{"id":11107,"date":"2019-03-27T06:46:11","date_gmt":"2019-03-27T06:46:11","guid":{"rendered":"https:\/\/dbtut.com\/?p=11107"},"modified":"2019-03-27T14:04:50","modified_gmt":"2019-03-27T14:04:50","slug":"encryptions-in-sql-server","status":"publish","type":"post","link":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/","title":{"rendered":"Encryptions in SQL Server"},"content":{"rendered":"<p><span style=\"font-family: arial, helvetica, sans-serif\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Security is the biggest concern nowadays particularly for those who manage critical applications.Every database must have high secured features to ensure the data is always safe. In recent years the rate of ransom attack has increased a lot. Encryption feature protects data from a threat as well as hacking. In this article, we are going to discuss the various encryption techniques available in SQL Server. Encryption can be carried out by the two methods. The below are the two methods:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Column-level Encryption(CLE)<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Transparent Data Encryption(TDE)<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong><u>CLE:<\/u><\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Features:<\/strong><\/span><\/p>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l1 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">Column level encryption supported by SQL server 2005 server &amp; available for all editions.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l1 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">It is a method of database encryption in which the information in every cell (or data field) in a particular column has the same password for access, reading, and writing purposes.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l1 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">This method uses a master key &amp; certificate method to encrypt a particular column of data which can be viewed<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l1 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">The data in the particular column will be an encrypted format<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Drawbacks<\/strong><\/span><\/p>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l3 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">It has reduced or limited available query optimization functions<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l3 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">Increased data file size, increased demands on system resource<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong><u>TDE:<\/u><\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><u><\/u><strong>Features<\/strong><\/span><\/p>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">Transparent data encryption feature is present only in the SQL Server Enterprise edition of 2008,2012.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">It&#8217;s not available for the other SQL server editions such as the Business Intelligence, Standard or Express.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">Protects data by encrypting the physical files of the database, rather than the data itself.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">TDE protects data &#8220;at rest&#8221;, meaning the data and log files.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">TDE performs real-time I\/O encryption and decryption of the data and log files.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">The process involves encryption of data using the key &amp; certificate creation.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">Protect backup from unauthorized access.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Drawbacks<\/strong><\/span><\/p>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">When enabling TDE, you should immediately back up the certificate and the private key associated with the certificate.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">If the certificate ever becomes unavailable or if you must restore or attach the database on another server, you must have backups of both the certificate and the private key or you will not be able to open the database.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"font-weight: 400\">\n<li data-blogger-escaped-style=\"line-height: normal; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; vertical-align: baseline;\"><span style=\"font-family: arial, helvetica, sans-serif\">Increase in the performance cost if the encrypted data is an index.<\/span><\/li>\n<\/ul>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_11107\" class=\"pvc_stats all  \" data-element-id=\"11107\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Security is the biggest concern nowadays particularly for those who manage critical applications.Every database must have high secured features to ensure the data is always safe. In recent years the rate of ransom attack has increased a lot. Encryption feature protects data from a threat as &hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_11107\" class=\"pvc_stats all  \" data-element-id=\"11107\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":98,"featured_media":11108,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[3,1596,1524],"tags":[1724],"class_list":["post-11107","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-mssql","category-tsql","category-windows","tag-encrypting-sql-server-objects"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Encryptions in SQL Server - Database Tutorials<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryptions in SQL Server - Database Tutorials\" \/>\n<meta property=\"og:description\" content=\"\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Security is the biggest concern nowadays particularly for those who manage critical applications.Every database must have high secured features to ensure the data is always safe. In recent years the rate of ransom attack has increased a lot. Encryption feature protects data from a threat as &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/\" \/>\n<meta property=\"og:site_name\" content=\"Database Tutorials\" \/>\n<meta property=\"article:author\" content=\"http:\/\/in.linkedin.com\/in\/jerwinroy\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-27T06:46:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-27T14:04:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/03\/mssql-intro.png\" \/>\n\t<meta property=\"og:image:width\" content=\"511\" \/>\n\t<meta property=\"og:image:height\" content=\"256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jerwin Roy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/JerwinRoy\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jerwin