Call now: (800) 766-1884  



 Home


 SQL Server Tips
 SQL Server Training

 SQL Server Consulting
 SQL Server Support
 SQL Server Remote DBA



 Articles
 Services
 SQL Server Scripts
 Scripts Menu



 

 

 

   
  SQL Server Tips by Gama and Naughter

MS CryptoAPI based Encryption Implementations

As with the MS CryptoAPI hash implementation, we first acquire a handle to a CSP using ‘CryptAcquireContext’. To perform the encryption, we must construct a session key for the encryption based on the password parameter provided. To achieve this we create a SHA1 hash as we do for hashing. We then use the API call “CryptDeriveKey” to create a session key. Because block ciphers can end up producing encrypted data longer than the plaintext data presented to it, we first must allocate some memory from the heap to contain the encrypted data. We must also copy the plaintext data into the encrypted data buffer, because encryption is done in place in the MS CryptoAPI. The actual encryption process is achieved using “CryptEncrypt”. Finally we return the encrypted data in the output parameter.


The above book excerpt is from:

Super SQL Server Systems
Turbocharge Database Performance with C++ External Procedures

ISBN: 0-9761573-2-2
Joseph Gama, P. J. Naughter

 http://www.rampant-books.com/book_2005_2_sql_server_external_procedures.htm  

 

Burleson Consulting Remote DB Administration


 

 


 

 

 

 

 
Burleson is the America's Team

Note: The pages on this site were created as a support and training reference for use by our staff of DBA consultants.  If you find it confusing, please exit this page.

Errata?  SQL Server technology is changing and we strive to update our SQL Server support information.  If you find an error or have a suggestion for improving our content, we would appreciate your feedback.  Just  e-mail:and include the URL for the page.
 


Burleson Consulting
SQL Server database support

 

Copyright © 1996 -  2013 by Vaaltech Web Services. All rights reserved.

Hit Counter