8.11. Cryptographic Functions
8.11.1. DECRYPT()
Decrypts data using a symmetric cipher
Result typeVARBINARY
or BLOB
Syntax
|
DECRYPT ( encrypted_input
| USING <algorithm> [MODE <mode>]
| KEY key
| [IV iv] [<ctr_type>] [CTR_LENGTH ctr_length]
| [COUNTER initial_counter] )
|
|!! See syntax of <<fblangref50-scalarfuncs-encrypt,
ENCRYPT
>> for further rules !!
DECRYPT
Function ParametersParameter | Description |
---|---|
encrypted_input | Encrypted input as a blob or (binary) string |
See Table 8.84, “ |
Sizes of data strings (like encrypted_input, key and iv) must meet the requirements of the selected algorithm and mode.
This function returns
BLOB SUB_TYPE BINARY
when the first argument is aBLOB
, andVARBINARY
for all other text and binary types.When the encrypted data was text, it must be explicitly cast to a string type of appropriate character set.
The ins and outs of the various algorithms are considered beyond the scope of this language reference. We recommend searching the internet for further details on the algorithms.
8.11.1.1. DECRYPT
Examples
|select decrypt(x'0154090759DF' using sober128 key 'AbcdAbcdAbcdAbcd' iv '01234567')
|from rdb$database;
|select decrypt(secret_field using aes mode ofb key '0123456701234567' iv init_vector)
|from secure_table;
See alsoSection 8.11.2, “ENCRYPT()
”, Section 8.11.3, “RSA_DECRYPT()
”
8.11.2. ENCRYPT()
Encrypts data using a symmetric cipher
Result typeVARBINARY
or BLOB
Syntax
|
ENCRYPT ( input
| USING <algorithm> [MODE <mode>]
| KEY key
| [IV iv] [<ctr_type>] [CTR_LENGTH ctr_length]
| [COUNTER initial_counter] )
|
|<algorithm> ::= <block_cipher> | <stream_cipher>
|
|<block_cipher> ::=
| AES | ANUBIS | BLOWFISH | KHAZAD | RC5
| | RC6 | SAFER+ | TWOFISH | XTEA
|
|<stream_cipher> ::= CHACHA20 | RC4 | SOBER128
|
|<mode> ::= CBC | CFB | CTR | ECB | OFB
|
|<ctr_type> ::= CTR_BIG_ENDIAN | CTR_LITTLE_ENDIAN
ENCRYPT
Function ParametersParameter | Description |
---|---|
input | Input to encrypt as a blob or (binary) string |
algorithm | The algorithm to use for decryption |
mode | The algorithm mode; only for block ciphers |
key | The encryption/decryption key |
iv | Initialization vector or nonce;
should be specified for block ciphers in all modes except |
ctr_type | Endianness of the counter;
only for |
ctr_length | Counter length;
only for |
initial_counter | Initial counter value;
only for |
This function returns
BLOB SUB_TYPE BINARY
when the first argument is aBLOB
, andVARBINARY
for all other text and binary types.Sizes of data strings (like key and iv) must meet the requirements of the selected algorithm and mode, see table Table 8.85, “Encryption Algorithm Requirements”.
In general, the size of iv must match the block size of the algorithm
For ECB and CBC mode, input must be multiples of the block size, you will need to manually pad with zeroes or spaces as appropriate.
The ins and outs of the various algorithms and modes are considered beyond the scope of this language reference. We recommend searching the internet for further details on the algorithms.
Although specified as separate options in this Language Reference, in the actual syntax
CTR_LENGTH
andCOUNTER
are aliases.
Algorithm | Key size (bytes) | Block size (bytes) | Notes |
---|---|---|---|
Block Ciphers | |||
| 16, 24, 32 | 16 | Key size determines the AES variant: 16 bytes → AES-128 24 bytes → AES-192 32 bytes → AES-256 |
| 16 - 40, in steps of 4 (4x) | 16 |
|
| 8 - 56 | 8 |
|
| 16 | 8 |
|
| 8 - 128 | 8 |
|
| 8 - 128 | 16 |
|
| 16, 24, 32 | 16 |
|
| 16, 24, 32 | 16 |
|
| 16 | 8 |
|
Stream Ciphers | |||
| 16, 32 | 1 | Nonce size (IV) is 8 or 12 bytes. For nonce size 8, initial_counter is a 64-bit integer, for size 12, 32-bit. |
| 5 - 256 | 1 |
|
| 4x | 1 | Nonce size (IV) is 4y bytes, the length is independent of key size. |
8.11.2.1. ENCRYPT
Examples
|select encrypt('897897' using sober128 key 'AbcdAbcdAbcdAbcd' iv '01234567')
|from rdb$database;
See alsoSection 8.11.1, “DECRYPT()
”, Section 8.11.4, “RSA_ENCRYPT()
”
8.11.3. RSA_DECRYPT()
Decrypts data using an RSA private key and removes OAEP or PKCS 1.5 padding
Result typeVARBINARY
Syntax
|
RSA_DECRYPT (encrypted_input KEY private_key
| [LPARAM tag_string] [HASH <hash>] [PKCS_1_5])
|
|<hash> ::= MD5 | SHA1 | SHA256 | SHA512
RSA_DECRYPT
Function ParametersParameter | Description |
---|---|
encrypted_input | Input data to decrypt |
private_key | Private key to apply, PKCS#1 format |
tag_string | An additional system-specific tag to identify which system encrypted the message;
default is |
hash | The hash used for OAEP padding;
default is |
RSA_DECRYPT
decrypts encrypted_input using the RSA private key and then removes padding from the resulting data.
