<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Protegrity Encryption on</title><link>https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/</link><description>Recent content in Protegrity Encryption on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/index.xml" rel="self" type="application/rss+xml"/><item><title>Encryption Properties - IV, CRC, Key ID</title><link>https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_properties/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_properties/</guid><description>&lt;p>The encryption properties include Initialization Vector (IV), Integrity Check (CRC), and Key ID.&lt;/p>
&lt;p>For encrypting Unstructured Data using File Protector, you can enable the Key ID property in the encryption data element to be used with unstructured policy.&lt;/p>
&lt;p>The following table describes encryption properties.&lt;/p>
&lt;p>&lt;em>Table: Encryption Properties&lt;/em>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Feature&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>Initialization Vector (IV)&lt;/td>
 &lt;td>Encrypting the same value with the IV property will result in different crypto text for the same value.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Integrity Check (CRC)&lt;/td>
 &lt;td>A type of function that takes as input a data stream of any length and produces as output a value of a certain fixed size.&lt;br>A CRC can be used as a checksum to detect alteration of data during transmission or storage.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Key ID&lt;/td>
 &lt;td>A Key ID is an identifier that associates encrypted data with the protection method so that the data can be decrypted regardless of where it ultimately resides.&lt;br>A data element can have multiple instances of key IDs associated with it.&lt;br>When the Key ID property is turned on there will be an extra 2 bytes in the beginning of the cipher text. This piece of information contains the reference to the Key ID that was used to produce the cipher text.&lt;br>&lt;strong>Caution&lt;/strong>: It is recommended not to create a large number of keys. All Data Encryption Keys (DEKs) are generated and decrypted using the configured Key Store. This process might take some time and incur costs.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;h2 id="key-ids">Key IDs&lt;/h2>
&lt;p>Key IDs are a way to correlate a data element key with its encrypted data. Data elements can have multiple key IDs associated with them. The Key IDs facilitate tasks related to the management of sensitive data such as archiving and key rotation. It is important to note that you can create a maximum number of 8191 keys.&lt;/p></description></item><item><title>Data Length and Padding in Encryption</title><link>https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_data_length_and_padding/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_data_length_and_padding/</guid><description>&lt;p>Cipher text are formatted in a specific way depending on which encryption properties are being used.&lt;/p>
&lt;p>The block ciphers operate on blocks of data. These encryption algorithms require padding. The block size for &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/">AES&lt;/a> is 16 bytes, and for &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_3des/">3DES&lt;/a> it is 8 bytes. The input is always padded, even if it is already a multiple of the block size. Padding ensures that the input data, along with the checksum, if enabled, equals the algorithm&amp;rsquo;s block size.&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/encryption_dbp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/encryption_dbp/</guid><description>&lt;p>The Protegrity solutions can encode data with the following encryption algorithms:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Database Protectors&lt;/strong> - &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_3des/">3DES&lt;/a>, &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/">AES-128&lt;/a>, &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/">AES-256&lt;/a>, &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/">CUSP&lt;/a>.&lt;/li>
