Cryptography in the Database: The Last Line of Defense