For considerations when working with encrypted columns, see “Replicating encrypted columns” in Chapter 9 “Managing Replicated Tables” in the Replication Server Administration Guide Volume 1.