Solved

Does the Oracle wrap utility actually "encrypt" the existing oracle schema structure?

Posted on 2008-06-12
2
1,279 Views
Last Modified: 2013-12-19
Hi,

      I need to secure our Oracle db from unauthorized changes to the schema. The db is not in a development\production environment. It is strickly holding non-sensitive data, however, one of our security requirements is to have the Oracle Database Source Code Object Encryption - encrypted. Is the wrap utility used for this purpose? What does obfuscation offer? We simply do not want the existing Oracle schema to be tampered with and become unusable. Could someone clarify if the wrap utility or obfuscation utility is only used for a development environment or could it be used to protect the existing Oracle db schema?

Thanks, MissyMadi
0
Comment
Question by:missymadi
  • 2
2 Comments
 
LVL 23

Expert Comment

by:David
ID: 21770016
No, it masks the code, but may be readily hacked.  You might google further for specifics.  Wrap is used for PL/SQL objects, to protect the modules from casual viewing.  As far as having the schema objects tampered with, you have other security measures to work with such as roles and fine-grained auditing.
0
 
LVL 23

Accepted Solution

by:
David earned 125 total points
ID: 21770046
1. Obfuscation  Obfuscation is not technically encryption.  Obfuscation simply obscures and makes your data apparently useless.  Advanced decryption techniques can break obfuscation, yet obfuscation makes casual data theft\ unlikely among threats inside or outside your organization unless sophisticated and time- consuming techniques are employed to break the obfuscation keys.

2. DES Encryption  DES Encryption is the certified encryption standard provided by the Oracle Corporation through their package DBMS_Obfuscation_Toolkit.  The Encryption Wizard utilizes a 64 bit key to protect your data.

3. Triple DES Encryption  Triple DES Encryption (3DES) is a response to advanced techniques used to break standard DES encrypted data.  With Triple DES, a data value is encrypted recursively using three 64-bit keys to insure an almost infinite number of key combinations. Currently the Encryption Wizard uses the Triple DES scheme:

C=Ek3(Dk2(Ek1(P)))

4. AES 128-bit Encryption - AES (Advanced Encryption Standard) encryption is available to  Oracle 10g users through the new DBMS_Crypto toolkit.  AES encryption is more secure than DES Encryption and we have tested it as 20% faster on small and medium-sized tables.

5. AES 256-bit  Encryption - 256-bit AES encryption uses large 32 byte encryption keys. This encryption  type also is called through Oracle's certified DBMS_Crypto toolkit and is only available to Oracle 10g  users.

Source: http://www.relationalwizards.com/html/ora_encyrption.html
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
PL/SQL Search for multiple strings 5 54
Oracle sql query 7 60
clob to char in oracle 3 38
MULTIPLE DATE QUERY 15 77
Why doesn't the Oracle optimizer use my index? Querying too much data Most Oracle developers know that an index is useful when you can use it to restrict your result set to a small number of the total rows in a table. So, the obvious side…
Truncate is a DDL Command where as Delete is a DML Command. Both will delete data from table, but what is the difference between these below statements truncate table <table_name> ?? delete from <table_name> ?? The first command cannot be …
This video shows, step by step, how to configure Oracle Heterogeneous Services via the Generic Gateway Agent in order to make a connection from an Oracle session and access a remote SQL Server database table.
This video shows how to recover a database from a user managed backup

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question