Research Article
SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm
Table 1
Compare experimental results.
| Database | SQLite | Access |
| Easy to get | Download directly from the Internet | Download directly from the Internet | Easy to decrypt | The encryption mechanism is relatively complete, the password has no fixed rules, and it is difficult to decrypt | The encryption mechanism is relatively simple; even if a password is set, decryption is easy | Data read | Notepad, etc. | Office tools | Data storage | Binary stream | Mdb file, easy to read |
|
|