Certificates are containers for asymmetric encryption keys that can be used to establish a chain of trust between communicating parties. Read on to see how this works in practice.
SQL Server groups all pages that belong to a single partition of a single index or heap into logical units. These units are called allocation units. Read on to learn about the different types of allocation units and discover how to identify the allocation units belonging to a table.
Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt. Read on to see the advantages and disadvantages of this type of encryption.
A symmetric key encryption algorithm is a cryptographic algorithm the uses the same secret key for the encryption and the decryption step. Common examples include DES, RC4 and AES of which only AES can be recommended for use.
Cryptographic terminology can be sometimes somewhat “cryptic”. This post starts out a series to provide a glossary of cryptographic terms. Each post in this series will cover one cryptographic expression in detail.