473,425 Members | 1,703 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,425 software developers and data experts.

Triple DES Encryption Custom Key and IV

Is there a way to encrypt/decrypt in SQL using your own defined Key and Initialization Vector. I have a stored procedure that uses an encrypted field and of course it doesnt return anything because I encrypted the value inside my web app before saving it to my database.

Any ideas/thoughts appreciated.
Jul 13 '10 #1
2 4129
ck9663
2,878 Expert 2GB
If that field is sensitive enough for you to encrypt it on your front-end, you should also encrypt that on your database.

Here's an idea.

Happy Coding!!!

~~ CK
Jul 13 '10 #2
To explain what I am doing more. I have a crystal reports viewer linked to a report that takes in the parameter.
The only way for the stored procedure to return a match is if that parameter is passed into the select statement with the Key and IV I used in the app at saving time. That field is constantly encrypted and decrypted many times in my app, so encrypting it permanently does not help me.

Basically im just trying to find a way to either have my stored procedure encrypt the input from the parameter prompt or somehow find a way to encrypt the input before it gets passed to the stored procedure through the CrystalReportViewer so that the stored procedure will return a match.
Jul 13 '10 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

4
by: Harold Crump | last post by:
Greetings, I have a requirement of storing some .xml files on a web server. The files will contain financial information like credit card numbers, so I would like to encrypt them. The files...
5
by: c duden | last post by:
I am attempting to encrypt some text and be able to decrypt it at a later time. I have two methods to do this: public static Byte EncryptText(string textToEncrypt, string encryptionHash) {...
1
by: Cliff | last post by:
We are trying to connect to 3 different Oracle databases using MS Access as the front-end and ODBC as the connection. The problem that we are having is that 1 of the databases requires a...
5
by: OFM | last post by:
I am running an oracle database with the application written in PHP. I would like to be able to have the option to encrypt data residing in certain columns in certain tables i.e. encrypt the SSNO...
3
by: dmalhotr2001 | last post by:
I was wondering whether anyone ever dealt with encryption that are visa compliant with credit card numbers: On 3.4 of this document...
3
by: Kyriakos Petrakos | last post by:
Hello to everyone, Recently, I came across a scenario which required some data encryption routines applied to general binary files. I decided to use the managed code provided by .NET that...
3
by: Dave Cullen | last post by:
Hello C I have a project that requires a calculated "key" to be used in a security access application. The customer supplies a secret 8 byte number that gets combined with the serial number of...
2
by: TeenuSusan | last post by:
Hii All, I want to do Triple DES Encryption using C language.Can anybody help me...
7
by: j1mb0jay | last post by:
I have created some simple string encryption in C# to be able to store passwords in a database without them being stored in plain text. I have attached a encrypted passage from a book I like....
2
gchq
by: gchq | last post by:
Hi there There is no problem encypting and decrypting a credit card number, but whilst encrypting the expiry date seems to work it blows out on decryption with "Invalid length for a Base-64 char...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
0
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.