Database Security using Block Cipher Algorithm: A Cryptography Project
VerifiedAdded on 2025/04/17
|15
|1145
|75
AI Summary
Desklib provides past papers and solved assignments for students. This project demonstrates database security using cryptography.

Cryptography
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Cryptography...................................................................................................................................1
Table of Figures...............................................................................................................................2
Introduction......................................................................................................................................3
LO1..................................................................................................................................................4
LO2..................................................................................................................................................5
LO3..................................................................................................................................................6
Process for Encoding & Decoding of Database.......................................................................6
LO4................................................................................................................................................14
Conclusion.....................................................................................................................................15
Table of Figures
Figure 1: Installing VM Ware Machine...........................................................................................6
Figure 2: Installing Ubuntu in Virtual Machine..............................................................................7
Figure 3: Installing UBUNTU.........................................................................................................7
Figure 4: Installing UBUNTU in VM Ware....................................................................................8
Figure 5: installing apache server....................................................................................................8
Figure 6: Opening Apache Server...................................................................................................9
Figure 7: installing mysql server.....................................................................................................9
Figure 8: starting mysql server......................................................................................................10
Figure 9: allowing MYSQL...........................................................................................................10
Figure 10: installing PHP...............................................................................................................11
Figure 11: HTML form..................................................................................................................11
Figure 12: Applying Block Cipher Alogirthm...............................................................................12
Figure 13: Index Page....................................................................................................................12
Figure 14: Encrypted Data into Database......................................................................................13
Figure 15: Index Page....................................................................................................................14
Figure 16: Encrypted Stored Data.................................................................................................14
Cryptography...................................................................................................................................1
Table of Figures...............................................................................................................................2
Introduction......................................................................................................................................3
LO1..................................................................................................................................................4
LO2..................................................................................................................................................5
LO3..................................................................................................................................................6
Process for Encoding & Decoding of Database.......................................................................6
LO4................................................................................................................................................14
Conclusion.....................................................................................................................................15
Table of Figures
Figure 1: Installing VM Ware Machine...........................................................................................6
Figure 2: Installing Ubuntu in Virtual Machine..............................................................................7
Figure 3: Installing UBUNTU.........................................................................................................7
Figure 4: Installing UBUNTU in VM Ware....................................................................................8
Figure 5: installing apache server....................................................................................................8
Figure 6: Opening Apache Server...................................................................................................9
Figure 7: installing mysql server.....................................................................................................9
Figure 8: starting mysql server......................................................................................................10
Figure 9: allowing MYSQL...........................................................................................................10
Figure 10: installing PHP...............................................................................................................11
Figure 11: HTML form..................................................................................................................11
Figure 12: Applying Block Cipher Alogirthm...............................................................................12
Figure 13: Index Page....................................................................................................................12
Figure 14: Encrypted Data into Database......................................................................................13
Figure 15: Index Page....................................................................................................................14
Figure 16: Encrypted Stored Data.................................................................................................14

Introduction
In this assignment, it is having database connectivity with fetching & storing information from
database and into database. When the information is stored into database, it should be in encoded
form such that no one can steel our data. For this, we use some cryptography algorithms like
block cipher algorithm and Rivest Shamir Adleman etc. First of all, create database using
MYSQL and insert data into database after that we add cryptography algorithm. And data is
encrypted at database. But, when we want to show the data at user interface then it is decoded on
user panel side. Here in this assignment, I have mentioned steps by following them we can
completed this task requirement.
In this assignment, it is having database connectivity with fetching & storing information from
database and into database. When the information is stored into database, it should be in encoded
form such that no one can steel our data. For this, we use some cryptography algorithms like
block cipher algorithm and Rivest Shamir Adleman etc. First of all, create database using
MYSQL and insert data into database after that we add cryptography algorithm. And data is
encrypted at database. But, when we want to show the data at user interface then it is decoded on
user panel side. Here in this assignment, I have mentioned steps by following them we can
completed this task requirement.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LO1
Proportional logic is branch of logic which is working on true or false. Either the condition is
true or false. A function is a set of instruction or information through which a specific task is
implemented or completed. Now a days some reasoning statements are also used for applying
some instruction in theoretical form. Set, function and relation, these all entities are
interconnected with each other. In set, it is containing data type or information which is to be
passed into function arguments. In function, it has definition of task. In relation, it is having how
these all elements are connected with each other and passing of parameters through it.
Proportional logic is branch of logic which is working on true or false. Either the condition is
true or false. A function is a set of instruction or information through which a specific task is
implemented or completed. Now a days some reasoning statements are also used for applying
some instruction in theoretical form. Set, function and relation, these all entities are
interconnected with each other. In set, it is containing data type or information which is to be
passed into function arguments. In function, it has definition of task. In relation, it is having how
these all elements are connected with each other and passing of parameters through it.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

