Encryption, Decryption & Hashing Overview
This content delves into the intricate processes of encryption, decryption, and hashing for maintaining data confidentiality and security. From creating users to inserting data and using AES encryption, explore the fundamental concepts and practical applications in database management.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
ENCRYPTION, DECRYPTION, AND HASHING
Encryption, Decryption, And Hashing for Confidentiality Try to create from user1 newuser1 and move from user1 to newuser1. From newuser1 make create newuser2. From newuser2 make create table student. From newuser1 make create table faculty. From newuser2 try to insert in table created by user1. Encrypt s_password Show the table. Decrypt the s_password. Show the table.
Encryption, Decryption, And Hashing for Confidentiality CRATE table from newuser2 student
Encryption, Decryption, And Hashing for Confidentiality CRATE table from newuser1 faculty f_name f_level f_id 70 ahmad 1 10 ali 2 10 fahed 2 20 mohamad 5
Encryption, Decryption, And Hashing for Confidentiality create user qusayy identified by qus123; connect qusayy/qus123@orcl; Grant create session to qusayy; grant create user to qusayyy; alter user qusayy quota 5m on users; grant create table to qusayyy;
Encryption, Decryption, And Hashing for Confidentiality CREATE TABLE my_students ( s_id NUMBER(6) CONSTRAINT my_student_s_id_pk PRIMARY KEY, s_name VARCHAR2(30), s_password NUMBER(6), );
Encryption, Decryption, And Hashing for Confidentiality INSERT INTO my_students (s_id , s_name, s_password) VALUES (1234, qusay, 200420); INSERT INTO my_students (s_id , s_name, s_password) VALUES (4321, mohammad, 200410); INSERT INTO my_students (s_id , s_name, s_password) VALUES (1524, ali, 200430);
Encryption, Decryption, And Hashing for Confidentiality AES_ENCRYPT( qusay , MYKEY ); AES_ENCRYPT( qusay , SHA2( MYKEY ,256)); AES_DECRYPT( , SHA2( MYKEY ,256));
Encryption, Decryption, And Hashing for Confidentiality SHA2( MYKEY ,256); SELECT CAST((AES_DECRYPT(0x6DE8E9BB22D096BD 9E0CDFF5A, SHA2( MYKEY , 256))) AS CHAR);
Encryption, Decryption, And Hashing for Confidentiality UPDATE my_students SET s_name= AES_ENCRYPT( qusay , SHA2( MYKEY ,256)); SELECT CAST(AES_DECRYPT(s_name, SHA2( MYKEY , 256)) AS CHAR) FROM my_students;