Updated on 2025-04-16 GMT+08:00

Checking the Encryption Algorithm

After a key is initialized, the system generates the corresponding encryption algorithm. You can view the encryption algorithms supported by the system on the View Algorithm page.

Prerequisites

Ensure that the key has been initialized. For details, see section Initializing a Key.

Procedure

  1. Log in to a database encryption and access control instance as the sysadmin user.
  2. In the navigation tree on the left, choose Data Encryption > Algorithm View.
  3. On the displayed page, view the algorithm details.