z-logo
open-access-imgOpen Access
Research on Implementation Method of Key Management Based on Data Encryption Technology
Author(s) -
Shihao Yan
Publication year - 2019
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/677/4/042018
Subject(s) - encryption , key management , computer science , key (lock) , 40 bit encryption , scheme (mathematics) , key distribution , client side encryption , computer security , 56 bit encryption , key exchange , key generation , key encapsulation , attribute based encryption , data security , database , on the fly encryption , public key cryptography , mathematics , mathematical analysis
Key management is a vital problem which must be solved when a database encryption system is designed and implemented. It is very difficult to solve key management. Key management is directly related to the performance of the whole encryption system and security of encrypted data. Key management is discussed by the author from the aspects of generation, distribution, storage, exchange and change. A concrete scheme of key management is proposed. The security of the scheme is discussed. The discussion result shows that it is a feasible key management scheme which can meet the security requirements of the database encryption system.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here