MySQL encryption and decryption examples

MySQL encryption and decryption examples

MySQL encryption and decryption examples

Data encryption and decryption are very important in the security field. For programmers, storing user passwords in ciphertext in the database is of great significance to intruders who steal user privacy.
There are a variety of front-end encryption algorithms that can be used for data encryption and decryption. Here I recommend a simple database-level data encryption and decryption solution. Taking the MySQL database as an example, it has built-in corresponding encryption functions (AES_ENCRYPT()) and decryption functions (AES_DECRYPT()).

When building a table, pay attention to the type of field. As shown in the following figure:

Insert encrypted data into the table

The above insert statement has three fields, "Username", "Password" and "Encrypted Password". The AES_ENCRYPT() function requires a "key" to assist with encryption, and it is also required for decryption (remember this!).

The following is a screenshot of the data in the table:

The above insert statement has three fields, "Username", "Password" and "Encrypted Password". The AES_ENCRYPT() function requires a "key" to assist with encryption, and it is also required for decryption (remember this!).

The following is a screenshot of the data in the table:

Query encrypted data from the table

The query above uses the AES_DECRYPT() function. Here are the results:

In the above screenshot, we can see that the values ​​of the "pasword" and "decryptedpassword" fields are the same, that is, you have decrypted the user password.

Thank you for reading, I hope it can help you, thank you for your support of this site!

You may also be interested in:
  • Sharing of MD5 encryption algorithm implemented in Java, JavaScript, Oracle, and MySQL
  • MD5 encryption statement for mysql and mssql
  • Using XOR encryption algorithm in PHP MySQL application
  • MySQL encryption/compression functions
  • Detailed explanation of MySQL two-way encryption and decryption usage
  • MySQL whole table encryption solution keyring_file detailed explanation

<<:  Share 12 commonly used Loaders in Webpack (Summary)

>>:  How to upload the jar package to nexus via the web page

Recommend

Example of fork and mutex lock process in Linux multithreading

Table of contents Question: 1. First attempt 2. R...

The magic of tr command in counting the frequency of English words

We are all familiar with the tr command, which ca...

Implementation of Vue large file upload and breakpoint resumable upload

Table of contents 2 solutions for file upload Bas...

Solution to forget password when installing MySQL on Linux/Mac

Preface This article mainly introduces the releva...

How to use docker to deploy dubbo project

1. First, use springboot to build a simple dubbo ...

Detailed explanation of the process of docker packaging Python environment

The steps of docker packaging Python environment ...

Mysql delete data and data table method example

It is very easy to delete data and tables in MySQ...

Detailed explanation of mysql download and installation process

1: Download MySql Official website download addre...

...

Tips for using the docker inspect command

Description and Introduction Docker inspect is a ...

Win7 installation MySQL 5.6 tutorial diagram

Table of contents 1. Download 2. Installation 3. ...

MySQL 8.0.15 installation and configuration graphic tutorial under Win10

This article records the installation and configu...

Implementation of MySQL asc and desc data sorting

Data sorting asc, desc 1. Single field sorting or...

How to start the spring-boot project using the built-in linux system in win10

1. Install the built-in Linux subsystem of win10 ...