Impact of DBFIPS_140 = true On Data Previously Encrypted w/ DBMS_CRYPTO

Provided I hold all other aspects of my use of dbms_crypto constant - type, key, iv, etc. - can I set DBFIPS_140 = true w/ no functional impact to previously encrypted data, or will I need to decrypted prior to making this change and re-encrypt afterwards?

Vlad,
Thanks for your response.
'... enc algorithms used already over there are supported by the fips setup ...' isn't quite clear to me.
We're using encrypt/decrypt members of the Oracle-supplied package dbms_crypto, which I understand to call components of the Oracle software distribution that implement crypto algorithms; currently doing so under 11.2.0.3. No 3rd party libraries are used. Are you saying that if I'm using software exclusively from the Oracle distribution there will be no need to decrypt then re-encrypt?

Similar Messages

  • Obfuscated Toolkit: Is there a test routine to see if data is encrypted?

    Does anyone know of a procedure, function, or package that will check to see if data has been encrypted previously before attempting to decrypt it? I inherited a database with several encrypted columns. But some of the data (i.e. first 100 rows or so [and more intermixed]) is not encrypted. I'm looking for a way programatically to check to see if data is encrypted before decrypting it.

    DBMS_OBFUSCATION_TOOLKIT.DES3Encrypt procedure raises an exception, don't remember exactly whihc one, that is raised when you try to encrypt data previously encryoted. You can try that approach and just ignore when data is already encrypted.
    HTH.
    Arup

  • How to get back the data from 'AddressBook.data.previous' ?

    Hi! First of all: After using iSync all my address book data were duplicated, and I deleted all duplicated data manually. Then, I resetted the iSync data under 'Advanced' in '.Mac Sync Preferences'. Unfortunately, iSync deleted all my AddressBook data. I found a file named 'AddressBook.data.previous' and another file named 'AddressBook.data.beforesave' in my 'home folder/Library/Application Support/AddressBook'. Looking carefully into that file, I saw all the data I lost before in it! - Thus, how can I restore that data back into my AddressBook now? Does anyone knows some help for me? Thank you for answering! - Greetings, Gisela

    Welcome to Apple Discussions.
    You only have a very limited opportunity to recover your data this way. You should make sure that the Address Book application is not running, then drag the AddressBook.data file to your desktop or to the trash. Duplicate the AddressBook.data .previous file, and rename it AddressBook.data by removing the trailing <.previous> string. Then, launch the Address Book.
    The application will read the contents of this renamed file, and display your contact records. You should regularly back up your contact records using the built-in Back up Address Book… option under its File menu. A similar option is available in iCal.

  • Lost address book, found file named AddressBook.data.previous

    My address book is gone. I found AddressBook.data.previous in Application Support under my account, but I can't open it and can't drag it to the Application. Any help? Is this my missing data?
    Best to all.

    With the Address Book application quit and using the Finder go to Home > Library > Application Support > AddressBook > AddressBook.data.previous.
    If there is an Address Book.data file, move this to the Desktop. Change the name of AddressBook.data.previoius to AddressBook.data
    Say a quick prayer of cross your fingers and launch Address Book.
    If your contacts are not available, now is the time to start maintaining a backup or if you do, start including Address Book data with your backup which is quite easy.
    As the menu bar, go to File and select Back Up Address Book. The default name for the backup file is Address Book - (and the date). A very easy process.
    If you need to recover all contacts from this backup, at the menu bar go to File and select Revert to Address Book Backup selecting the backup file.
    Before making a large number changes/edits, deletions or additions to existing data, update your backup file immediately beforehand.

  • Write data in Encrypting form

    Hi All
    It is possibel to write data in Encrypting form in text file.Or first create a Encrypting file then i write data.See i aim is that so body can read my data from file.it is possibel or not.If it is possibel then plz give me tips how can i do that..
    Thx's in advance.

    [http://www.google.com/search?q=cryptography+tutorial]

  • Accessing data from encrypted file...

    Hi, is it possible to read data from file that encrypted using javax.crypto.* without decrypting that file back such as Microsoft Access Database file?
    If it is possible, would somebody please show me how to do that.....thank you...

    why it scares u?
    ok lets take other example......such as .dat file....i put some data in data.dat then encrypt that file....all i want to know is it possible to read data from data.dat(encrypted one) without decrypting that file back?