By default, OAEP padding is used.
The PKCS_1_5
option will switch to the less secure PKCS 1.5 padding.
The PKCS_1_5
option is only for backward compatibility with systems applying PKCS 1.5 padding.
For security reasons, it should not be used in new projects.
This function returns
VARBINARY
.When the encrypted data was text, it must be explicitly cast to a string type of appropriate character set.
8.11.3.1. RSA_DECRYPT
Examples
Run the examples of the RSA_PRIVATE
and RSA_PUBLIC
, RSA_ENCRYPT
functions first.
|select cast(rsa_decrypt(rdb$get_context('USER_SESSION', 'msg')
|key rdb$get_context('USER_SESSION', 'private_key')) as varchar(128))
|from rdb$database;
See alsoSection 8.11.4, “RSA_ENCRYPT()
”, Section 8.11.5, “RSA_PRIVATE()
”, Section 8.11.1, “DECRYPT()
”
8.11.4. RSA_ENCRYPT()
Pads data using OAEP or PKCS 1.5 and then encrypts it with an RSA public key
Result typeVARBINARY
Syntax
|
RSA_ENCRYPT (input KEY public_key
| [LPARAM tag_string] [HASH <hash>] [PKCS_1_5])
|
|<hash> ::= MD5 | SHA1 | SHA256 | SHA512
RSA_ENCRYPT
Function ParametersParameter | Description |
---|---|
input | Input data to encrypt |
public_key | Public key to apply, PKCS#1 format |
tag_string | An additional system-specific tag to identify which system encrypted the message;
default is |
hash | The hash used for OAEP padding;
default is |
RSA_ENCRYPT
pads input using the OAEP or PKCS 1.5 padding scheme and then encrypts it using the specified RSA public key.
This function is normally used to encrypt short symmetric keys which are then used in block ciphers to encrypt a message.
By default, OAEP padding is used.
The PKCS_1_5
option will switch to the less secure PKCS 1.5 padding.
The PKCS_1_5
option is only for backward compatibility with systems applying PKCS 1.5 padding.
For security reasons, it should not be used in new projects.
8.11.4.1. RSA_ENCRYPT
Examples
Run the examples of the RSA_PRIVATE
and RSA_PUBLIC
functions first.
|select rdb$set_context('USER_SESSION', 'msg', rsa_encrypt('Some message'
|key rdb$get_context('USER_SESSION', 'public_key'))) from rdb$database;
See alsoSection 8.11.3, “RSA_DECRYPT()
”, Section 8.11.6, “RSA_PUBLIC()
”, Section 8.11.2, “ENCRYPT()
”
8.11.5. RSA_PRIVATE()
Generates an RSA private key
Result typeVARBINARY
Syntax
|
RSA_PRIVATE (key_length)
RSA_PRIVATE
Function ParametersParameter | Description |
---|---|
key_length | Key length in bytes; minimum 4, maximum 1024. A size of 256 bytes (2048 bits) or larger is recommended. |
RSA_PRIVATE
generates an RSA private key of the specified length (in bytes) in PKCS#1 format.
The larger the length specified, the longer it takes for the function to generate a private key.
8.11.5.1. RSA_PRIVATE
Examples
|select rdb$set_context('USER_SESSION', 'private_key', rsa_private(256))
|from rdb$database;
Putting private keys in the context variables is not secure;
we’re doing it here for demonstration purposes.
SYSDBA and users with the role RDB$ADMIN
or the system privilege MONITOR_ANY_ATTACHMENT
can see all context variables from all attachments.
