Advertisement

Field Encryption and Authentication

  • Dorothy E. Denning

Abstract

Database encryption and authentication at the field level is attractive because it allows projections to be performed and individual data elements decrypted or authenticated. But field based protection is not usually recommended for security reasons: using encryption to hide individual data elements is vulnerable to ciphertext searching; using cryptographic checksums to authenticate individual data elements is vulnerable to plaintext or ciphertext substitution. Solutions to the security problems of field based protection are proposed.

Keywords

Cipher Block Classification Label Security Problem Data Encryption Standard Multiple Record 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Multilevel Data Managment Security. Committee On Multilevel Data Managment Security, Air Force Studies Board, National Research Council, 1982.Google Scholar
  2. 2.
    Bayer, R. and Metzger, J. K. ‘On the Encipherment of Search Trees and Random Access Files.’ ACM Trans. on Database Syst. 1, 1 (March 1976), 37–52.CrossRefGoogle Scholar
  3. 3.
    Davida, G. I., Wells, D. L. and Kam, J. B. ‘A Database Encryption System with Subkeys.’ ACM Trans. on Database Systems 6, 2 (June 1981).CrossRefGoogle Scholar
  4. 4.
    Davies, D. W. Some Regular Properties of the ‘Data Encryption Standard’ Algorithm. In Advances in Cryptology: Proc. of CRYPTO 82, D. Chaum, R. Rivest, A. Sherman, Ed.,Plenum Pub. Co., 1983.Google Scholar
  5. 5.
    Denning, D. E.. Cryptography and Data Security. Addison-Wesley, Reading, Mass., 1982.Google Scholar
  6. 6.
    Data Encryption Standard. National Bureau of Standards, Washington, D.C., Jan., 1977. FIPS PUB 46Google Scholar
  7. 7.
    Diffie, W. and Hellman, M. Privacy and Authentication: An Introduction to Cryptography. Proc. IEEE 67, 3 (Mar. 1979), 397–427.CrossRefGoogle Scholar
  8. 8.
    Flynn, R. and Campasano, A. S. Data Dependent Keys for a Selective Encryption Terminal. Proc. NCC, Vol. 47, AFIPS Press, Montvale, N. J., 1978, pp. 1127–1129.Google Scholar
  9. 9.
    Hellman, M. E. On DES-Based, Synchronous Encryption. Dept. of Electrical Eng., Stanford Univ., Stanford, Calif., 1980.Google Scholar
  10. 10.
    Jueneman, R. R. Analysis of Certain Aspects of Output Feedback Mode. In Advances in Cryptology: Proc. of CRYPTO 82, D. Chaum, R. Rivest, A. Sherman, Ed.,Plenum Pub. Co., 1983.Google Scholar
  11. 11.
    Jueneman, R. R., Matyas, S. M. and Meyer., C. H. Authentication with Manipulation Detection Code. Proc. 1983 IEEE Symp. on Security and Privacy, IEEE, Apr., 1983.Google Scholar

Copyright information

© Plenum Press, New York 1984

Authors and Affiliations

  • Dorothy E. Denning
    • 1
  1. 1.Purdue UniversityWest LafayetteUSA

Personalised recommendations