Rsa Rc4 Algorithm For High Speed Encryption; Oracle Advanced Security Data Integrity - Oracle Database B10772-01 Administrator's Manual

Database
Table of Contents

Advertisement

of message security, but with a performance penalty. The magnitude of the
performance penalty depends on the speed of the processor performing the
encryption. 3DES typically takes three times as long to encrypt a data block when
compared to the standard DES algorithm.
3DES is available in two-key and three-key versions, with effective key lengths of
112-bits and 168-bits, respectively. Both versions operate in outer
Chaining (CBC)
DES40 Algorithm
The DES40 algorithm, available in every release of Oracle Advanced Security,
Oracle Advanced Networking Option, and Secure Network Services, is a variant of
DES in which the secret key is preprocessed to provide 40 effective key bits. It was
designed to provide DES-based encryption to customers outside the U.S. and
Canada at a time when the U.S. export laws were more restrictive. Now, in Oracle
Advanced Security 10g Release 1 (10.1), DES40, DES, and 3DES are all available for
export. DES40 is still supported to provide backward-compatibility for international
customers.

RSA RC4 Algorithm for High Speed Encryption

The RC4 algorithm, developed by RSA Data Security Inc., has become the
international standard for high-speed data encryption. RC4 is a variable key-length
stream cipher that operates at several times the speed of DES, making it possible to
encrypt large, bulk data transfers with minimal performance consequences.
Oracle Advanced Security 10g Release 1 (10.1) provides an RC4 implementation
with 40-bit, 56-bit, 128-bit, and 256-bit key lengths. This provides
backward-compatibility and strong encryption, with no material performance
compromise.

Oracle Advanced Security Data Integrity

Encryption of network data provides data privacy so that unauthorized parties are
not able to view plaintext data as it passes over the network. Oracle Advanced
Security also provides protection against two forms of active attack:
mode.
See Also:
"Configuring Encryption on the Client and the Server"
page 3-9.
Table 3–2, "Valid Encryption Algorithms"
Configuring Network Data Encryption and Integrity for Oracle Servers and Clients 3-3
Oracle Advanced Security Data Integrity
Cipher Block
on
on page 3-11.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Oracle Database B10772-01 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Database advanced security 10g release 1

Table of Contents