&lt;/ul>
&lt;p>&lt;em>Table: Input Data Types Supported by Database Protectors&lt;/em>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Encryption Algorithm&lt;/th>
 &lt;th>Oracle&lt;/th>
 &lt;th>MSSQL&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_3des/">3DES&lt;/a>&lt;/td>
 &lt;td>varchar2&lt;/td>
 &lt;td>varchar&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/#:~:text=non-CUSP%20algorithms.-,AES-128,-AES-128%20is">AES-128&lt;/a>&lt;/td>
 &lt;td>char&lt;/td>
 &lt;td>char&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/#:~:text=of%2034%20bytes.-,AES-256,-AES-256%20is">AES-256&lt;/a>&lt;/td>
 &lt;td>number&lt;/td>
 &lt;td>decimal&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=CUSP%20AES-256.-,CUSP%203DES,-Deprecated">CUSP 3DES&lt;/a>&lt;/td>
 &lt;td>real&lt;/td>
 &lt;td>real&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=last%20full%20block.-,CUSP%20AES-128%20and%20CUSP%20AES-256,-CUSP%20AES-128">CUSP AES-128&lt;/a>&lt;/td>
 &lt;td>float&lt;/td>
 &lt;td>float&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=last%20full%20block.-,CUSP%20AES-128%20and%20CUSP%20AES-256,-CUSP%20AES-128">CUSP AES-256&lt;/a>&lt;/td>
 &lt;td>date&lt;/td>
 &lt;td>date&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;/td>
 &lt;td>raw&lt;/td>
 &lt;td>varbinary&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;/td>
 &lt;td>blob&lt;/td>
 &lt;td>varbinary(max)&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;/td>
 &lt;td>clob&lt;/td>
 &lt;td>varchar(max)&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table></description></item><item><title/><link>https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/encryption_dwp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/encryption_dwp/</guid><description>&lt;p>The Protegrity solutions can encode data with the following encryption algorithms:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Data Warehouse Protectors&lt;/strong> - &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_3des/">3DES&lt;/a>, &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/">AES-128&lt;/a>, &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/">AES-256&lt;/a>, &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/">CUSP&lt;/a>.&lt;/li>
&lt;/ul>
&lt;p>&lt;em>Table: Input Data Types Supported by Data Warehouse Protectors&lt;/em>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Encryption Algorithm&lt;/th>
 &lt;th>Teradata&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_3des/">3DES&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/">AES-128&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/">AES-256&lt;/a> &lt;br>&lt;br> &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_3des/#:~:text=of%2026%20bytes.-,CUSP%203DES,-Deprecated">CUSP 3DES&lt;/a> &lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=CUSP%20AES-256.-,CUSP%20AES-128%20and%20CUSP%20AES-256,-CUSP%20AES-128">CUSP AES-128&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=CUSP%20AES-256.-,CUSP%20AES-128%20and%20CUSP%20AES-256,-CUSP%20AES-128">CUSP AES-256&lt;/a>&lt;/td>
 &lt;td>VARCHAR LATIN&lt;br>&lt;br>CHAR&lt;br>&lt;br>FLOAT&lt;br>&lt;br>DECIMAL&lt;br>&lt;br>DATE&lt;br>&lt;br>VARCHAR UNICODE&lt;br>&lt;br>SMALLINT&lt;br>&lt;br>INTEGER&lt;br>&lt;br>BIGINT&lt;br>&lt;br>JSON&lt;br>&lt;br>XML&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;!--
>* For DB/2, maximum size for blob data type is 100 K, for clob – 5 K.
>* When encrypting the Char columns on MS SQL Server, they are converted into Varbinary having limitation up to 2GB of data for each column.
>* For Teradata, maximum length is 64000 for Varchar Latin and 32000 for Varchar Unicode data types.


