How to encrypt and decrypt data in MySQL?
Jul 30, 2023 pm 09:13 PMHow to encrypt and decrypt data in MySQL?
Abstract: Data security is an important aspect of database management. This article will introduce how to use encryption algorithms to encrypt and decrypt data in MySQL to improve data security.
1. Introduction
In the modern information society, data security issues are becoming more and more important. The data stored in the database may contain sensitive information, such as user passwords, bank account numbers, etc. In order to prevent data leakage and illegal acquisition, we need to encrypt and store this sensitive information.
MySQL is a commonly used relational database management system that provides rich encryption functions. The following describes how to use symmetric encryption algorithms and asymmetric encryption algorithms to encrypt and decrypt data in MySQL.
2. Symmetric encryption algorithm
Symmetric encryption algorithm uses the same key to encrypt and decrypt data. MySQL provides the AES_ENCRYPT and AES_DECRYPT functions, which can use the AES algorithm to encrypt and decrypt data.
- Create table
First, we create a table to store encrypted data. You can use the following SQL statement to create a table namedencrypted_data
:
CREATE TABLE encrypted_data ( id INT PRIMARY KEY AUTO_INCREMENT, data BLOB );
Among them, the data
column is used to store encrypted data.
- Data Encryption
To encrypt data, we can use theAES_ENCRYPT
function. The following is an example:
INSERT INTO encrypted_data (data) VALUES (AES_ENCRYPT('sensitive data', 'secret key'));
In this example, we encrypt the data sensitive data
using the key secret key
, and encrypt the Data is inserted into the encrypted_data
table.
- Data Decryption
To decrypt data, we can use theAES_DECRYPT
function. The following is an example:
SELECT id, AES_DECRYPT(data, 'secret key') AS decrypted_data FROM encrypted_data;
In this example, we decrypt the data in the encrypted_data
table through the AES_DECRYPT
function, and use the decrypted data as decrypted_data
The value of the column is returned.
3. Asymmetric encryption algorithm
The asymmetric encryption algorithm uses a pair of keys, namely the public key and the private key. The public key is used to encrypt data and the private key is used to decrypt data. MySQL provides the RSA function and OPENSSL library, which can implement asymmetric encryption algorithms.
- Generate key pair
First, we need to generate a pair of keys, using theRSA_NEWKEY
function. The following is an example:
SET @private_key = ''; SET @public_key = ''; SELECT RSA_NEWKEY(2048, @private_key, @public_key); SELECT @private_key, @public_key;
In this example, we use the RSA_NEWKEY
function to generate a pair of 2048-bit RSA key pairs, and separate the private key and public key. Assign values ??to @private_key
and @public_key
variables.
- Data Encryption
To encrypt data, we can use theRSA_ENCRYPT
function. Here is an example:
INSERT INTO encrypted_data (data) VALUES (RSA_ENCRYPT('sensitive data', @public_key));
In this example, we encrypt the data sensitive data
using the public key and insert the encrypted data into encrypted_data
in the table.
- Data Decryption
To decrypt data, we can use theRSA_DECRYPT
function. The following is an example:
SELECT id, RSA_DECRYPT(data, @private_key) AS decrypted_data FROM encrypted_data;
In this example, we use the private key to decrypt the data in the encrypted_data
table through the RSA_DECRYPT
function, and will decrypt the The data is returned as the value of the decrypted_data
column.
Conclusion:
Data security is an important aspect of database management. In MySQL, we can use symmetric encryption algorithms and asymmetric encryption algorithms to encrypt and decrypt data for storage. Through reasonable selection of encryption algorithms and key management, data security can be effectively improved and sensitive information can be prevented from being leaked and illegally obtained.
The above is an introduction on how to encrypt and decrypt data in MySQL. I hope it will be helpful to you.
Reference:
- MySQL official documentation: https://dev.mysql.com/doc/refman/8.0/en/encryption-functions.html
The above is the detailed content of How to encrypt and decrypt data in MySQL?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

mysqldump is a common tool for performing logical backups of MySQL databases. It generates SQL files containing CREATE and INSERT statements to rebuild the database. 1. It does not back up the original file, but converts the database structure and content into portable SQL commands; 2. It is suitable for small databases or selective recovery, and is not suitable for fast recovery of TB-level data; 3. Common options include --single-transaction, --databases, --all-databases, --routines, etc.; 4. Use mysql command to import during recovery, and can turn off foreign key checks to improve speed; 5. It is recommended to test backup regularly, use compression, and automatic adjustment.

