PL/SQL Function Hash Algorithm – Oracle Hash Value

DBMS_CRYPTO

Oracle® Database PL/SQL Function and Packages and Types Reference

For Oracle 10g: http://download.oracle.com/docs/cd/B19306_01/appdev.102/b14258/d_crypto.htm

DBMS_CRYPTO provides an interface to encrypt and decrypt stored data, and can be used in conjunction with PL/SQL programs running network communications. It provides support for several industry-standard encryption and hashing algorithms, including the Advanced Encryption Standard (AES) encryption algorithm. AES has been approved by the National Institute of Standards and Technology (NIST) to replace the Data Encryption Standard (DES)

Source: oracle.com

 

Oracle Cryptographic Toolkit Programmer’s Guide

Release 2.0.4: http://download.oracle.com/docs/cd/A58617_01/network.804/a54082/ch7plsql.htm

Section 7.2, "Digital Signature"
the following PL/SQL routines to create and verify digital signatures. There are two versions of each routine: one for raw data and another for strings.
"Sign", "Verify" ,"SignDetached" and  "VerifyDetached"

Section 7.3, "Hash"   – Oracle Hash Value
this pl/sql routines can be used to generate checksums. There are two versions of each routine: one for raw data and another for strings (KeyedHash, Hash)

Section 7.4, "Random Number Generation"

 

DBMS_UTILITY

using the Package(DBMS_UTILITY) it contains a
function named (GET_HASH_VALUE) to get Oracle Hash Value

http://oradbpedia.com/wiki/DBMS_UTILITY.GET_HASH_VALUE

 

Doing a PL/SQL hash function

http://stackoverflow.com/questions/5595774/is-there-any-hash-function-in-pl-sql

using  select ora_hash … from dual

or using  dbms_crypto …

Oracle® Database Security Guide

17 Developing Applications Using Data Encryption for Oracle 10g and above

http://download.oracle.com/docs/cd/B19306_01/network.102/b14266/apdvncrp.htm#DBSEG16000

Stored Data Encryption Using DBMS_CRYPTO

  • Securing Sensitive Information
  • Principles of Data Encryption
  • Stored Data Encryption Using DBMS_CRYPTO
  • Data Encryption Challenges
  • Example of a Data Encryption Procedure
  • Example of AES 256-Bit Data Encryption and Decryption Procedures
  • Example of Encryption and Decryption Procedures for BLOB Data
  • Oracle Hash Value
  • PL/SQL Function Hash Algorithm

 

MD5 Hashing in Oracle Databases

even MD5 is already broken …

… let’s see how we can use hashing in real-life database administration. When a sensitive piece of information is sent to a different location, you might calculate the hash value beforehand and send it in another shipment or transmission …

http://my.safaribooksonline.com/book/databases/oracle-pl-sql/0596005873/data-encryption-and-hashing/209

Leave a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Scroll to Top