Year of Publication: 2013
Page Numbers: 232-238
Authors: Mohammad V. Malakooti, Ebrahim Akhavan Bazofti
Conference Name: The International Conference on Electrical and Electronics Engineering, Clean Energy and Green Computing (EEECEGC2013)
- United Arab Emirates


In this paper, we have developed a robust encryption system for the database tables based on the orthogonal transform to increase the security of its content. We also presented a secure database model based on the hash algorithm and a cellular automaton to turn on the attack alarm while the database is unlocked and in active mode but it is accessed by illegal user. Our proposed encryption and decryption algorithm is categorized as symmetric cryptography in which a common key is used for both encryption and decryption processes as oppose to asymmetric one that two keys, private and public key, are required. We have used the property of orthogonal matrix to calculate the inverse of the transformation matrix based on its matrix transpose rather than direct calculation of its inverse during the decryption process to speed up the operations. We have generated a secret key sequence to apply the XOR operations on the data elements of all tables in the database during the encryption and decryption processes. We used Malakooti Orthogonal Transform (M-T) and the internal rules of cellular automata to encrypt the data elements inside the database through a proper method with a high degree of security. The Encrypted database elements can only be displayed when the XOR operation is applied on these data elements and the secret keys generated by Malakooti Key Generator algorithm. Our algorithm is able to encrypt the data elements of each table inside the database with a high degree of security. In addition, our proposed method can be applied to all data elements of the database kept on servers as the backup and archive. Using orthogonal transformation (M-T) and proposed highly strong and irreversible hash algorithm, we have introduced a new secure database model to protect the vital information online and inside the database servers from the illegal users and hackers.