Distribution Algorithms and Encryption Schemes

Summary
Results of Task 4.1 – 4.3. This document lists all the distribution and encryption algorithms. The algorithms are rated for their ability to satisfy security needs like privacy, integrity and availability. The result is a document with the architecture, algorithms and the explanation of design choices. Finally, the architecture is presented and it is shown how the algorithms are used in the database proxy.