March 31, 2011 at 5:12 pm
since TDE does whole DB encryption, and with less overhead, what may be situation where column only encryption would be a better choice to use with SQL 2008? or is it a feature really ready to become obsolete?
March 31, 2011 at 5:45 pm
repent_kog_is_near (3/31/2011)
since TDE does whole DB encryption, and with less overhead, what may be situation where column only encryption would be a better choice to use with SQL 2008? or is it a feature really ready to become obsolete?
Less overhead? Where did you get that?
There are significant disadvantages to TDE:
Reqires significant CPU power to encrypt/decrypt the data on the fly.
Requires Enterprise Edition
Prevents effective database backup compression.
TDE protects the data "on disk", but does not protect against ordinary users with data reader access to the database from being able to see the encrypted data.
April 1, 2011 at 7:13 am
>>Less overhead? Where did you get that?
quoted from http://msdn.microsoft.com/en-us/library/cc278098%28v=sql.100%29.aspx
"
performance for a very basic query (that selects and decrypts a single encrypted column) when using cell-level encryption tends to be around 20% worse. This inversely scales with workload size resulting in performance degradations that are several magnitudes worse when attempting to encrypt an entire database. One sample application with 10,000 rows was four times worse with one column encrypted, and 20 times worse with nine columns encrypted. Because cell-level encryption is custom to each application, performance degradation will vary depending on application and workload specifics. As noted in Impact on the Database, this compares to 3-5% for TDE on average and 28% in the worst case (assuming the encryption scan is not running)."
April 1, 2011 at 7:48 am
>>Reqires significant CPU power to encrypt/decrypt the data on the fly.
This is true for column-level encryption, too?
April 1, 2011 at 11:28 am
Usually, you only encrypt one or two columns in a database, like a credit card number, and when you encrypt column level data, you only encrypt it when you add new rows or change data in that column. When you query the data you only need to decrypt the encrypted data if the cleartext of that particular column is needed in a particular query.
With TDE, everything in the database is encrypted, so the overhead is present in every operation.
April 1, 2011 at 1:17 pm
I've also seen folks that do it just the opposite. Encrypt the item you're trying to find and look that up in the encrypted column. Makes for a nice SARG-able search.
--Jeff Moden
Change is inevitable... Change for the better is not.
April 6, 2011 at 1:39 pm
Jeff Moden (4/1/2011)
I've also seen folks that do it just the opposite. Encrypt the item you're trying to find and look that up in the encrypted column. Makes for a nice SARG-able search.
This doesn't work due to the randomization of good encryption algorithms. If your algorithm produces the same results every time it is less secure than one that doesn't. What people do is put an index on the hash of the (unencrypted) date and do the lookup that way.
The probability of survival is inversely proportional to the angle of arrival.
April 7, 2011 at 8:23 am
sturner (4/6/2011)
Jeff Moden (4/1/2011)
I've also seen folks that do it just the opposite. Encrypt the item you're trying to find and look that up in the encrypted column. Makes for a nice SARG-able search.This doesn't work due to the randomization of good encryption algorithms. If your algorithm produces the same results every time it is less secure than one that doesn't. What people do is put an index on the hash of the (unencrypted) date and do the lookup that way.
And if this does work, you want to re-examine your encryption algorithms.
April 7, 2011 at 9:25 am
sturner (4/6/2011)
Jeff Moden (4/1/2011)
I've also seen folks that do it just the opposite. Encrypt the item you're trying to find and look that up in the encrypted column. Makes for a nice SARG-able search.This doesn't work due to the randomization of good encryption algorithms. If your algorithm produces the same results every time it is less secure than one that doesn't. What people do is put an index on the hash of the (unencrypted) date and do the lookup that way.
The indexed hash partially defeats the security of randomization of the encryption algorithm, since the hash will be the same for every occurrence of the same cleartext value.
For example, a hash of SSN could be used to defeat the encryption of the SSN, because it's easy to create a table of all one billion possible SSNs and their matching hash if the hash algorithm is known or can be guessed.
For a value with a larger domain, like credit card numbers, that method is less effective, since you would have to create 10 to the 16th power hashes to cover all possible credit card numbers. However, it still reduces the security of the data.
Viewing 9 posts - 1 through 8 (of 8 total)
You must be logged in to reply to this topic. Login to reply