Home Database Mysql Tutorial How to encrypt and decrypt data in MySQL?

How to encrypt and decrypt data in MySQL?

Jul 30, 2023 pm 09:13 PM
mysql data encryption mysql data encryption and decryption

How to encrypt and decrypt data in MySQL?

Abstract: Data security is an important aspect of database management. This article will introduce how to use encryption algorithms to encrypt and decrypt data in MySQL to improve data security.

1. Introduction
In the modern information society, data security issues are becoming more and more important. The data stored in the database may contain sensitive information, such as user passwords, bank account numbers, etc. In order to prevent data leakage and illegal acquisition, we need to encrypt and store this sensitive information.

MySQL is a commonly used relational database management system that provides rich encryption functions. The following describes how to use symmetric encryption algorithms and asymmetric encryption algorithms to encrypt and decrypt data in MySQL.

2. Symmetric encryption algorithm
Symmetric encryption algorithm uses the same key to encrypt and decrypt data. MySQL provides the AES_ENCRYPT and AES_DECRYPT functions, which can use the AES algorithm to encrypt and decrypt data.

  1. Create table
    First, we create a table to store encrypted data. You can use the following SQL statement to create a table named encrypted_data:
CREATE TABLE encrypted_data (
  id INT PRIMARY KEY AUTO_INCREMENT,
  data BLOB
);
Copy after login

Among them, the data column is used to store encrypted data.

  1. Data Encryption
    To encrypt data, we can use the AES_ENCRYPT function. The following is an example:
INSERT INTO encrypted_data (data) VALUES (AES_ENCRYPT('sensitive data', 'secret key'));
Copy after login

In this example, we encrypt the data sensitive data using the key secret key, and encrypt the Data is inserted into the encrypted_data table.

  1. Data Decryption
    To decrypt data, we can use the AES_DECRYPT function. The following is an example:
SELECT id, AES_DECRYPT(data, 'secret key') AS decrypted_data FROM encrypted_data;
Copy after login

In this example, we decrypt the data in the encrypted_data table through the AES_DECRYPT function, and use the decrypted data as decrypted_dataThe value of the column is returned.

3. Asymmetric encryption algorithm
The asymmetric encryption algorithm uses a pair of keys, namely the public key and the private key. The public key is used to encrypt data and the private key is used to decrypt data. MySQL provides the RSA function and OPENSSL library, which can implement asymmetric encryption algorithms.

  1. Generate key pair
    First, we need to generate a pair of keys, using the RSA_NEWKEY function. The following is an example:
SET @private_key = '';
SET @public_key = '';
SELECT RSA_NEWKEY(2048, @private_key, @public_key);
SELECT @private_key, @public_key;
Copy after login

In this example, we use the RSA_NEWKEY function to generate a pair of 2048-bit RSA key pairs, and separate the private key and public key. Assign values ​​to @private_key and @public_key variables.

  1. Data Encryption
    To encrypt data, we can use the RSA_ENCRYPT function. Here is an example:
INSERT INTO encrypted_data (data) VALUES (RSA_ENCRYPT('sensitive data', @public_key));
Copy after login

In this example, we encrypt the data sensitive data using the public key and insert the encrypted data into encrypted_data in the table.

  1. Data Decryption
    To decrypt data, we can use the RSA_DECRYPT function. The following is an example:
SELECT id, RSA_DECRYPT(data, @private_key) AS decrypted_data FROM encrypted_data;
Copy after login

In this example, we use the private key to decrypt the data in the encrypted_data table through the RSA_DECRYPT function, and will decrypt the The data is returned as the value of the decrypted_data column.

Conclusion:
Data security is an important aspect of database management. In MySQL, we can use symmetric encryption algorithms and asymmetric encryption algorithms to encrypt and decrypt data for storage. Through reasonable selection of encryption algorithms and key management, data security can be effectively improved and sensitive information can be prevented from being leaked and illegally obtained.

The above is an introduction on how to encrypt and decrypt data in MySQL. I hope it will be helpful to you.