Roy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/\"},\"author\":{\"name\":\"Jerwin Roy\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/1392289282fd1b53969104d8b35e8ff3\"},\"headline\":\"Encryptions in SQL Server\",\"datePublished\":\"2019-03-27T06:46:11+00:00\",\"dateModified\":\"2019-03-27T14:04:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/\"},\"wordCount\":349,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/03\/mssql-intro.png\",\"keywords\":[\"Encrypting SQL Server Objects\"],\"articleSection\":[\"MSSQL\",\"TSQL\",\"Windows\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/\",\"url\":\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/\",\"name\":\"Encryptions in SQL Server - Database Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/03\/mssql-intro.png\",\"datePublished\":\"2019-03-27T06:46:11+00:00\",\"dateModified\":\"2019-03-27T14:04:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#primaryimage\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/03\/mssql-intro.png\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/03\/mssql-intro.png\",\"width\":511,\"height\":256},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dbtut.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryptions in SQL Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dbtut.com\/#website\",\"url\":\"https:\/\/dbtut.com\/\",\"name\":\"Database Tutorials\",\"description\":\"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux\",\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dbtut.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dbtut.com\/#organization\",\"name\":\"dbtut\",\"url\":\"https:\/\/dbtut.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"width\":223,\"height\":36,\"caption\":\"dbtut\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/1392289282fd1b53969104d8b35e8ff3\",\"name\":\"Jerwin Roy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d362cb6ec946a7bccb4b53862e8f9ca8ba82af0fd90473fd743597321ce62e6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d362cb6ec946a7bccb4b53862e8f9ca8ba82af0fd90473fd743597321ce62e6e?s=96&d=mm&r=g\",\"caption\":\"Jerwin Roy\"},\"description\":\"Aspiring DBA\",\"sameAs\":[\"http:\/\/in.linkedin.com\/in\/jerwinroy\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/JerwinRoy\"],\"url\":\"https:\/\/dbtut.com\/index.php\/author\/jerwinroy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encryptions in SQL Server - Database Tutorials","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/","og_locale":"en_US","og_type":"article","og_title":"Encryptions in SQL Server - Database Tutorials","og_description":"\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Security is the biggest concern nowadays particularly for those who manage critical applications.Every database must have high secured features to ensure the data is always safe. In recent years the rate of ransom attack has increased a lot. Encryption feature protects data from a threat as &hellip;","og_url":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/","og_site_name":"Database Tutorials","article_author":"http:\/\/in.linkedin.com\/in\/jerwinroy\/","article_published_time":"2019-03-27T06:46:11+00:00","article_modified_time":"2019-03-27T14:04:50+00:00","og_image":[{"width":511,"height":256,"url":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/03\/mssql-intro.png","type":"image\/png"}],"author":"Jerwin Roy","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/JerwinRoy","twitter_misc":{"Written by":"Jerwin Roy","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#article","isPartOf":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/"},"author":{"name":"Jerwin Roy","@id":"https:\/\/dbtut.com\/#\/schema\/person\/1392289282fd1b53969104d8b35e8ff3"},"headline":"Encryptions in SQL Server","datePublished":"2019-03-27T06:46:11+00:00","dateModified":"2019-03-27T14:04:50+00:00","mainEntityOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/"},"wordCount":349,"commentCount":0,"publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/03\/mssql-intro.png","keywords":["Encrypting SQL Server Objects"],"articleSection":["MSSQL","TSQL","Windows"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/","url":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/","name":"Encryptions in SQL Server - Database Tutorials","isPartOf":{"@id":"https:\/\/dbtut.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#primaryimage"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/03\/mssql-intro.png","datePublished":"2019-03-27T06:46:11+00:00","dateModified":"2019-03-27T14:04:50+00:00","breadcrumb":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#primaryimage","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/03\/mssql-intro.png","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/03\/mssql-intro.png","width":511,"height":256},{"@type":"BreadcrumbList","@id":"https:\/\/dbtut.com\/index.php\/2019\/03\/27\/encryptions-in-sql-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dbtut.com\/"},{"@type":"ListItem","position":2,"name":"Encryptions in SQL Server"}]},{"@type":"WebSite","@id":"https:\/\/dbtut.com\/#website","url":"https:\/\/dbtut.com\/","name":"Database Tutorials","description":"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux","publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dbtut.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dbtut.com\/#organization","name":"dbtut","url":"https:\/\/dbtut.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","width":223,"height":36,"caption":"dbtut"},"image":{"@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dbtut.com\/#\/schema\/person\/1392289282fd1b53969104d8b35e8ff3","name":"Jerwin Roy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d362cb6ec946a7bccb4b53862e8f9ca8ba82af0fd90473fd743597321ce62e6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d362cb6ec946a7bccb4b53862e8f9ca8ba82af0fd90473fd743597321ce62e6e?s=96&d=mm&r=g","caption":"Jerwin Roy"},"description":"Aspiring DBA","sameAs":["http:\/\/in.linkedin.com\/in\/jerwinroy\/","https:\/\/x.com\/https:\/\/twitter.com\/JerwinRoy"],"url":"https:\/\/dbtut.com\/index.php\/author\/jerwinroy\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/11107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/users\/98"}],"replies":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/comments?post=11107"}],"version-history":[{"count":0,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/11107\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media\/11108"}],"wp:attachment":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media?parent=11107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/categories?post=11107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/tags?post=11107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}