Skip to content

One-Way Encryption

Sensitive information is encrypted and stored as data. No decryption function is provided. Data is transformed using a private key and stored in a column of the table. The data transformation method uses a unique hash value to transform the data.

Data encrypted with a hash function is theoretically impossible to decrypt. It is commonly used for storing passwords, and always returns the same hash value for the same data.

Selectable Hash Functions (Algorithm)

  • MD5 (Message Digest Algorithm 5): MD5 is an algorithm used to generate a 128-bit hash value. However, it is currently considered insecure due to discovered vulnerabilities.
  • SHA-1 (Secure Hash Algorithm 1): SHA-1 is an algorithm that generates a 160-bit hash value. However, like MD5, it is currently considered insecure and not recommended for security purposes.
  • SHA-2 (Secure Hash Algorithm 2): SHA-2 is an algorithm that provides improved security over SHA-1. SHA-2 supports various lengths such as SHA-224, SHA-256, SHA-384, SHA-512, and is currently considered a robust encryption technology.