The_SQL_DBA (12/12/2008)
1.How is the process supposed to work?
That's a bit of a vague question.
How would the process of querying the table with ref to this column work after encryption?
If you query it without opening the key and calling the decryption function, you'll see the encrypted data.
May I suggest you read over the encryption section in BoL. It's fairly good. If you have specific questions afterwards, post them.
Gail Shaw
Microsoft Certified Master: SQL Server, MVP, M.Sc (Comp Sci)
SQL In The Wild: Discussions on DB performance with occasional diversions into recoverability