Implementation of Encryption Data Table by using Multi-Keys
Maitham Ali Naji
Maitham Ali Naji, Power Engineering Department, College of Electrical and Electronic Techniques Baghdad / Iraq.
Manuscript received on May 02, 2014. | Revised Manuscript received on May 04, 2014. | Manuscript published on May 05, 2014. | PP: 14-17 | Volume-4 Issue-2, May 2014. | Retrieval Number: B2167054214/2014©BEIESP
Open Access | Ethics and Policies | Cite
©The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: The paper presents an encryption application that is able to work with data access table. In this paper the Caesar method is developed to generate one key to each record. The length of the key is computed from first word of record. The record after encryption will be stored in separate line in text file that separate each field by semicolon, this process will continue until the end of table.
Keywords: Caesar Cipher, Database Encryption, Text File, and Visual Basic