THE SQL Server Blog Spot on the Web

Welcome to SQLblog.com - The SQL Server blog spot on the web Sign in | |
in Search

Browse by Tags

All Tags » SQL Server 2008 » cryptography   (RSS)
  • SSIS: Mo' Secure Configurations

    I ran into an issue the other day and I needed a solution for automically configuring my SSIS packages from securely stored DBMS connection strings. Problem is that most DBMSs don’t support Integrated Authentication—they require a username and password. Storing the username/password combo in the connection string in plain text is a security risk, ...
    Posted to Michael Coles: Sergeant SQL (Weblog) by Mike C on January 18, 2010
  • "Cloning" Symmetric Keys

    It's well-known by now that SQL Server 2005 and 2008 include new encryption-related statements that allow you to create and administer encryption keys. You can use CREATE CERTIFICATE to create or import a certificate or DROP ASYMMETRIC KEY to remove an asymmetric key from the database, for instance.  One of the interesting ommissions ...
    Posted to Michael Coles: Sergeant SQL (Weblog) by Mike C on June 17, 2009
  • Protecting Your Data @ Rest Presentation (Tuesday)

    Tuesday night I'll be presenting on SQL Server encryption to the NJSQL user's group in Parsippany.  More information about this event and NJSQL can be found here: http://njsql.org/Default.aspx. UPDATE: Uploaded the encryption presentation, attached to this post.
    Posted to Michael Coles: Sergeant SQL (Weblog) by Mike C on May 16, 2009
  • Let's Hash a BLOB

    In my last post I talked about how to work around a couple of the limitations of SQL Server encryption by using SQL CLR and the .NET Framework to encrypt a BLOB value (up to 2.1 GB in size), using any supported algorithm you choose. In the example I used AES to encrypt data using a passphrase. SQL Server 2008 also allows you to generate ...
    Posted to Michael Coles: Sergeant SQL (Weblog) by Mike C on April 12, 2009
  • Let's Encrypt a BLOB

    SQL Server 2008 has an impressive array of encryption features -- cell-level symmetric and asymmetric encryption, key management, EKM, TDE, and more. But they do have some limitations. Symmetric encryption functions, for instance, can only encrypt slightly less than 8,000 bytes of data (the additional information like random IV and ...
    Posted to Michael Coles: Sergeant SQL (Weblog) by Mike C on April 8, 2009
Powered by Community Server (Commercial Edition), by Telligent Systems
  Privacy Statement