&lt;table border="1" width="100%">
 &lt;thead style="font-weight:bold" valign="top">
 &lt;tr>
 &lt;td rowspan="2">
 &lt;br>&lt;b>Encryption Algorithm&lt;/b>&lt;/br>
 &lt;/td>
 &lt;td colspan="3">
 &lt;br>&lt;b>Database&lt;/b>&lt;/br>
 &lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>
 &lt;br>MSSQL Server&lt;/br>
 &lt;/td>
 &lt;td>
 &lt;br>Oracle&lt;/br>
 &lt;/td>
 &lt;td>
 &lt;br>DB/2&lt;/br>
 &lt;/td>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody valign="top">
 &lt;tr>
 &lt;td>
 &lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_3des/">3DES&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/#:~:text=non%2DCUSP%20algorithms.-,AES%2D128,-AES%2D128%20is">AES-128&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/#:~:text=of%2034%20bytes.-,AES%2D256,-AES%2D256%20is">AES-256&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=CUSP%20AES%2D256.-,CUSP%203DES,-Deprecated">CUSP 3DES&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=last%20full%20block.-,CUSP%20AES%2D128%20and%20CUSP%20AES%2D256,-CUSP%20AES%2D128">CUSP AES-128&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=last%20full%20block.-,CUSP%20AES%2D128%20and%20CUSP%20AES%2D256,-CUSP%20AES%2D128">CUSP AES-256&lt;/a>&lt;/br>
 &lt;/td>
 &lt;td>
 &lt;br>varchar&lt;br>&lt;br>varbinary&lt;br>&lt;br>binary&lt;br>&lt;br>char&lt;br>&lt;br>numeric&lt;br>&lt;br>real&lt;br>&lt;br>float&lt;br>&lt;br>decimal&lt;br>&lt;br>int&lt;br>&lt;br>bigint&lt;br>&lt;br>smallint&lt;br>&lt;br>tinyint&lt;br>&lt;br>datetime&lt;br>&lt;br>bit&lt;br>&lt;br>nvarchar&lt;br>&lt;br>nchar&lt;br>&lt;br>money&lt;br>&lt;br>smallmoney&lt;br>&lt;br>smalldatetime&lt;br>&lt;br>uniqueidentifier&lt;/br>
 &lt;/td>
 &lt;td>
 &lt;br>varchar2&lt;br>&lt;br>char&lt;br>&lt;br>number&lt;br>&lt;br>real&lt;br>&lt;br>float&lt;br>&lt;br>date&lt;br>&lt;br>raw&lt;br>&lt;br>blob&lt;br>&lt;br>clob&lt;/br>
 &lt;/td>
 &lt;td>
 &lt;br>integer&lt;br>&lt;br>varchar2&lt;br>&lt;br>char&lt;br>&lt;br>number&lt;br>&lt;br>real&lt;br>&lt;br>float&lt;br>&lt;br>date&lt;br>&lt;br>timestamp&lt;br>&lt;br>long varchar&lt;br>&lt;br>double&lt;br>&lt;br>varchar&lt;br>&lt;br>numeric&lt;br>&lt;br>decimal&lt;br>&lt;br>int&lt;br>&lt;br>bigint&lt;br>&lt;br>smallint&lt;br>&lt;br>tinyint&lt;br>&lt;br>datetime&lt;br>&lt;br>character&lt;br>&lt;br>time&lt;br>&lt;br>blob&lt;br>&lt;br>clob&lt;/br>
 &lt;/td>
 &lt;/tr>
 &lt;/tbody>
 &lt;/table>

&lt;table border="1" width="100%">
 &lt;thead style="font-weight:bold">
 &lt;tr>
 &lt;td rowspan="2">
 &lt;br>&lt;b>Encryption Algorithm&lt;/b>&lt;/br>
 &lt;/td>
 &lt;td colspan="3">
 &lt;br>&lt;b>Database&lt;/b>&lt;/br>
 &lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>
 &lt;br>&lt;b>Greenplum&lt;/b>&lt;/br>
 &lt;/td>
 &lt;td>
 &lt;br>&lt;b>Teradata&lt;/b>&lt;/br>
 &lt;/td>
 &lt;td>
 &lt;br>&lt;b>IBM Netezza&lt;/b>&lt;/br>
 &lt;/td>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody valign="top">
 &lt;tr>
 &lt;td>
 &lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/#:~:text=character%20or%20varchar.-,3DES,-Deprecated">3DES&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/#:~:text=non%2DCUSP%20algorithms.-,AES%2D128,-AES%2D128%20is">AES-128&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/#:~:text=of%2034%20bytes.-,AES%2D256,-AES%2D256%20is">AES-256&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=CUSP%20AES%2D256.-,CUSP%203DES,-Deprecated">CUSP 3DES&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=last%20full%20block.-,CUSP%20AES%2D128%20and%20CUSP%20AES%2D256,-CUSP%20AES%2D128">CUSP AES-128&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=last%20full%20block.-,CUSP%20AES%2D128%20and%20CUSP%20AES%2D256,-CUSP%20AES%2D128">CUSP AES-256&lt;/a>&lt;/br>
 &lt;/td>
 &lt;td>
 &lt;br>varchar&lt;br>&lt;br>integer&lt;br>&lt;br>decimal&lt;br>&lt;br>date&lt;/br>
 &lt;/td>
 &lt;td>
 &lt;br>varchar&lt;br>&lt;br>char&lt;br>&lt;br>float&lt;br>&lt;br>decimal&lt;br>&lt;br>date&lt;/br>
 &lt;/td>
 &lt;td>
 &lt;br>varchar&lt;br>&lt;br>int&lt;br>&lt;br>real&lt;br>&lt;br>date&lt;/br>
 &lt;/td>
 &lt;/tr>
 &lt;/tbody>
 &lt;/table>
>* For DB/2, maximum size for blob data type is 100 K, for clob – 5 K.
