{"id":3587,"date":"2023-04-12T15:39:33","date_gmt":"2023-04-12T15:39:33","guid":{"rendered":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/"},"modified":"2026-01-15T18:16:43","modified_gmt":"2026-01-15T18:16:43","slug":"exploring-symmetric-encryption-in-sql","status":"publish","type":"post","link":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/","title":{"rendered":"How Do I Use Symmetric Encryption in SQL Server to Encrypt and Decrypt Data?"},"content":{"rendered":"<p>There is a very helpful article describing how to encrypt a column of data in a relational database by using <em>symmetric encryption<\/em> (sometimes known as column-level encryption, or cell-level encryption) using Transact-SQL found here: <a href=\"https:\/\/docs.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/encrypt-a-column-of-data?view=sql-server-ver15\">https:\/\/docs.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/encrypt-a-column-of-data?view=sql-server-ver15<\/a>. After reading the article, I felt like working-through the provided examples myself in order to dig a bit deeper into the topic.<\/p>\n<p>For some background, <em>c<\/em><em>ryptography<\/em> is \u201cthe study of concepts like encryption and decryption to provide secure communication\u201d, whereas <em>encryption<\/em>\u00a0is \u201cthe process of encoding information by converting the original representation of the information, known as \u201cplaintext\u201d, into an alternative form known as \u201cciphertext\u201d so only authorized parties can decipher a ciphertext back to plaintext and access the original information:<\/p>\n<p><em>Symmetric encryption<\/em>\u00a0is one example of an encryption process where a single, secret key is used to both encrypt and decrypt information. This is the approach I focused on with this exercise.<\/p>\n<h3><strong>\u00a0<\/strong>Step 1 Creating a Database Master Key<\/h3>\n<p>Before creating any certificates or other keys, a Database Master Key must be created. A database \u201cmaster key\u201d is\u00a0a symmetric key used to protect asymmetric keys in a database. When it is created, the master key is encrypted by using the <a href=\"https:\/\/www.idera.com\/glossary\/aes-256-bit-encryption\">AES_256<\/a> algorithm and a user-supplied password. Not all databases have a master key defined and the sample database I used didn\u2019t (have one defined), so I needed to create one.<\/p>\n<p>To create one, you need to be sure that you have the following permissions:<\/p>\n<ul>\n<li>CONTROLpermission on the database.<\/li>\n<li>CREATE CERTIFICATEpermission on the database (only Windows logins, SQL Server logins, and application roles can own certificates. Groups and roles cannot own certificates).<\/li>\n<\/ul>\n<p>Assuming that you have the required permissions, you can use the following script to create a master key:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1931 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q1-min.jpg\" alt=\"\" width=\"360\" height=\"59\" \/><\/p>\n<p>When creating a master key, make sure you use a \u201ccomplex\u201d password (according to Microsoft, complex passwords consist of\u00a0at least seven characters, including three of the following four-character types: uppercase letters, lowercase letters, numeric digits, and non-alphanumeric characters such as &amp; $ * and !). Read more about database master keys <a href=\"https:\/\/docs.microsoft.com\/en-us\/sql\/t-sql\/statements\/create-master-key-transact-sql?view=sql-server-2017\">here<\/a>.<\/p>\n<h3>Step 2 Creating a Certificate and Key<\/h3>\n<p>The <a href=\"https:\/\/docs.microsoft.com\/en-us\/sql\/t-sql\/statements\/create-certificate-transact-sql?view=sql-server-ver15\">CREATE CERTIFICATE sql command<\/a> can be\u00a0used to create a self-signed certificate in SQL Server. The private key of such a certificate can be protected either by a password or by the database master key. In the example given, a certificate named HumanResources037 was created intending to encrypt employee social security numbers:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1932 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q2-min.jpg\" alt=\"\" width=\"599\" height=\"80\" \/><\/p>\n<p>Once I ran the above command statements, the certificate is listed in the database, under <strong>Security<\/strong> then <strong>Certificates<\/strong>:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1933 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q3-min.jpg\" alt=\"\" width=\"398\" height=\"277\" \/><\/p>\n<p><strong>A Symmetric Key<\/strong><\/p>\n<p>Symmetric keys are a database-level \u201csecurable\u201d contained by the database that is its parent. Once one is created, there are a number of specific and limiting permissions that can be granted on a symmetric key (more on this later). \u00a0Using the certificate that I just created (HumanResources037), I can now create a new symmetric key named SSN_Key_01 \u00a0by using the following sql commands:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1934 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q4-min.jpg\" alt=\"\" width=\"549\" height=\"109\" \/><\/p>\n<h3>Step 3 Encrypting with Simple Symmetric Encryption<\/h3>\n<p>In\u00a0the original article, the [AdventureWorks2012].[HumanResources].