Book Image

SQL Server on Linux

Book Image

SQL Server on Linux

Overview of this book

Microsoft's launch of SQL Server on Linux has made SQL Server a truly versatile platform across different operating systems and data-types, both on-premise and on-cloud. This book is your handy guide to setting up and implementing your SQL Server solution on the open source Linux platform. You will start by understanding how SQL Server can be installed on supported and unsupported Linux distributions. Then you will brush up your SQL Server skills by creating and querying database objects and implementing basic administration tasks to support business continuity, including security and performance optimization. This book will also take you beyond the basics and highlight some advanced topics such as in-memory OLTP and temporal tables. By the end of this book, you will be able to recognize and utilize the full potential of setting up an efficient SQL Server database solution in your Linux environment.
Table of Contents (19 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Symmetric encryption


Symmetric encryption is the type of encryption that uses the same key for encryption and decryption. SQL Server allows you to choose from several algorithms, including DES, Triple DES, TRIPLE_DES_3KEY, RC2, RC4, 128-bit RC4, DESX, 128-bit AES, 192-bit AES, and 256-bit AES.

No single algorithm is ideal for all situations. However, the following general principles apply:

  • Strong encryption requires more CPU resources
  • Long keys generally yield stronger encryption than short keys
  • Asymmetric encryption is stronger than symmetric encryption if using the same key size; but performance is compromised
  • Long and strong passwords are better than short and/or weak passwords
  • If you are encrypting large amounts of data, you should encrypt using a symmetric key because of performance issues
  • Encrypted data cannot be compressed, but compressed data can be encrypted

When a symmetric key is created, it must be encrypted by using at least one of the following:

  • Certificate
  • Password
  • Symmetric key
  • Asymmetric...