LO2
There are various algorithm through which we can implement encryption of data or information
in encoded form for making it more secure. Here, for this assignment is have used block cipher
algorithm. In this algorithm, first of all user information is passed through a block of plain text to
encryption process. At encryption process, encryption key is added or embedded with plain text
for making it not understandable. Here, block size doesn’t affect any strength of scheme with
block of cipher text. At block of cipher text, again code is encoded and generated cipher bits.
Some other algorithms are also there: and DES (Data Encryption System), AES (Advance
Encryption Standard) & Rivest Shamir Adleman (RSA) algorithm.
There are various algorithm through which we can implement encryption of data or information
in encoded form for making it more secure. Here, for this assignment is have used block cipher
algorithm. In this algorithm, first of all user information is passed through a block of plain text to
encryption process. At encryption process, encryption key is added or embedded with plain text
for making it not understandable. Here, block size doesn’t affect any strength of scheme with
block of cipher text. At block of cipher text, again code is encoded and generated cipher bits.
Some other algorithms are also there: and DES (Data Encryption System), AES (Advance
Encryption Standard) & Rivest Shamir Adleman (RSA) algorithm.

LO3
Process for Encoding & Decoding of Database
Here below I have mentioned some steps or process, by following them we are able to
understand that how we can embed these techniques using MYSQL as database using PHP as
server side scripting platform on UBUNTU in virtual machine ware (VM Ware) and these are:
First of all install virtual machine into your computer or desktop. This is named as VM
ware workstation.
Figure 1: Installing VM Ware Machine
After installing this open VM ware virtual machine. A window will be opened and in this
window it is having the link named as create a new virtual machine. Now, click on this
button and select custom feature. After this a new pop up will become, in that pop up you
have to give path of UBUNTU set up with. ISO extension & click on next button and
install it.
Process for Encoding & Decoding of Database
Here below I have mentioned some steps or process, by following them we are able to
understand that how we can embed these techniques using MYSQL as database using PHP as
server side scripting platform on UBUNTU in virtual machine ware (VM Ware) and these are:
First of all install virtual machine into your computer or desktop. This is named as VM
ware workstation.
Figure 1: Installing VM Ware Machine
After installing this open VM ware virtual machine. A window will be opened and in this
window it is having the link named as create a new virtual machine. Now, click on this
button and select custom feature. After this a new pop up will become, in that pop up you
have to give path of UBUNTU set up with. ISO extension & click on next button and
install it.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 2: Installing Ubuntu in Virtual Machine
Figure 3: Installing UBUNTU
Figure 3: Installing UBUNTU
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 4: Installing UBUNTU in VM Ware
After that we have to install MySQL database server and apache server by using some
commands like apt install mysql-server –u root –p. by using this above we can install this
mysql server. Apt install apache2 is used for installing apache server. After that it will
download some files from interenet and now on apche and mysql server both. –ufw allow
apche is used for opening server.
Figure 5: installing apache server
After that we have to install MySQL database server and apache server by using some
commands like apt install mysql-server –u root –p. by using this above we can install this
mysql server. Apt install apache2 is used for installing apache server. After that it will
download some files from interenet and now on apche and mysql server both. –ufw allow
apche is used for opening server.
Figure 5: installing apache server

Figure 6: Opening Apache Server
Figure 7: installing mysql server
Figure 7: installing mysql server
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 8: starting mysql server
After that we have successfully installed PHP into Ubuntu by using following commands
on command prompt apt install php libapache2 – mod – php – php-mysql.
Figure 9: allowing MYSQL
After that we have successfully installed PHP into Ubuntu by using following commands
on command prompt apt install php libapache2 – mod – php – php-mysql.
Figure 9: allowing MYSQL
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 10: installing PHP
After installing these above requirement we have to secure connectivity of database
MySQL. Such that, no one can steel our information. For this use below mentioned
command:
Mysql _ secure _ connection
After we have to create HTML pages for generating a form. Such that, we can take values
from user and save them into database with encrypted form and again show them on user
screen without any encryption key.
Figure 11: HTML form
For creating this, use following command that is cp index.html index. php.
After installing these above requirement we have to secure connectivity of database
MySQL. Such that, no one can steel our information. For this use below mentioned
command:
Mysql _ secure _ connection
After we have to create HTML pages for generating a form. Such that, we can take values
from user and save them into database with encrypted form and again show them on user
screen without any encryption key.
Figure 11: HTML form
For creating this, use following command that is cp index.html index. php.

Now apply block cipher algorithm for making data or information for making it more
secure.
Figure 12: Applying Block Cipher Alogirthm
Now go to internet explorer browser and open PHP file for generating output. When you
open index.php file a page will be opened as shown in below figure:
Figure 13: Index Page
secure.
Figure 12: Applying Block Cipher Alogirthm
Now go to internet explorer browser and open PHP file for generating output. When you
open index.php file a page will be opened as shown in below figure:
Figure 13: Index Page
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 15
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.