[Employee] table was utilized. That table includes a column named NationalIDNumber which contains, of course, employee Social Security Account numbers (SSAN) in plaintext. To see <em>Symmetric encryption<\/em>\u00a0in action, the example added a new column to the table which will contain those SSANs encrypted as ciphertext using sql ALTER TABLE:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1935 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q5-min.jpg\" alt=\"\" width=\"808\" height=\"106\" \/><\/p>\n<p>To \u201cload\u201d the new column with encrypted information, the symmetric key we created is used by performing an <a href=\"https:\/\/docs.microsoft.com\/en-us\/sql\/t-sql\/statements\/open-symmetric-key-transact-sql?view=sql-server-ver15\">open sql command<\/a>:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-1936 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q6-min-1024x96.jpg\" alt=\"\" width=\"605\" height=\"57\" \/><\/p>\n<p>An open symmetric key will continue to be \u201copen\u201d and \u201cusable\u201d until it is either explicitly closed or the query session is terminated. If you open a symmetric key and then switch context, the key will still remain open and be available for use in the impersonated context. A side note: you can always display information about all open (symmetric) keys by running the following SQL query:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1937 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q7-min.jpg\" alt=\"\" width=\"932\" height=\"235\" \/><\/p>\n<p>Since we now have our symmetric key in an open state, we can encrypt the values in the NationalIDNumber column and load them into the new column EncryptedNationalIDNumber using the following SQL commands:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1938 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q8-min.jpg\" alt=\"\" width=\"986\" height=\"121\" \/><\/p>\n<p>To see the results of the above commands, you can query the 2 columns and see that the SSANs have all been encrypted:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1939 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q9-min.jpg\" alt=\"\" width=\"932\" height=\"405\" \/><\/p>\n<p>In the article examples, the following commands were used to perform an \u201con the fly\u201d <em>decryption<\/em> of the information:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-1940 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q10-min-1024x273.jpg\" alt=\"\" width=\"605\" height=\"161\" \/><\/p>\n<p>Below are the results -seemed like it worked!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1941 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q11-min.jpg\" alt=\"\" width=\"932\" height=\"445\" \/><\/p>\n<h3>Step 4 Denying Users<\/h3>\n<p>One thing the original article didn\u2019t necessarily show is how would we use this approach to make sure the selected information is never available in plaintext to non-privileged users. To test that only specific users can see the encrypted data, I created a new user \u201cLindaR\u201d and logged in as her. \u201cShe\u201d executed the following query and <u>was<\/u> able to see all of the data in the column (NationalIDNumber):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1942 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q12-min.jpg\" alt=\"\" width=\"919\" height=\"340\" \/><\/p>\n<p>Given the above, I as the DBA executed the following query to deny LindaR access to that specific column:<\/p>\n<p>DENY SELECT ON HumanResources.Employee (NationalIDNumber) TO LindaR;<\/p>\n<p>GO<\/p>\n<p>If LindaR \u00a0then reruns the above query, she receives the following error message:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1943 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q13-min.jpg\" alt=\"\" width=\"909\" height=\"289\" \/><\/p>\n<p><strong>Not Done Yet<\/strong><\/p>\n<p>Given that LindaR is pretty clever, suppose she then tries to modify the query using the SYSMMETRIC KEY that we created to encrypt\/decrypt the data? Sure enough, she <em>still<\/em> has access to the data by decrypting the added column using the key:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1944 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q14-min.jpg\" alt=\"\" width=\"905\" height=\"535\" \/><\/p>\n<p>That\u2019s not what we want! So, the final step is to edit the properties of the LindaR user to explicitly Deny permissions to \u201cSelect All User Securables\u201d:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1945 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q15-min.jpg\" alt=\"\" width=\"886\" height=\"385\" \/><\/p>\n<p>Use can also use SQL commands to update these permissions, as long as you run the query from the Master database:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1946 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q16-min.jpg\" alt=\"\" width=\"479\" height=\"60\" \/><\/p>\n<p>Now, if LindaR tries to use the SYMMETRIC KEY, she\u2019ll receive the following message:<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1947 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q17-min.jpg\" alt=\"\" width=\"911\" height=\"473\" \/><\/strong><\/p>\n<p>Perfect!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a very helpful article describing how to encrypt a column of data in a relational database by using symmetric encryption (sometimes known as column-level encryption, or cell-level encryption) using Transact-SQL found here: https:\/\/docs.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/encrypt-a-column-of-data?view=sql-server-ver15. After reading the article, I felt like working-through the provided examples myself in order to dig a bit deeper into&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[27],"tags":[32],"class_list":["post-3587","post","type-post","status-publish","format-standard","hentry","category-quebit-value","tag-sql"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Do I Use Symmetric Encryption in SQL Server to Encrypt and Decrypt Data? - QueBIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Do I Use Symmetric Encryption in SQL Server to Encrypt and Decrypt Data? - QueBIT\" \/>\n<meta property=\"og:description\" content=\"There is a very helpful article describing how to encrypt a column of data in a relational database by using symmetric encryption (sometimes known as column-level encryption, or cell-level encryption) using Transact-SQL found here: https:\/\/docs.