>* When encrypting the Char columns on MS SQL Server, they are converted into Varbinary having limitation up to 2GB of data for each column.

 
### File Protector

The Protegrity solutions can encode data with the following encryption algorithms:

* **File Protectors** - [3DES](/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_3des/), [AES-128](/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/#:~:text=non%2DCUSP%20algorithms.-,AES%2D128,-AES%2D128%20is), [AES-256](/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/#:~:text=of%2034%20bytes.-,AES%2D256,-AES%2D256%20is).
--></description></item><item><title/><link>https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/encryption_sdk/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/encryption_sdk/</guid><description>&lt;p>The Protegrity solutions can encode data with the following encryption algorithms:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Application Protectors&lt;/strong> - &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_3des/">3DES&lt;/a>, &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/">AES-128&lt;/a>, &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/">AES-256&lt;/a>, &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/">CUSP&lt;/a>.&lt;/li>
&lt;/ul>
&lt;p>&lt;em>Table: Input Data Types Supported by Application Protectors&lt;/em>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Encryption Algorithm&lt;/th>
 &lt;th>AP Java&lt;sup>*1&lt;/sup>&lt;sup>*2&lt;/sup>&lt;/th>
 &lt;th>AP Python&lt;/th>
 &lt;th>AP C&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_3des/">3DES&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/">AES-128&lt;/a>&lt;br>&lt;br> &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_aes128_and_aes_256/">AES-256&lt;/a>&lt;br>&lt;br> &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_3des/#:~:text=of%2026%20bytes.-,CUSP%203DES,-Deprecated">CUSP 3DES&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=CUSP%20AES-256.-,CUSP%20AES-128%20and%20CUSP%20AES-256,-CUSP%20AES-128">CUSP AES-128&lt;/a>&lt;br>&lt;br> &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/pmr/pmr_ch_protegrity_encryption/pmr_ch_protegrity_encryption_algorithms/pmr_ch_protegrity_encryption_algorithm_cusp/#:~:text=CUSP%20AES-256.-,CUSP%20AES-128%20and%20CUSP%20AES-256,-CUSP%20AES-128">CUSP AES-256&lt;/a>&lt;/td>
 &lt;td>STRING&lt;br>&lt;br>CHAR[]&lt;br>&lt;br>BYTE[]&lt;/td>
 &lt;td>STRING&lt;br>&lt;br>BYTES&lt;br>&lt;br>INT&lt;br>&lt;br>LONG&lt;br>&lt;br>FLOAT&lt;/td>
 &lt;td>STRING&lt;br>&lt;br>CHAR[]&lt;br>&lt;br>BYTE[]&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>&lt;sup>*1&lt;/sup> - If the input and output types of the API are BYTE [], the customer application should convert the input to a byte array. Then, call the API and convert the output from the byte array.&lt;/p></description></item></channel></rss>