Reference:

  • MySQL official documentation: https://dev.mysql.com/doc/refman/8.0/en/encryption-functions.html

The above is the detailed content of How to encrypt and decrypt data in MySQL?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

MySQL: An Introduction to the World's Most Popular Database MySQL: An Introduction to the World's Most Popular Database Apr 12, 2025 am 12:18 AM

MySQL is an open source relational database management system, mainly used to store and retrieve data quickly and reliably. Its working principle includes client requests, query resolution, execution of queries and return results. Examples of usage include creating tables, inserting and querying data, and advanced features such as JOIN operations. Common errors involve SQL syntax, data types, and permissions, and optimization suggestions include the use of indexes, optimized queries, and partitioning of tables.

MySQL's Place: Databases and Programming MySQL's Place: Databases and Programming Apr 13, 2025 am 12:18 AM

MySQL's position in databases and programming is very important. It is an open source relational database management system that is widely used in various application scenarios. 1) MySQL provides efficient data storage, organization and retrieval functions, supporting Web, mobile and enterprise-level systems. 2) It uses a client-server architecture, supports multiple storage engines and index optimization. 3) Basic usages include creating tables and inserting data, and advanced usages involve multi-table JOINs and complex queries. 4) Frequently asked questions such as SQL syntax errors and performance issues can be debugged through the EXPLAIN command and slow query log. 5) Performance optimization methods include rational use of indexes, optimized query and use of caches. Best practices include using transactions and PreparedStatemen

Why Use MySQL? Benefits and Advantages Why Use MySQL? Benefits and Advantages Apr 12, 2025 am 12:17 AM

MySQL is chosen for its performance, reliability, ease of use, and community support. 1.MySQL provides efficient data storage and retrieval functions, supporting multiple data types and advanced query operations. 2. Adopt client-server architecture and multiple storage engines to support transaction and query optimization. 3. Easy to use, supports a variety of operating systems and programming languages. 4. Have strong community support and provide rich resources and solutions.

How to connect to the database of apache How to connect to the database of apache Apr 13, 2025 pm 01:03 PM

Apache connects to a database requires the following steps: Install the database driver. Configure the web.xml file to create a connection pool. Create a JDBC data source and specify the connection settings. Use the JDBC API to access the database from Java code, including getting connections, creating statements, binding parameters, executing queries or updates, and processing results.

How to start mysql by docker How to start mysql by docker Apr 15, 2025 pm 12:09 PM

The process of starting MySQL in Docker consists of the following steps: Pull the MySQL image to create and start the container, set the root user password, and map the port verification connection Create the database and the user grants all permissions to the database

MySQL's Role: Databases in Web Applications MySQL's Role: Databases in Web Applications Apr 17, 2025 am 12:23 AM

The main role of MySQL in web applications is to store and manage data. 1.MySQL efficiently processes user information, product catalogs, transaction records and other data. 2. Through SQL query, developers can extract information from the database to generate dynamic content. 3.MySQL works based on the client-server model to ensure acceptable query speed.

Laravel Introduction Example Laravel Introduction Example Apr 18, 2025 pm 12:45 PM

Laravel is a PHP framework for easy building of web applications. It provides a range of powerful features including: Installation: Install the Laravel CLI globally with Composer and create applications in the project directory. Routing: Define the relationship between the URL and the handler in routes/web.php. View: Create a view in resources/views to render the application's interface. Database Integration: Provides out-of-the-box integration with databases such as MySQL and uses migration to create and modify tables. Model and Controller: The model represents the database entity and the controller processes HTTP requests.

How to install mysql in centos7 How to install mysql in centos7 Apr 14, 2025 pm 08:30 PM

The key to installing MySQL elegantly is to add the official MySQL repository. The specific steps are as follows: Download the MySQL official GPG key to prevent phishing attacks. Add MySQL repository file: rpm -Uvh https://dev.mysql.com/get/mysql80-community-release-el7-3.noarch.rpm Update yum repository cache: yum update installation MySQL: yum install mysql-server startup MySQL service: systemctl start mysqld set up booting

See all articles