Security Guide > Security Guide > Using Data at Rest Encryption > Unlocking an Encrypted Database > Database Encryption’s Transparency to the Application
Was this helpful?
Database Encryption’s Transparency to the Application
The following example creates a table in an encrypted database, inserts rows in a table, and then selects them:
CREATE TABLE socsec1 (fname CHAR(10), lname CHAR(20), socsec CHAR(11));
INSERT INTO socsec1 VALUES ('John', 'Smith', '012-33-4567');
INSERT INTO socsec1 VALUES ('Lois', 'Lane', '010-40-1234');
INSERT INTO socsec1 VALUES ('Charlie', 'Brown', '012-44-9876');
 
SELECT * FROM socsec1;
The following results are returned:
+----------+--------------------+-----------+
|fname     |lname               |socsec     |
+----------+--------------------+-----------+
|John      |Smith               |012-33-4567|
|Lois      |Lane                |010-40-1234|
|Charlie   |Brown               |012-44-9876|
+----------+--------------------+-----------+
(3 rows)
As shown by the plain text values in all columns, the encryption is transparent to the application (in this case, the SQL terminal monitor).
Last modified date: 02/09/2026