Re: Encrypted column - Mailing list pgsql-general

From Steve Atkins
Subject Re: Encrypted column
Date
Msg-id 71E4FE2F-6FC9-4EDB-89FF-69046C405363@blighty.com
Whole thread Raw
In response to Re: Encrypted column  (Ron Johnson <ron.l.johnson@cox.net>)
List pgsql-general
On Jun 5, 2007, at 7:28 AM, Ron Johnson wrote:

> On 06/05/07 08:59, Alvaro Herrera wrote:
>> Ron Johnson wrote:
>>> On 06/04/07 17:54, Guy Rouillier wrote:
>>>> Many people consider two-way encryption to be insecure; two-way
>>>> encryption means you can decrypt a value if you know the key,
>>>> and it is insecure because you usually have to put the key into
>>>> the source code. That means at least one person in your company,
>>>> the programmer maintaining the source code, can learn all of
>>>> your users' passwords.
>>> Two-way encryption is needed for companies that store customer
>>> credit cards.
>> I thought that the advice for companies storing customer CCs was:
>> don't.
>
> Sometimes you "must".
>
> An example from my industry: transponder "toll tags" and toll
> roads.  The customer pre-pays a certain amount based on expected
> usage, and every time he drives thru a plaza, his balance
> decreases.  Once it drops to a certain threshold, more money needs
> to be added to the account.
>
> If he is a CASH/CHEK customer, a light at the lane flashes yellow
> and (depending on the Agency) a message pops up saying, "Balance
> low", so he drives over to the customer service center, stands in
> line and pays his cash.
>
> If he is a CC customer, the system (which I am DBA of) bills his
> card directly, saving the customer much time and effort.

Public key encryption can help here. Encrypt with the public key when
it goes into the database, keep the private key on a separate, well
protected system that's just used for recurring CC billing.

Cheers,
   Steve


pgsql-general by date:

Previous
From: Martijn van Oosterhout
Date:
Subject: Re: lo or bytea streaming engine??
Next
From: "Ian Harding"
Date:
Subject: Re: $libdir