Preventing SQL Injection Attacks Using a Cryptography Technique

dc.contributor.authorRadjai, Marwan
dc.contributor.authorSupervisor: Chikouche, Noureddine
dc.contributor.authorCo- Supervisor: Fernini, L. Belabdelouahab
dc.date.accessioned2023-05-29T09:01:35Z
dc.date.available2023-05-29T09:01:35Z
dc.date.issued2016-06-10
dc.description.abstractWith the spread of Internet use in the world, security threats in the Internet increased dramatically. Among the vulnerabilities of the web application is SQL injection, which is based on the insertion of malicious requests to the DBMS, which executes these requests denier allowing access to. sensitive and confidentiel data. The purpose of this research paper is to find the best way to protect Web applications and sensitive data against hackers and security breaches through the use of effective encryption systems which, in turn, provide a significant degree of protection for Web applications. We made a thorough stildy of the different optimal strategies based on encryption in their content. We dealt With the e-Signature and its effective role in the protection of data. We applied encryption algorithms such as ECC, NTRUand of some of the techniques used to protect and prevent contaminated queries that are entered by the attacker.en_US
dc.identifier.urihttp://dspace.univ-msila.dz:8080//xmlui/handle/123456789/38899
dc.language.isoenen_US
dc.publisherUniversity of M'silaen_US
dc.subjectECC, RSA, SQL, SQLI, NTRU, Elgmal, PHPMyadmin.en_US
dc.titlePreventing SQL Injection Attacks Using a Cryptography Techniqueen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Marwan Radjai.PDF
Size:
7.29 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections