Don’t get caught in this nasty trap that will cause all your encrypted data to be wiped out. Discover how to use the OPEN SYMMETRIC KEY statement correctly to protect yourself (and your data) from this ugly surprise.
The HASHBYTES function provides a simple way to calculate cryptographic hash values in T-SQL. Read on to learn how to use this function and discover its two limitations.
Do you have a symmetric key in a SQL Server database but forgot how it is encrypted? Discover how you can use the sys.key_encryptions catalog view to find out which protection mechanisms were used to encrypt the symmetric keys in the current database.
Are you a covered entity under the HIPAA rules and do you store PHI (Protected Health Information) in your database? Here are five reasons why you really should encrypt that data.
Where do you turn if you need information about the symmetric keys in the current database? Meet the sys.symmetric_keys catalog view and discover what types of information on symmetric keys it can provide.