Authorisation
the encryption method of the information stored in the database
Author: eliko ioramashviliKeywords: Encryption, decryption, Database Storage
Annotation:
The work deals with the encryption methods of the information stored in the database. This issue is very relevant today, as the storage and protection of confidential data on the Internet from unauthorized access is a complicated issue, but the problem in many cases. Variety of crypt algorythms are used to solve these problems. The paper is dedicated to analyzing and realizing one of the most secure algorithms (following from the capacity of a computer, breaking it is remote from reality). The article suggests the various methods of keeping information secret in database. Data Encryption suggests the encryption technology, which converts plain text in encrypted data, which is why the text (data) is unknown and incomprehensible to others, except those who do not have the key (keys). Crypt algorithms implemented programmatically. As a result, application is created, which can be used in the form of a database management system to store secret data in order to be protected.