Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

SQL Server 2005 – Managing Certificates

By Exforsys | on December 26, 2005 |
SQL Server 2005

SQL Server 2005 – Managing Certificates

In this tutorial you will learn about Managing Certificates in SQL Server 2005, SQL Server 2005 makes significant improvements in two areas—Native encryption and certificates. Encryption is a mechanism that is intended to protect data using a specially designed algorithm for converting content into a format different from the original. Reversal of the process requires an appropriate decryption key and algorithm that converts the data back into its original content.

The key and the algorithm required for encryption and decryption may be identical or different. The process may be symmetrical or asymmetrical. The complexity of the algorithm increases data security but requires huge computational facilities to complete the process.

Asymmetric algorithms have a pair of keys that are known as public and private keys. Private keys are available only to the owner while the public one lacks protection and can be used to perform data encryption. Decryption can only be performed by use of the private key. This approach is also used for digital signatures where the sequence is reversed.

A step forward in resolving the issues related to private and public key distribution has been resolved by the creation of digital certificates. Microsoft has created a number of certificate authorities known as Trusted Root Certification Authorities with the operating system. These are institutions with impeccable reputation assigned with the responsibility of verifying the authenticity of those requesting certificates. They are also empowered to delegate the power of issuing certificates to other authorities.

The characteristics of the certificates reflect the purpose of issue and the public key, the digital signature of the issuer and the validity period. These certificates can be revoked and added to a special list maintained for the purpose by the issuer. However, the responsibility of verifying certificate validity vests with the application.

In SQL Server 2005 encryption components are available natively. Each instance of the Server has a Service Master Key which is automatically created during setup and encrypted with a Data Protection API provided by the Windows Operating system. This secures system data. The Service Master key secures the Database Master Keys which is the basis for creating certificates or asymmetric keys. These keys can then be used to protect data and extend encryption hierarchy.

Pairs of functions have been created to handle the process of encryption and decryption such as EncryptByCert() and DecryptByCert(); EncryptByAsymKey() and DecryptByAsymKey(); EncryptByKey() and DecryptByKey(); and EncryptByPassPhrase() and DecryptByPassPhrase().

The database master key is created using the syntax CREATE MASTER KEY ENCRYTPION BY PASSWORD= ‘password’.

The Administrator defined password encrypts the key and stores it in the sys.symmetric_keys catalog and the Service Master Key encrypts the database master and stores it separately in sys.databases for facilitating automatic opening. Certificates and asymmetric keys can, then, be created.

Certificates are generated using the syntax CREATE CERTIFICATE DDL T-SQL statement. Users can create new certificates or use existing ones with the password included in the CREATE CERTIFICATE statement.

The CREATE ASYMMETRIC KEY T-SQL statement allows the users load an existing key pair from a file or an assembly and create a new one using the RSA algorithm with 512,1024 or 2048 bit long private key. If a password is specified, it is used to encrypt the private key else the database master is used to perform the role. This process of using asymmetric keys is very complex and processor intensive.

A symmetric key can be created using the CREATE SYMMETRIC KEY DDL T-SQL statement. In this instance the encryption algorithm can be specified and the user can specify whether the symmetric key will be encrypted with the certificate, another key or password. Symmetric keys in a database are listed in sys.symmetric_keys catalog while open symmetric keys are listed in sys.open_keys catalog.

In addition to the above built in features, SQL Server allows users take advantage of the encryption functionality of the .NET Framework to create user defined functions.

« « SQL Server 2005 – Managing Permissions
SQL Server 2005 – Disaster Recovery » »

Author Description

Avatar

Editorial Team at Exforsys is a team of IT Consulting and Training team led by Chandra Vennapoosa.

Free Training

RSSSubscribe 391 Followers
  • Popular
  • Recent
  • SQL Server 2005 Administrative Tools

    November 19, 2005 - 0 Comment
  • SQL Server 2005 – Backing up a Database

    January 1, 2006 - 0 Comment
  • SQL Server 2005 – Unattended Installations

    December 7, 2005 - 0 Comment
  • T-SQL Enhancements in SQL Server 2005

    October 15, 2005 - 0 Comment
  • SQL Server 2005 – Populating the Database

    December 18, 2005 - 0 Comment
  • SQL Server 2005 – Registered Servers

    November 19, 2005 - 0 Comment
  • SQL Server 2005 – Introduction to Data Availability

    January 1, 2006 - 0 Comment
  • SQL Server 2005 – Upgrading from earlier versions of SQL Server

    December 7, 2005 - 0 Comment
  • Data Manipulation Language (DML) in SQL Server 2005

    October 15, 2005 - 0 Comment
  • SQL Server 2005 – Database Backup

    December 20, 2005 - 0 Comment
  • SQL Server 2005 – Configuring Replication

    January 11, 2006 - 0 Comment
  • SQL Server 2005 Replication Enhancements

    January 11, 2006 - 0 Comment
  • SQL Server 2005 – Mirror Server

    January 11, 2006 - 0 Comment
  • SQL Server 2005 – Introduction to Data Availability

    January 1, 2006 - 0 Comment
  • SQL Server 2005 – Backing up a Database

    January 1, 2006 - 0 Comment
  • SQL Server 2005 – Using Database Snapshots

    December 26, 2005 - 0 Comment
  • SQL Server 2005 – Disaster Recovery

    December 26, 2005 - 0 Comment
  • SQL Server 2005 – Managing Permissions

    December 26, 2005 - 0 Comment
  • Managing SQL Server 2005 Security

    December 24, 2005 - 0 Comment
  • SQL Server 2005 – Using the Database Tuning Advisor

    December 24, 2005 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • SQL Server 2005 – Configuring Replication
  • SQL Server 2005 Replication Enhancements
  • SQL Server 2005 – Mirror Server
  • SQL Server 2005 – Introduction to Data Availability
  • SQL Server 2005 – Backing up a Database

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2023. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT