Database Encryption’s Transparency to the Application
The following example creates a table in an encrypted database, inserts rows in a table, and then selects them:
CREATE TABLE socsec1 (fname CHAR(10), lname CHAR(20), socsec CHAR(11));
INSERT INTO socsec1 VALUES ('John', 'Smith', '012-33-4567');
INSERT INTO socsec1 VALUES ('Lois', 'Lane', '010-40-1234');
INSERT INTO socsec1 VALUES ('Charlie', 'Brown', '012-44-9876');
SELECT * FROM socsec1;
The following results are returned:
+----------+--------------------+-----------+
|fname |lname |socsec |
+----------+--------------------+-----------+
|John |Smith |012-33-4567|
|Lois |Lane |010-40-1234|
|Charlie |Brown |012-44-9876|
+----------+--------------------+-----------+
(3 rows)
As shown by the plain text values in all columns, the encryption is transparent to the application (in this case, the SQL terminal monitor).
Last modified date: 02/09/2026