  • Is there any way to recover data previously stored on iPhone but not backed up on iCloud?

    I just accidentally restored data through iCloud from my old iPhone to new iPhone and lost all data previously stored on the new phone. Is it possible to recover the lost data at all?

    Have you backed up the new phone's data anywhere? iCloud or iTunes? If not, then you are stuck with the restore you put on it....
    Sorry,
    GB

  • How to find length of string after encryption using DBMS_CRYPTO package

    Hi,
    I am planning do data encryption using DBMS_CRYPTO package. I want to find how much will be string length after encryption.
    e.g When I try to encrypt string of length between 1-15 characters it gives me encrypted string of 32 characters. When I try with 16 charcters encrypted string is of 64 characters.
    Is ther any formula to calculate length of encrypted string?
    Thanks
    Pravin

    The length change is dependent upon the algorithm you are using which can be a combination of cipher block, padding, and chaining.
    The best solution is determine the method you are going to use and apply it to the l ongest possible strings you are going to proces, then add some safety margin. There iis no penalty for defining your column as VARCHAR2(4000).

  • HANA  Data volume Encryption

    Hi Team,
    I was trying to understand , How HANA encryption works in detail may be the tool used for encrypting .
    Is it using OpenSSL for encryption  ?
    Then SAP Netweawer SSFS for encrypting those encryption keys ?
    Is this true ?
    Thanks,
    Razal 

    Well 'tool' is a little bit misleading.
    In some parts of the process OpenSSL libraries are called, yes.
    In others the SAPcrypto-library is used.
    We don't call any executable with a certain set of parameters or something like that.
    Very easy speaking, before a certain part of the memory is written out to disk, we encrypt this piece/buffer via a API function call. The encrypted part gets written to disk then.
    Upon loading the data back to memory, we look up the encryption key that was used with the specific savepoint we're trying to load the data from and hand the buffer and the encryption key over to a different API call.
    So, from a SAP HANA core developer point of view, yes, OpenSSL is a 'tool' we use, just like libstdc...
    - Lars

  • Can i recover lost data from encrypted drive by Bitlocker

    Hello Dears. I had encrypted my drive by Bitlocker in windows 7. 
    few days after my friend did quick format in my encrypted drive.
    my 300 gb of data lost. and nothing saved
    i remember unlock password. 
    how can i recover my data ??? i need my data
    i tried drive recovering tools (advanced EFS data recovery, easeus . . ,) . but . . . it's encrypted and formatted drive. 
    can i undo quick format and decrypt ???
    sorry my english is not good.
    someone help me please. 

    BitLocker is not the cause of failed to recover files. 
    Format a drive will clear all data saved on the hard disk. Thus recovery formatted data will be a hard disk based technology but not related to operation system. There is no build-in data recovery feature in Windows operations. So we will needto use third party recovery tool or contact third party data recovery company for current issue.
    As recovery missing data service will be expensive, we can also check emails and contact friends to see if that can help get a part of files back especially for photos, documents etc.

