Database Encryption Using Asymmetric Keys: A Case Study
Title | Database Encryption Using Asymmetric Keys: A Case Study |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Boicea, A., Radulescu, F., Truica, C. O., Costea, C. |
Conference Name | 2017 21st International Conference on Control Systems and Computer Science (CSCS) |
Keywords | application performance decrease, application program interfaces, Asymmetric Encryption, asymmetric keys, Benchmark testing, compositionality, cryptographic algorithms, cryptography, Data security, database encryption, Databases, Distributed databases, ECIES, ElGamal, Encrypted database, Encryption, encryption algorithms, encryption keys, encryption-decryption keys, Human Behavior, Internet, Java, Java API, Metrics, padding, pubcrawl, resilience, Resiliency, RSA, test database, Web applications |
Abstract | Data security has become an issue of increasing importance, especially for Web applications and distributed databases. One solution is using cryptographic algorithms whose improvement has become a constant concern. The increasing complexity of these algorithms involves higher execution times, leading to an application performance decrease. This paper presents a comparison of execution times for three algorithms using asymmetric keys, depending on the size of the encryption/decryption keys: RSA, ElGamal, and ECIES. For this algorithms comparison, a benchmark using Java APIs and an application for testing them on a test database was created. |
URL | https://ieeexplore.ieee.org/document/7968578/ |
DOI | 10.1109/CSCS.2017.50 |
Citation Key | boicea_database_2017 |
- encryption
- web applications
- test database
- RSA
- Resiliency
- resilience
- pubcrawl
- padding
- Metrics
- Java API
- Java
- internet
- Human behavior
- encryption-decryption keys
- encryption keys
- encryption algorithms
- application performance decrease
- Encrypted database
- ElGamal
- ECIES
- Distributed databases
- Databases
- database encryption
- Data Security
- Cryptography
- cryptographic algorithms
- Compositionality
- Benchmark testing
- asymmetric keys
- Asymmetric Encryption
- application program interfaces