Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • Home
  • SEARCH
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 53521
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 10, 20262026-05-10T17:04:35+00:00 2026-05-10T17:04:35+00:00

I’ve just found out about Stack Overflow and I’m just checking if there are

  • 0

I’ve just found out about Stack Overflow and I’m just checking if there are ideas for a constraint I’m having with some friends in a project, though this is more of a theoretical question to which I’ve been trying to find an answer for some time.

I’m not much given into cryptography but if I’m not clear enough I’ll try to edit/comment to clarify any questions.

Trying to be brief, the environment is something like this:

  • An application where the front-end as access to encrypt/decrypt keys and the back-end is just used for storage and queries.

  • Having a database to which you can’t have access for a couple of fields for example let’s say ‘address’ which is text/varchar as usual.

  • You don’t have access to the key for decrypting the information, and all information arrives to the database already encrypted.

The main problem is something like this, how to consistently make queries on the database, it’s impossible to do stuff like ‘where address like ‘%F§YU/´~#JKSks23%”. (IF there is anyone feeling with an answer for this feel free to shoot it).

But is it ok to do where address='±!NNsj3~^º-:'? Or would it also completely eat up the database?

Another restrain that might apply is that the front end doesn’t have much processing power available, so already encrypting/decrypting information starts to push it to its limits. (Saying this just to avoid replies like ‘Exporting a join of tables to the front end and query it there’.)

Could someone point me in a direction to keep thinking about it?


Well thanks for so fast replies at 4 AM, for a first time usage I’m really feeling impressed with this community. (Or maybe I’m it’s just for the different time zone)

Just feeding some information:

The main problem is all around partial matching. As a mandatory requirement in most databases is to allow partial matches. The main constraint is actually the database owner would not be allowed to look inside the database for information. During the last 10 minutes I’ve come up with a possible solution which extends again to possible database problems, to which I’ll add here:

Possible solution to allow semi partial matching:

  • The password + a couple of public fields of the user are actually the key for encrypting. For authentication the idea is to encrypt a static value and compare it within the database.
  • Creating a new set of tables where information is stored in a parsed way, meaning something like: ‘4th Street’ would become 2 encrypted rows (one for ‘4th’ another for ‘Street’). This would already allow semi-partial matching as a search could already be performed on the separate tables.

New question:

  • Would this probably eat up the database server again, or does anyone think it is a viable solution for the partial matching problem?

Post Scriptum: I’ve unaccepted the answer from Cade Roux just to allow for further discussion and specially a possible answer to the new question.

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. 2026-05-10T17:04:35+00:00Added an answer on May 10, 2026 at 5:04 pm

    You can do it the way you describe – effectively querying the hash, say, but there’s not many systems with that requirement, because at that point the security requirements are interfering with other requirements for the system to be usable – i.e. no partial matches, since the encryption rules that out. It’s the same problem with compression. Years ago, in a very small environment, I had to compress the data before putting it in the data format. Of course, those fields could not easily be searched.

    In a more typical application, ultimately, the keys are going to be available to someone in the chain – probably the web server.

    For end user traffic SSL protects that pipe. Some network switches can protect it between web server and database, and storing encrypted data in the database is fine, but you’re not going to query on encrypted data like that.

    And once the data is displayed, it’s out there on the machine, so any general purpose computing device can be circumvented at that point, and you have perimeter defenses outside of your application which really come into play.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 67k
  • Answers 67k
  • Best Answers 0
  • User 1
  • Popular
  • Answers
  • Editorial Team

    How to approach applying for a job at a company ...

    • 7 Answers
  • Editorial Team

    How to handle personal stress caused by utterly incompetent and ...

    • 5 Answers
  • Editorial Team

    What is a programmer’s life like?

    • 5 Answers
  • added an answer It's not bad and as it's been said it might… May 11, 2026 at 11:53 am
  • added an answer Yes. int.MaxValue: 2,147,483,647 Source: https://www.dotnetperls.com/int-maxvalue May 11, 2026 at 11:53 am
  • added an answer Maybe NHawk can help? 'NHawk is an initiative to provide… May 11, 2026 at 11:53 am

Related Questions

I keep getting tasks that are above my skill level. How can I address this without coming accross as grossly incompetent?
I have a web-service that I will be deploying to dev, staging and production.
I'm thinking of starting a wiki, probably on a low cost LAMP hosting account.
I have the following tables in my database that have a many-to-many relationship, which
I'm using the RESTful authentication Rails plugin for an app I'm developing. I'm having
I recently printed out Jeff Atwood's Understanding The Hardware blog post and plan on
I find that getting Unicode support in my cross-platform apps a real pain in
I would like to test a string containing a path to a file for
I'm getting this problem: PHP Warning: mail() [function.mail]: SMTP server response: 550 5.7.1 Unable
I'm an Information Architect and JavaScript developer by trade nowadays, but recently I've been

Trending Tags

analytics british company computer developers django employee employer english facebook french google interview javascript language life php programmer programs salary

Top Members

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.