  • 1300 wireless bridge secured data traffic encryption --high

       Hi All,
    I am looking secured encrypt configuration for the 1300 bridge wireless network . i have below configuration please suggest any change or modification on the configuration .
    network topology
    R1--------------SW1<-----------------> root bride-1 <---------------------------> Non-root bridge-1 <------------------------ >SW2( remote office)--------LAN hosts                   
    SW1- Gi0/0- 10.200.32.1/29            BVI- 32.2/29                               BVI - 32.3/29                                   SW2-GI0/0 - 32.4/29
    network setup :  SW1 - LAN port to root bridge connection --  Gi 0/0 - ip address configured -10.200.32.1/29
                             Root-brdge -------------------------------------------- BVI  10.200.32.2/29 -----
                             Non root bridge----------------------------------------BVI 10.200.32.3/29
                             SW2 LAN port-Non root bridge ----------------- Gi0/0  10.200.32.4/29
    both bridge have only BVI configured and no VLAN or subniterface on the both bridge .
    SW1 and SW2 port connected to bridges are not part of vlan  , ports configured with specfic IP address
    Below is bridge configration .  I would like to know with this below configuration data traffic will get compelete encrytion ??? or any security threat ?? . please suggest
    dot11 ssid
       authentication open
       authentication key-management wpa
       wpa-psk ascii 7 123456
    bridge irb
    interface Dot11Radio0
    no ip address
    no ip route-cache
    encryption mode ciphers aes-ccm
    station-role root bridge
    bridge-group 1
    bridge-group 1 spanning-disabled
    interface FastEthernet0
    no ip address
    no ip route-cache
    bridge-group 1
    bridge-group 1 spanning-disabled
    hold-queue 80 in
    interface BVI1
    ip address 10.200.32.2 255.255.255.248
    no ip route-cache
    ip default-gateway 10.200.32.1
    ip http server
    no ip http secure-server
    control-plane
    bridge 1 route ip
    ************************************Configuration on non root bridge.******************************************************************
    dot11 ssid
       authentication open
       authentication key-management wpa
       wpa-psk ascii 7 123456
    bridge irb
    interface Dot11Radio0
    no ip address
    no ip route-cache
    encryption mode ciphers aes-ccm
    bridge-group 1
    bridge-group 1 spanning-disabled
    interface FastEthernet0
    no ip address
    no ip route-cache
    bridge-group 1
    bridge-group 1 spanning-disabled
    hold-queue 80 in
    interface BVI1
    ip address 10.200.32.3 255.255.255.248
    no ip route-cache
    ip default-gateway 10.200.32.2
    ip http server
    no ip http secure-server
    control-plane
    bridge 1 route ip

    Thanks Scott.  We can go as high as we need to clear the fresnel zone.  There is nothing but an empty parking lot in between the 2 building and about 1500 - 2000 feet of space but I have not done a site survey to see about the 2.4Ghz.  I think we are going to need different antennae as well correct?  I think the internal ones only go about 626 feet or so.  I was thinking about using AIR-ANT3338. your thoughts.
    Thanks in advance!

  • EBS performance impact using it as a Data Source

    I have a quick question on EBS performance. If I set up the EBS Database as a data source for SSRS (SQL Server Reporting Services), would there be a performance impact on EBS, due to SSRS accessing EBS Data for reports generation? Now, I know there'll always be a hit depending on the volume of data being accessed. But, my question is, will it be significantly higher using an external reporting tool using an ODBC connection rather than native XML Publisher.

    I have a quick question on EBS performance. If I set up the EBS Database as a data source for SSRS (SQL Server Reporting Services), would there be a performance impact on EBS, due to SSRS accessing EBS Data for reports generation? Now, I know there'll always be a hit depending on the volume of data being accessed. But, my question is, will it be significantly higher using an external reporting tool using an ODBC connection rather than native XML Publisher.Hi,
    Tough to answer without looking at data; my suggestion would be to have a test EBS environment setup, get permission from the vendors to run performance test without buying license - compare AWRs from both scenarios and then decide.
    Generally speaking, native XML publisher (BI Publisher) has less of database performance hit than external reporting tools using ODBC.
    Hope this helps.
    Regards,

  • Date field encryption using Dbms_Obfuscation_Toolkit.DESENCRYPT

    Hi,
    I need to encrypt the date field in the table using Dbms_Obfuscation_Toolkit.DESENCRYPT .
    This is an table is an existing table and is accessed by many interfaces, so we cannot change the column type of this date field.
    Is there a possibility of encrypting the date field and store it in the same column (DATE type).
    And access this using Dbms_Obfuscation_Toolkit.DESDECRYPT.
    We are using Oracle 11.2.0.2.0.
    Thanks in advance.
    Agathya

