About 165,000 results
Open links in new tab
  1. Certificate and Symmetric Key Restore is not decrypting the data ...

    Nov 4, 2024 · 1 I am working in a test environment with SQL Server 2017 to verify that encrypting data with a symmetrical key will meet our needs. I have successfully encrypted and decrypted …

  2. SQL Server Encryption via symmetric keys (AES_256)

    Aug 6, 2019 · CREATE MASTER KEY ENCRYPTION BY PASSWORD = '<some strong password>'; Go CREATE CERTIFICATE Sales09 WITH SUBJECT = 'Customer Credit Card …

  3. HTTPS uses Asymmetric or Symmetric encryption?

    Jun 13, 2016 · The best answer is that it does both. TLS uses asymmetric encryption to first establish the identity of one or both parties. Secondly, it uses asymmetric encryption to …

  4. The report server Cannot decrypt the symmetric key used to …

    Oct 1, 2013 · The Report Server service uses the symmetric key to access the encrypted data in a report server database. This symmetric key is encrypted by using an asymmetric public key …

  5. Creating a Symmetric AES128 Key in SQL Server based on Key and …

    Jul 2, 2014 · The encryption should satisfy two conditions: (1) the data should be decryptable in the client app (not on the SQL Server side), (2) the symmetrical key should be stored in the …

  6. az keyvault key create error when creating symmetric key

    Feb 21, 2025 · You can create symmetric keys for encryption and decryption with az keyvault key create using the oct type, but if you need key wrapping (KEK), you must use RSA or EC keys. …

  7. How does SSL use symmetric and asymmetric encryption? And …

    So, basically speaking, the SSL use the asymmetric encryption (public/private key pair) to deliver the shared session key, and finally achieved a communication way with symmetric encryption.

  8. Storing encryption keys -- best practices? - Stack Overflow

    I have a web application that uses a symmetric encryption algorithm. How would you store the secret key and initialization vector? Storing as a literal in the code seems like a bad idea. How …

  9. What is the performance difference of pki to symmetric encryption ...

    Practical PKI-based encryption systems use asymmetric encryption to encrypt a symmetric key, and then symmetric encryption with that key to encrypt the data (having said that, someone …

  10. Comparison of DES, Triple DES, AES, blowfish encryption for data

    Apr 5, 2011 · The encryption methods described are symmetric key block ciphers. Data Encryption Standard (DES) is the predecessor, encrypting data in 64-bit blocks using a 56 bit …