Call now: (800) 766-1884  


 SQL Server Tips
 SQL Server Training

 SQL Server Consulting
 SQL Server Support
 SQL Server Remote DBA

 SQL Server Scripts
 Scripts Menu




  SQL Server Tips by Gama and Naughter

MS CryptoAPI based Encryption Implementations

As with the MS CryptoAPI hash implementation, we first acquire a handle to a CSP using ‘CryptAcquireContext’. To perform the encryption, we must construct a session key for the encryption based on the password parameter provided. To achieve this we create a SHA1 hash as we do for hashing. We then use the API call “CryptDeriveKey” to create a session key. Because block ciphers can end up producing encrypted data longer than the plaintext data presented to it, we first must allocate some memory from the heap to contain the encrypted data. We must also copy the plaintext data into the encrypted data buffer, because encryption is done in place in the MS CryptoAPI. The actual encryption process is achieved using “CryptEncrypt”. Finally we return the encrypted data in the output parameter.

The above book excerpt is from:

Super SQL Server Systems
Turbocharge Database Performance with C++ External Procedures

ISBN: 0-9761573-2-2
Joseph Gama, P. J. Naughter  


Burleson Consulting Remote DB Administration







Burleson is the America's Team

Note: The pages on this site were created as a support and training reference for use by our staff of DBA consultants.  If you find it confusing, please exit this page.

Errata?  SQL Server technology is changing and we strive to update our SQL Server support information.  If you find an error or have a suggestion for improving our content, we would appreciate your feedback.  Just  e-mail:and include the URL for the page.

Burleson Consulting
SQL Server database support


Copyright © 1996 -  2013 by Vaaltech Web Services. All rights reserved.

Hit Counter