This is the first of a series of articles on using advanced database techniques to hide the complexity of database encryption and improve its security. The focus is conceptual, not operational, with the hope that readers can apply some of these techniques to their databases. …