    >
    Is there a possibility of encrypting the date field and store it in the same column (DATE type).
    >
    No - the DESENCRYPT procedure returns a RAW value which can't be stored in a DATE column.
    See DESENCRYPT Procedures and Functions in Chapter 82 (DBMS_OBFUSCATION_TOOLKIT) of the PL/SQl Packages and Types Doc
    http://docs.oracle.com/cd/B28359_01/appdev.111/b28419/d_obtool.htm#i997215
    For what you want to do just use the ENCRYPT option of the CREATE TABLE or ALTER TABLE statements.
    See Using Transparent Data Encryption in the Advanced Security Admin Guide
    http://docs.oracle.com/cd/B28359_01/network.111/b28530/asotrans.htm#BABJJAIG
    >
    3.2 Using Transparent Data Encryption
    The following steps discuss using transparent data encryption:
    •Enabling Transparent Data Encryption
    •Setting and Resetting theMaster Encryption Key
    •Opening the Encrypted Wallet
    •Creating Tables with Encrypted Columns
    •Encrypting Columns in Existing Tables
    •Creating an Index on an Encrypted Column
    •Adding or Removing Salt from an Encrypted Column
    •Changing the Encryption Key or Algorithm for Tables Containing Encrypted Columns
    >
    Section 3.2.5.2 Encrypting an Unencrypted Column shows the ALTER TABLE statement for encrypting an existing column - this would leave the column as a DATE and you would work with it normally
    >
    3.2.5.2 Encrypting an Unencrypted Column
    To encrypt an unencrypted column, use the ALTER TABLE MODIFY command, specifying the unencrypted column with the ENCRYPT clause. Example 3-7 encrypts the first_name column in the employee table.
    Example 3-7 Encrypting an Unencrypted Column
    ALTER TABLE employee MODIFY (first_name ENCRYPT);
    The first_name column is encrypted with the default AES192 algorithm. Salt is added to the data, by default.
    You can choose to encrypt the column using a different algorithm. You can also specify NO SALT, if you wish to index the column.

  • HT1725 when the download in paused it get restart from zero ,the data previous download data in deleted,so how to continue with the same data

    pls help me to download interuped download,when i pause download and resue it ,it starts with zero and the previous data is deleted

    try again

  • SharePoint data / document encryption options: experiences and recommendations

    Hi,
    I'm evaluating the options to implement an encryption of the data / documents that are saved in SharePoint (2013).
    The important requirement is that SharePoint administrators (farm admins) are not able to access the data / documents, so the encryption / security can be managed independently by a different team. This is because the SharePoint infrastructure is managed by
    a service provider and data / documents should only be accessible by our company not the service provider.
    Does anybody have experience with this and can recommend tools / services for this?
    One option I’m evaluating is the CORISECIO Gateway Server. Does anybody have experience with this?
    Thanks and best regards

    Hi,
    You can refer the Cipherpoint Eclipse for SharePoint which meets your requirement.
    Please refer to the link for complete details.
    Cipherpoint Eclipse
    Cipherpoint team had demo with us recently, they showed how encryption and decryption handles with SharePoint 2013.  Their product even support Office 365 for SharePoint.  I really liked the product. You can also request for the demo with them.
    Please mark it answered, if your problem resolved.

Maybe you are looking for

  • My itune wont let me open my account..

    My itune wont let me open my account... my itouch say "cannot connect ot itunes store" so i tried my pc and it says "We're sorry. We cannot complete your request on the itunes store at this time" Can someone please help? I also Run Diagnostics and it

  • Oracle installation on Linux RedHat "Multiple occurance of oracle directory

    I have successfully installed oracle 10.2.0.1 on my Linux server, but have repetition oracle directory on my Oracle_home path i.e /u01/app/oracle/oracle/product/10.2.0 How can corrrect this shoul i uninstall oracle an install again ? or i should run

  • I need info about Oracle SOA Success Methodology

    Hi all. We're conducting a SOA/BPEL project and we are evaluating the Oracle SOA Success Methodology. The documentation we have is available in the SOA Suite Developers Guide. I'd like to know if Oracle has a more complete reference for this methodol

  • Adobe Update Manager for CS4 fails

    I've reinstalled CS4 from the discs (if I'd realized I could download new installers I would have done that instead, but I saw that option after I'd finished) and when I tried to check for updates the updater failed to retrieve any, with the message

  • Configuration Item (Query SCVMM server failing)

    Hi I have created a configuration item that runs as a powershell script to check if a virtual machines hard drives are dynamic or static. I can get the powershell script to work by running locally on the server in question. However when it is ran as