|
- 2017
Using Cryptology in Enforcing Database Security Traveling Through Networks and Cloud ComputingDOI: 10.15226/2474-9257/2/3/00116 Abstract: This paper discusses what cryptography is, the practice of using cryptography, and different cryptographic algorithms and their strengths and weaknesses. Cryptographic measures are often the last line of security in a potential security breach and it is important to implement into an organization’s security grid. However, using a cryptographic system does come with risks. This paper will go over those risks as well as what makes a cryptographic system strong and what makes them weak. Using a weak cryptographic system can be worse than using no cryptography at all, and we will look into some of the potential attacks on a weak cryptographic system
|