Click here to monitor SSC
SQLServerCentral is supported by Redgate
Log in  ::  Register  ::  Not logged in

Content with tag asymmetric keys Rss

   Items 1 to 3 of 3   

Backup Keys

By Steve Jones 2014/11/10 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,501 reads

Understanding the importance of key length with the SQL Server asymmetric encryption algorithms

K. Brian Kelly is trying to use SQL Server's built-in encryption and sees there are three different options available for an asymmetric key, corresponding to key length. What's the impact of the key length?  Read more...
By Additional Articles 2013/08/12 | Source: | Category: encryption
Rating: (not yet rated)  Rate this |   Briefcase | 2,850 reads

Data Insecurity: A Perspective on Data Encryption

The focus of this paper is on the protection of PII data stored within a database using encryption technologies.  Read more...
By Ron Johnson 2013/03/07 | Source: | Category: encryption
Rating: |  Discuss |   Briefcase | 1,610 reads
   Items 1 to 3 of 3   
encryption (3)    
backup and restore (1)    
certificates (1)    
security (1)    
symmetric keys (1)    
transparent data encryption (tde) (1)