使用相同的密钥解密一样。使用的密钥长度会影响算法的安全性。除p数组(P1, P2,…)外,解密流程与Blowfish算法加密几乎相同。P18)通过入侵来完成。系统的信息当然存储在数据库中,总是有可能被攻击,但使用加密技术可以克服这个问题。通过使用Blowfish算法,可以提高MySQL数据库的信息安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
ALGORITMA BLOWFISH UNTUK MENINGKATKAN KEAMANAN DATABASE MYSQL
The limitations of humans to maintain the security and confidentiality of stored data can have a bad impact if it is used by unauthorized parties. One way to secure shipping is to convert data into one that is not understood by encoding and insertion using cryptographic techniques. Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is a modern cryptographic algorithm symmetrical key-shaped block cipher. The Blowfish algorithm is quite simple but strong enough because it has a long keyspace, making it difficult to attack. Encryption is done by using a certain key, so as to produce ciphertext (files that have been encrypted or encoded) that cannot be read or understood. The ciphertext can be restored as if it was decrypted using the same key when encrypting the file. The key length used can affect the security of the algorithm. The decryption flow is almost the same as the Blowfish Algorithm encryption, except in the P-array (P1, P2, ..., P18) done by invading. Information of a system is certainly stored in a database that is always possible to attack but using cryptography then the problem can be overcome. By using the Blowfish algorithm, information security in a MySQL database can be improved.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信