Once the rows are sorted, the algorithm for joining the two tables is easy: the database server simply reads both sorted tables sequentially and merge all rows if they are matching.
There are several ways to map the identity, such as looking it up from a database, using an algorithm, and so on; these techniques are beyond the scope of this document.
All values in a specific column of a database table are encrypted with the same password provided by the user, the same encryption algorithm, and the same cipher mode.