See alsoSection 8.11.6, “RSA_PUBLIC()
”, Section 8.11.3, “RSA_DECRYPT()
”
8.11.6. RSA_PUBLIC()
Generates an RSA public key
Result typeVARBINARY
Syntax
|
RSA_PUBLIC (private_key)
RSA_PUBLIC
Function ParametersParameter | Description |
---|---|
private_key | RSA private key in PKCS#1 format |
RSA_PUBLIC
returns the RSA public key in PKCS#1 format for the provided RSA private key (also PKCS#1 format).
8.11.6.1. RSA_PUBLIC
Examples
Run the example of the RSA_PRIVATE
function first.
|select rdb$set_context('USER_SESSION', 'public_key',
|rsa_public(rdb$get_context('USER_SESSION', 'private_key'))) from rdb$database;
See alsoSection 8.11.5, “RSA_PRIVATE()
”, Section 8.11.4, “RSA_ENCRYPT()
”
8.11.7. RSA_SIGN_HASH()
PSS encodes a message hash and signs it with an RSA private key
Result typeVARBINARY
Syntax
|
RSA_SIGN_HASH (message_digest
| KEY private_key
| [HASH <hash>] [SALT_LENGTH salt_length]
| [PKCS_1_5])
|
|<hash> ::= MD5 | SHA1 | SHA256 | SHA512
RSA_SIGN_HASH
Function ParametersParameter | Description |
---|---|
message_digest | Hash of message to sign. The hash algorithm used should match hash |
private_key | RSA private key in PKCS#1 format |
hash | Hash to generate PSS encoding;
default is |
salt_length | Length of the desired salt in bytes; default is 8; minimum 1, maximum 32. The recommended value is between 8 and 16. |
RSA_SIGN_HASH
performs PSS encoding of the message_digest to be signed, and signs using the RSA private key.
By default, OAEP padding is used.
The PKCS_1_5
option will switch to the less secure PKCS 1.5 padding.
The PKCS_1_5
option is only for backward compatibility with systems applying PKCS 1.5 padding.
For security reasons, it should not be used in new projects.
This function expects the hash of a message (or message digest), not the actual message. The hash argument should specify the algorithm that was used to generate that hash.
A function that accepts the actual message to hash might be introduced in a future version of Firebird.
8.11.7.1. RSA_SIGN_HASH
Examples
Run the example of the RSA_PRIVATE
function first.
|select rdb$set_context('USER_SESSION', 'msg',
|rsa_sign_hash(crypt_hash('Test message' using sha256)
|key rdb$get_context('USER_SESSION', 'private_key'))) from rdb$database;
See alsoSection 8.11.8, “RSA_VERIFY_HASH()
”, Section 8.11.5, “RSA_PRIVATE()
”, Section 8.3.8, “CRYPT_HASH()
”
8.11.8. RSA_VERIFY_HASH()
Verifies a message hash against a signature using an RSA public key
Result typeBOOLEAN
Syntax
|
RSA_VERIFY_HASH (message_digest
| SIGNATURE signature KEY public_key
| [HASH <hash>] [SALT_LENGTH salt_length]
| [PKCS_1_5])
|
|<hash> ::= MD5 | SHA1 | SHA256 | SHA512
RSA_VERIFY
Function ParametersParameter | Description |
---|---|
message_digest | Hash of message to verify. The hash algorithm used should match hash |
signature | Expected signature of input generated by |
public_key | RSA public key in PKCS#1 format matching the private key used to sign |
hash | Hash to use for the message digest;
default is |
salt_length | Length of the salt in bytes;
default is 8;
minimum 1, maximum 32.
Value must match the length used in |
RSA_VERIFY_HASH
performs PSS encoding of the message_digest to be verified, and verifies the digital signature using the provided RSA public key.
By default, OAEP padding is used.
The PKCS_1_5
option will switch to the less secure PKCS 1.5 padding.
The PKCS_1_5
option is only for backward compatibility with systems applying PKCS 1.5 padding.
For security reasons, it should not be used in new projects.
This function expects the hash of a message (or message digest), not the actual message. The hash argument should specify the algorithm that was used to generate that hash.
A function that accepts the actual message to hash might be introduced in a future version of Firebird.
8.11.8.1. RSA_VERIFY_HASH
Examples
Run the examples of the RSA_PRIVATE
, RSA_PUBLIC
and RSA_SIGN_HASH
functions first.
|select rsa_verify_hash(
|crypt_hash('Test message' using sha256)
|signature rdb$get_context('USER_SESSION', 'msg')
|key rdb$get_context('USER_SESSION', 'public_key'))
|from rdb$database
See alsoSection 8.11.7, “RSA_SIGN_HASH()
”, Section 8.11.6, “RSA_PUBLIC()
”, Section 8.3.8, “CRYPT_HASH()
”