You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/glossary.md
+35
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,10 @@
4
4
5
5
Set of properties that guarantee database transactions are processed reliably. Stands for [Atomicity](#atomicity), [Consistency](#consistency), [Isolation](#isolation), [Durability](#durability).
6
6
7
+
## Asymmetric key
8
+
9
+
A pair of keys used for cryptographic purposes, consisting of a private key and a corresponding public key. The private key is used for decrypting or signing, while the public key is used for encrypting or verifying.
10
+
7
11
## Atomicity
8
12
9
13
Atomicity means that database operations are applied following a “all or nothing” rule. A transaction is either fully applied or not at all.
@@ -12,6 +16,21 @@ Atomicity means that database operations are applied following a “all or nothi
12
16
13
17
Consistency means that each transaction that modifies the database takes it from one consistent state to another.
14
18
19
+
## Digest
20
+
21
+
A digital fingerprint of a piece of data, such as a string or a file, produced by a hash function. Digests are used to verify the integrity of data and ensure it has not been tampered with or altered.
22
+
23
+
## Digest string
24
+
The string representation of a digest, often in hexadecimal format.
25
+
26
+
## Digital signature
27
+
28
+
A cryptographic mechanism used to verify the authenticity and integrity of a message, software, or document. It ensures that the data comes from the claimed source and has not been altered during transmission.
29
+
30
+
## Diffie-Hellman key exchange
31
+
32
+
A cryptographic protocol that allows two parties to establish a shared secret key over an insecure communication channel without actually exchanging the key.
33
+
15
34
## Durability
16
35
17
36
Once a transaction is committed, it will remain so.
@@ -28,6 +47,10 @@ A referential constraint between two tables. Example: A purchase order in the pu
28
47
29
48
A finalized version of the product which is made available to the general public. It is the final stage in the software release cycle.
30
49
50
+
## Hash function
51
+
52
+
A one-way mathematical function that takes input data of any size and produces a fixed-size string of characters, known as a digest or hash value. Hash functions are used to create digital fingerprints of data.
53
+
31
54
## Isolation
32
55
33
56
The Isolation requirement means that no transaction can interfere with another.
The Percona branch of [MySQL](#mysql) with performance and management improvements.
88
111
112
+
## Private key
113
+
114
+
A secret key used in asymmetric cryptography for decrypting or signing data. It is typically kept secure and not shared with others.
115
+
116
+
## Public key
117
+
118
+
A publicly available key used in asymmetric cryptography for encrypting or verifying data. It is typically shared with others and used in conjunction with a private key.
119
+
89
120
## Storage Engine
90
121
91
122
A storage engine is a piece of software that implements the details of data storage and retrieval for a database system. This term is primarily used within the [MySQL](#mysql) ecosystem due to it being the first widely used relational database to have an abstraction layer around storage. It is analogous to a Virtual File System layer in an Operating System. A VFS layer allows an operating system to read and write multiple file systems (e.g. FAT, NTFS, XFS, ext3) and a Storage Engine layer allows a database server to access tables stored in different engines (for example, [MyISAM](#myisam) or InnoDB).
92
123
124
+
## Symmetric key
125
+
126
+
A single key used for both encrypting and decrypting data in symmetric cryptography. Symmetric keys are typically kept secret and shared between parties.
127
+
93
128
## Tech Preview
94
129
95
130
A tech preview item can be a feature, a variable, or a value within a variable. Before using this feature in production, we recommend that you test restoring production from physical backups in your environment and also use an alternative backup method for redundancy. A tech preview item is included in a release for users to provide feedback. The item is either updated, released as [general availability(GA)](#general-availability-ga), or removed if not useful. The functionality can change from tech preview to GA.
0 commit comments