When handling NULL values ??in MySQL, please note: 1. When designing the table, the key fields are set to NOTNULL, and optional fields are allowed NULL; 2. ISNULL or ISNOTNULL must be used with = or !=; 3. IFNULL or COALESCE functions can be used to replace the display default values; 4. Be cautious when using NULL values ??directly when inserting or updating, and pay attention to the data source and ORM framework processing methods. NULL represents an unknown value and does not equal any value, including itself. Therefore, be careful when querying, counting, and connecting tables to avoid missing data or logical errors. Rational use of functions and constraints can effectively reduce interference caused by NULL.

GROUPBY is used to group data by field and perform aggregation operations, and HAVING is used to filter the results after grouping. For example, using GROUPBYcustomer_id can calculate the total consumption amount of each customer; using HAVING can filter out customers with a total consumption of more than 1,000. The non-aggregated fields after SELECT must appear in GROUPBY, and HAVING can be conditionally filtered using an alias or original expressions. Common techniques include counting the number of each group, grouping multiple fields, and filtering with multiple conditions.

MySQL paging is commonly implemented using LIMIT and OFFSET, but its performance is poor under large data volume. 1. LIMIT controls the number of each page, OFFSET controls the starting position, and the syntax is LIMITNOFFSETM; 2. Performance problems are caused by excessive records and discarding OFFSET scans, resulting in low efficiency; 3. Optimization suggestions include using cursor paging, index acceleration, and lazy loading; 4. Cursor paging locates the starting point of the next page through the unique value of the last record of the previous page, avoiding OFFSET, which is suitable for "next page" operation, and is not suitable for random jumps.

MySQL supports transaction processing, and uses the InnoDB storage engine to ensure data consistency and integrity. 1. Transactions are a set of SQL operations, either all succeed or all fail to roll back; 2. ACID attributes include atomicity, consistency, isolation and persistence; 3. The statements that manually control transactions are STARTTRANSACTION, COMMIT and ROLLBACK; 4. The four isolation levels include read not committed, read submitted, repeatable read and serialization; 5. Use transactions correctly to avoid long-term operation, turn off automatic commits, and reasonably handle locks and exceptions. Through these mechanisms, MySQL can achieve high reliability and concurrent control.

To view the size of the MySQL database and table, you can query the information_schema directly or use the command line tool. 1. Check the entire database size: Execute the SQL statement SELECTtable_schemaAS'Database',SUM(data_length index_length)/1024/1024AS'Size(MB)'FROMinformation_schema.tablesGROUPBYtable_schema; you can get the total size of all databases, or add WHERE conditions to limit the specific database; 2. Check the single table size: use SELECTta

Character set and sorting rules issues are common when cross-platform migration or multi-person development, resulting in garbled code or inconsistent query. There are three core solutions: First, check and unify the character set of database, table, and fields to utf8mb4, view through SHOWCREATEDATABASE/TABLE, and modify it with ALTER statement; second, specify the utf8mb4 character set when the client connects, and set it in connection parameters or execute SETNAMES; third, select the sorting rules reasonably, and recommend using utf8mb4_unicode_ci to ensure the accuracy of comparison and sorting, and specify or modify it through ALTER when building the library and table.

To set up asynchronous master-slave replication for MySQL, follow these steps: 1. Prepare the master server, enable binary logs and set a unique server-id, create a replication user and record the current log location; 2. Use mysqldump to back up the master library data and import it to the slave server; 3. Configure the server-id and relay-log of the slave server, use the CHANGEMASTER command to connect to the master library and start the replication thread; 4. Check for common problems, such as network, permissions, data consistency and self-increase conflicts, and monitor replication delays. Follow the steps above to ensure that the configuration is completed correctly.
