SQL Clone
SQLServerCentral is supported by Redgate
Log in  ::  Register  ::  Not logged in

Articles with tag asymmetric keys Rss

Search for any content tagged asymmetric keys

   Items 1 to 2 of 2   

Understanding the importance of key length with the SQL Server asymmetric encryption algorithms

K. Brian Kelly is trying to use SQL Server's built-in encryption and sees there are three different options available for an asymmetric key, corresponding to key length. What's the impact of the key length?  Read more...
By Additional Articles 2013/08/12 | Source: MSSQLTips.com | Category: encryption
Rating: (not yet rated)  Rate this |   Briefcase | 3,102 reads

Data Insecurity: A Perspective on Data Encryption

The focus of this paper is on the protection of PII data stored within a database using encryption technologies.  Read more...
By Ron Johnson 2013/03/07 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 1,618 reads
   Items 1 to 2 of 2