Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 
        
Home       Members    Calendar    Who's On


Add to briefcase

TDE Encryption yet again Expand / Collapse
Author
Message
Posted Tuesday, August 07, 2012 5:37 AM
SSC Rookie

SSC RookieSSC RookieSSC RookieSSC RookieSSC RookieSSC RookieSSC RookieSSC Rookie

Group: General Forum Members
Last Login: Wednesday, May 01, 2013 1:44 AM
Points: 34, Visits: 211
Hello everyone,
Does any one know if TDE Encryption uses CBC (Cipher Block Chaining) or ECB (Electronic Code Block)
Thanks
Post #1341166
Posted Tuesday, August 07, 2012 1:04 PM


SSCertifiable

SSCertifiableSSCertifiableSSCertifiableSSCertifiableSSCertifiableSSCertifiableSSCertifiableSSCertifiableSSCertifiable

Group: General Forum Members
Last Login: 2 days ago @ 2:12 PM
Points: 7,084, Visits: 14,685
The article describing TDE is here:
http://technet.microsoft.com/library/cc278098(SQL.100).aspx#_Toc189384677

Based on its description - it's CBC.


----------------------------------------------------------------------------------
Your lack of planning does not constitute an emergency on my part...unless you're my manager...or a director and above...or a really loud-spoken end-user..All right - what was my emergency again?
Post #1341490
Posted Wednesday, August 08, 2012 2:03 AM
SSC Rookie

SSC RookieSSC RookieSSC RookieSSC RookieSSC RookieSSC RookieSSC RookieSSC Rookie

Group: General Forum Members
Last Login: Wednesday, May 01, 2013 1:44 AM
Points: 34, Visits: 211
Thanks!!
I read the white paper and it was there in black and white

'Data is encrypted in the cipher block chaining (CBC) encryption mode. The encrypted database files that are written to disk are the same size as the unencrypted files because no extra padding is required and the initialization vector (IV) and encrypted DEK are stored within the existing space. Because the log is padded to the next VLF boundary, the log will grow in size. Note that while the database state is marked as Encryption enabled, the actual state of the encryption should be monitored through the DEK state. When the background scan is complete the DEK state is set to Encrypted. At this point, future writes to the log and to disk are protected.'
Post #1341719
« Prev Topic | Next Topic »

Add to briefcase

Permissions Expand / Collapse