HiveBrain v1.2.0
Get Started
← Back to all entries
patternsqlMinor

Encryption with pgcrypto

Submitted by: @import:stackexchange-dba··
0
Viewed 0 times
withencryptionpgcrypto

Problem

I am working on encrypting a column in a postgre table using pgcrypto. The postgre version is 9.5.1. I have figured out how to encrypt using pgp_sym_encrypt() and decrypt using pgp_sym_decrypt(). My problem is figuring out how to keep the key hidden.

I am trying to avoid having the application decrypt the data that is returned. The data in this table is only sensitive if someone can view the entire table (450,000 rows) and put the data together, so its ok for the data to return to the application decrypted.

In pgAdmin, I have this in my query

SELECT pgp_sym_decrypt(column1,'password')


Obvisouly, I don't want the query template our application uses to have the password stored in it and then pass it in everytime a query is ran. Any ideas would be appreciated?

Solution

There is no way to avoid the drawbacks of symmetric encryption on the server.

PostgreSQL has to have access to the key and the encrypted data to decrypt it if you want to "avoid having the application decrypt". There are only two sources that can do it.

  • the consumer



  • the database (in which case it's also subject to being written in a log file)



Of course, if you have a single access point to the data like an webserver or the like, you could potentially decrypt there too and keep the keys off the server.

Context

StackExchange Database Administrators Q#189990, answer score: 3

Revisions (0)

No revisions yet.