Visible to the public Database Encryption Using Asymmetric Keys: A Case Study

TitleDatabase Encryption Using Asymmetric Keys: A Case Study
Publication TypeConference Paper
Year of Publication2017
AuthorsBoicea, A., Radulescu, F., Truica, C. O., Costea, C.
Conference Name2017 21st International Conference on Control Systems and Computer Science (CSCS)
Keywordsapplication performance decrease, application program interfaces, Asymmetric Encryption, asymmetric keys, Benchmark testing, compositionality, cryptographic algorithms, cryptography, Data security, database encryption, Databases, Distributed databases, ECIES, ElGamal, Encrypted database, Encryption, encryption algorithms, encryption keys, encryption-decryption keys, Human Behavior, Internet, Java, Java API, Metrics, padding, pubcrawl, resilience, Resiliency, RSA, test database, Web applications
Abstract

Data security has become an issue of increasing importance, especially for Web applications and distributed databases. One solution is using cryptographic algorithms whose improvement has become a constant concern. The increasing complexity of these algorithms involves higher execution times, leading to an application performance decrease. This paper presents a comparison of execution times for three algorithms using asymmetric keys, depending on the size of the encryption/decryption keys: RSA, ElGamal, and ECIES. For this algorithms comparison, a benchmark using Java APIs and an application for testing them on a test database was created.

URLhttps://ieeexplore.ieee.org/document/7968578/
DOI10.1109/CSCS.2017.50
Citation Keyboicea_database_2017