Encryption Algorithms

by Jamal A
The article I read talks about different encryption algorithms supported in MySQL which offers a lot of options of protecting user passwords.  The encryption is used depending on the data and priority you place on its safety. Furthermore, MySQL does not store passwords as plaintext; it stores it as hashed value that is calculated by the password function. “A hash is a special one-way encryption algorithm that produces an encrypted value for a given string”. According to the article, “When a user log into MySQL, it runs the provided password through the same encryption algorithm and compares the result to the stored value in the User table. Being a one-way algorithm makes it harder to crack because even MySQL can’t derive the plaintext string from the hashed value. When a new user account is being created using the CREATE USER command, MySQL takes the Identified by value and runs it through the Password function, it all happens behind the scene and we get the result without moments. There is another type of encryption that mentioned in this article. In MySQL, the stronger encryption is used depending on the data requirement. In this encryption they use MD5 which is a hash string of 32 hex digits.

This article relates to class because it talks about different encryption algorithms to create a strong and secured password. Companies spend tons of money on data security and I believe the first step to a safe data is a well encrypted password that is hard to break. I learned a lot from this article because it talks about the basics of different encryption algorithms that are used in MySQL. I never realized how MySQL goes through many steps just to create a new user account.

Gravelle, R. (2012, February 27). How MySQL Protects Your Password — DatabaseJournal.com. Database Journal – Daily Database Management & Administration News and Tutorials. Retrieved March 11, 2012, from http://www.databasejournal.com/features/mysql/how-mysql-protects-your-password.html

1 thought on “Encryption Algorithms”

  1. Very interesting read Jamal. It is surprising that so many databases are hacked even with this type of thorough encryption. It's scary to think that hackers are able to bypass these types of security measure and access sensitive data that are held within databases.

Comments are closed.