Encrypted databases

Ben.Goren at asu.edu Ben.Goren at asu.edu
Wed Jun 15 17:31:19 PDT 1994


In _Applied Cryptography,_ Bruce Schneier describes a method of encrypting
a database in such a way that it's easy to get individual entries but
"impossible" to get the whole database. Basically, the first field is a
hash of the individual's last name, the second is encrypted (symmentrical
algorithm) w/ that name and contains the rest of the info.

Are there any readily available implementations of this or anything
equivalent? I've a use for such, but I'm not likely to have the time to
start writing anything like that for a month or two.

Thanks,

b&

--
Ben.Goren at asu.edu, Arizona State University School of Music
 net.proselytizing (write for info): Protect your privacy; oppose Clipper.
 Voice concern over proposed Internet pricing schemes. Stamp out spamming.
 Finger ben at tux.music.asu.edu for PGP 2.3a public key.








More information about the cypherpunks-legacy mailing list