symmetric-key

Symmetric key storage

My company is going to be storing sensitive data for our customers, and will be encrypting data using one of the managed .NET encryption algorithm classes. Most of the work is done, but we haven't figured out how/where to store the key. I've done some light searching and reading, and it seems like a hardware solution might be the most se...

What is the performance difference of pki to symmetric encryption?

We are looking to do some heavy security requirements on our project, and we need to do a lot of encryption that is highly performant. I think that I know that PKI is much slower and more complex than symmetric encrpyption, but I can't find the numbers to back up my feelings. ...

SQL Server 2005 - Restoring an encrypted DB on a different server

I have backed up an encrypted DB (symmetric key/certificate) and restored it on a different server. Unfortuantely we're having problems with the decryption... hoping someone can help. In the restored db, I can see the Symmetric Key and the Certificate in SSMS, but when I try to Open the key using the cert ( open symmetric key Key...

how to wrap/store the key of TripleDESCryptoServiceProvider

I'm using DES encryption, and I want to store the key of TripleDESCryptoServiceProvider. But the key consists of (Key + IV), I was trying to save them in an XML file using XmlTextWriter Convert.ToBase64String(...) but there was an exception due to IV contains invalid characters "=" in XML. Is there a better way to store symmetri...

Why does changing one bit in a Triple DES key or initial value not give different encrypted data?

I'm using pyDes to encrypt some data. I wanted to demonstrate that if you change even one bit in the key or initial value, the encrypted data would be totally different. I set up the 16-byte key to change the last character by +/- 1, causing at least one bit to be different. However, even when I do that, the 3 different instances of e...

RijndaelManaged Key generation

I need to encrypt data and store it in a file and later be able to decrypt it back. For this I am using RijndaelManaged class. Now I do not want to keep the key hardcoded in the code. After some googling I found this method - Here the key is generated but then all other values like passphrase, salt and IV are hardcoded. I do not have th...

SQL Symmetric Key and opening it from C#

Hi, I am trying to encrypt data in SQL Server via a Symmetric key. When a user submits data through a web form, I would like for the data to be encrypted, using my Symmetric Key that I have saved inside the SQL Server. I am trying to find out how to do this. Currently, I run the following: USE myDb GO OPEN SYMMETRIC KEY myKey DECRYPTIO...

SQL Server 2008 + PCI Compliance? Pertains to PCI, as well as Symmetric keys!

I've never had to deal with PCI compliance before. I've been reading their documentation and it says I need to protect the credit card number, expiration date and the card holder's name. No storage of security codes ever. In their documentation, it just says protect. Is this saying I need to encrypt these 3 columns in my database? I...

How can I duplicate a SQL Server symmetric key?

We have a server with a database that has a symmetric key (Database -> Security -> Symmetric Key). We have a backup duplicate databases that we are using as a test databases, but we don't have this key in there. How can I duplicate this symmetric key (or make a new one exactly like the old) and put it in the existing databases? It has t...

Why is AES more secure than DES?

I am beginning to learn crypto algorithms and I understand how the above mentioned algorithms work. Is it that the key length of AES is longer? Which steps of AES encryption makes it less vulnerable than DES? ...

Why in brute force attack on Symmetric Algorithm there is 50 percent chance of finding the key after half of the attempts?

Any cryptography text mentions that in brute force attack on Symmetric Algorithm there is 50 percent chance of finding the key after half of the attempt. For e.g. DES with 56 bit key would have 50 percent chance of finding the key after first 2 to the power 55 attempts. Why in a brute force attack against any symmetric encryption algo...