Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit b6daedd

Browse files
committedMar 26, 2025
PS-9715 [DOCS] - Update encryption functions for readability - 8.0
modified: docs/encryption-functions.md modified: docs/glossary.md
1 parent 57b4057 commit b6daedd

File tree

2 files changed

+862
-233
lines changed

2 files changed

+862
-233
lines changed
 

‎docs/encryption-functions.md

+827-233
Large diffs are not rendered by default.

‎docs/glossary.md

+35
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,10 @@
44

55
Set of properties that guarantee database transactions are processed reliably. Stands for [Atomicity](#atomicity), [Consistency](#consistency), [Isolation](#isolation), [Durability](#durability).
66

7+
## Asymmetric key
8+
9+
A pair of keys used for cryptographic purposes, consisting of a private key and a corresponding public key. The private key is used for decrypting or signing, while the public key is used for encrypting or verifying.
10+
711
## Atomicity
812

913
Atomicity means that database operations are applied following a “all or nothing” rule. A transaction is either fully applied or not at all.
@@ -12,6 +16,21 @@ Atomicity means that database operations are applied following a “all or nothi
1216

1317
Consistency means that each transaction that modifies the database takes it from one consistent state to another.
1418

19+
## Digest
20+
21+
A digital fingerprint of a piece of data, such as a string or a file, produced by a hash function. Digests are used to verify the integrity of data and ensure it has not been tampered with or altered.
22+
23+
## Digest string
24+
The string representation of a digest, often in hexadecimal format.
25+
26+
## Digital signature
27+
28+
A cryptographic mechanism used to verify the authenticity and integrity of a message, software, or document. It ensures that the data comes from the claimed source and has not been altered during transmission.
29+
30+
## Diffie-Hellman key exchange
31+
32+
A cryptographic protocol that allows two parties to establish a shared secret key over an insecure communication channel without actually exchanging the key.
33+
1534
## Durability
1635

1736
Once a transaction is committed, it will remain so.
@@ -28,6 +47,10 @@ A referential constraint between two tables. Example: A purchase order in the pu
2847

2948
A finalized version of the product which is made available to the general public. It is the final stage in the software release cycle.
3049

50+
## Hash function
51+
52+
A one-way mathematical function that takes input data of any size and produces a fixed-size string of characters, known as a digest or hash value. Hash functions are used to create digital fingerprints of data.
53+
3154
## Isolation
3255

3356
The Isolation requirement means that no transaction can interfere with another.
@@ -86,10 +109,22 @@ Non-Uniform Memory Access ([NUMA](https://en.wikipedia.org/wiki/Non-Uniform_Memo
86109

87110
The Percona branch of [MySQL](#mysql) with performance and management improvements.
88111

112+
## Private key
113+
114+
A secret key used in asymmetric cryptography for decrypting or signing data. It is typically kept secure and not shared with others.
115+
116+
## Public key
117+
118+
A publicly available key used in asymmetric cryptography for encrypting or verifying data. It is typically shared with others and used in conjunction with a private key.
119+
89120
## Storage Engine
90121

91122
A storage engine is a piece of software that implements the details of data storage and retrieval for a database system. This term is primarily used within the [MySQL](#mysql) ecosystem due to it being the first widely used relational database to have an abstraction layer around storage. It is analogous to a Virtual File System layer in an Operating System. A VFS layer allows an operating system to read and write multiple file systems (e.g. FAT, NTFS, XFS, ext3) and a Storage Engine layer allows a database server to access tables stored in different engines (for example, [MyISAM](#myisam) or InnoDB).
92123

124+
## Symmetric key
125+
126+
A single key used for both encrypting and decrypting data in symmetric cryptography. Symmetric keys are typically kept secret and shared between parties.
127+
93128
## Tech Preview
94129

95130
A tech preview item can be a feature, a variable, or a value within a variable. Before using this feature in production, we recommend that you test restoring production from physical backups in your environment and also use an alternative backup method for redundancy. A tech preview item is included in a release for users to provide feedback. The item is either updated, released as [general availability(GA)](#general-availability-ga), or removed if not useful. The functionality can change from tech preview to GA.

0 commit comments

Comments
 (0)
Please sign in to comment.