The system security officer must grant you permission for working with encryption keys.
The Encryption Keys folder is located in the database folder. Use the Encryption Keys folder to add new keys, and alter or delete existing keys on the database.
The encryption key dependencies are usually set when the column is encrypted with the key.
Accessing encryption-key properties
In the server, click Databases to display a list of available databases.
Double-click the database you want.
Click the Encryption Keys folder in the database to display the list of encryption keys for the selected database.
Right-click the key and select Properties for information on that column.
There are two tabs:
General – displays the key’s name, creator, creation date, key ID, key algorithm, and length. You can also view:
init vector – The initialization vector can be random or null. You can use initialization vector padding to increase the security of encrypted data by increasing the cryptographic variance of the cipertext.
pad – Pad can be random or null. Pad random instructs Adaptive Server to use datatype padding when length is less than one block.
default – Default can be true or false. Use the default encryption key if you want to create encrypted columns without specifying a key.
Permissions – change the permissions for users, groups, and roles on the column.
Click Dependencies at the bottom of the General tab window. The Dependencies window appears with a list of all columns in the database that are encrypted with the selected key.