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/encrypt-a-column-of-data?view=sql-server-ver15. After reading the article, I felt like working-through the provided examples myself in order to dig a bit deeper into&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/\" \/>\n<meta property=\"og:site_name\" content=\"QueBIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-12T15:39:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T18:16:43+00:00\" \/>\n<meta name=\"author\" content=\"agoddard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"agoddard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/\"},\"author\":{\"name\":\"agoddard\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\"},\"headline\":\"How Do I Use Symmetric Encryption in SQL Server to Encrypt and Decrypt Data?\",\"datePublished\":\"2023-04-12T15:39:33+00:00\",\"dateModified\":\"2026-01-15T18:16:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/\"},\"wordCount\":964,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Q1-min.jpg\",\"keywords\":[\"SQL\"],\"articleSection\":[\"QueBIT Value\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/\",\"name\":\"How Do I Use Symmetric Encryption in SQL Server to Encrypt and Decrypt Data? - QueBIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Q1-min.jpg\",\"datePublished\":\"2023-04-12T15:39:33+00:00\",\"dateModified\":\"2026-01-15T18:16:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Q1-min.jpg\",\"contentUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Q1-min.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/exploring-symmetric-encryption-in-sql\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Do I Use Symmetric Encryption in SQL Server to Encrypt and Decrypt Data?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\",\"name\":\"QueBIT\",\"description\":\"QueBIT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\",\"name\":\"agoddard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"caption\":\"agoddard\"},\"sameAs\":[\"https:\\\/\\\/quebit.com\\\/askquebit\"],\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/author\\\/agoddard\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Do I Use Symmetric Encryption in SQL Server to Encrypt and Decrypt Data? - QueBIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/","og_locale":"en_US","og_type":"article","og_title":"How Do I Use Symmetric Encryption in SQL Server to Encrypt and Decrypt Data? - QueBIT","og_description":"There is a very helpful article describing how to encrypt a column of data in a relational database by using symmetric encryption (sometimes known as column-level encryption, or cell-level encryption) using Transact-SQL found here: https:\/\/docs.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/encrypt-a-column-of-data?view=sql-server-ver15. After reading the article, I felt like working-through the provided examples myself in order to dig a bit deeper into&hellip;","og_url":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/","og_site_name":"QueBIT","article_published_time":"2023-04-12T15:39:33+00:00","article_modified_time":"2026-01-15T18:16:43+00:00","author":"agoddard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"agoddard","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/#article","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/"},"author":{"name":"agoddard","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084"},"headline":"How Do I Use Symmetric Encryption in SQL Server to Encrypt and Decrypt Data?","datePublished":"2023-04-12T15:39:33+00:00","dateModified":"2026-01-15T18:16:43+00:00","mainEntityOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/"},"wordCount":964,"commentCount":0,"image":{"@id":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q1-min.jpg","keywords":["SQL"],"articleSection":["QueBIT Value"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/","url":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/","name":"How Do I Use Symmetric Encryption in SQL Server to Encrypt and Decrypt Data? - QueBIT","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/#primaryimage"},"image":{"@id":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q1-min.jpg","datePublished":"2023-04-12T15:39:33+00:00","dateModified":"2026-01-15T18:16:43+00:00","author":{"@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084"},"breadcrumb":{"@id":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/#primaryimage","url":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q1-min.jpg","contentUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2022\/01\/Q1-min.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/quebit.com\/askquebit\/exploring-symmetric-encryption-in-sql\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/quebit.com\/askquebit\/"},{"@type":"ListItem","position":2,"name":"How Do I Use Symmetric Encryption in SQL Server to Encrypt and Decrypt Data?"}]},{"@type":"WebSite","@id":"https:\/\/quebit.com\/askquebit\/#website","url":"https:\/\/quebit.com\/askquebit\/","name":"QueBIT","description":"QueBIT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quebit.com\/askquebit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084","name":"agoddard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","caption":"agoddard"},"sameAs":["https:\/\/quebit.com\/askquebit"],"url":"https:\/\/quebit.com\/askquebit\/author\/agoddard\/"}]}},"_links":{"self":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/comments?post=3587"}],"version-history":[{"count":1,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3587\/revisions"}],"predecessor-version":[{"id":4918,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3587\/revisions\/4918"}],"wp:attachment":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/media?parent=3587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/categories?post=3587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/tags?post=3587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}