Discover how the service master key is created, what it protects and how it is protected itself, and learn about the two important security implications that arise from the protection mechanism used.
Discover how in SQL Server the different encryption keys can build a complex encryption hierarchy in which one key protects the next.
What is a Salt Value and how does it help to protect the stored passwords of your application’s users from attacks involving Rainbow Tables? Read on to find out now.
Hash functions calculate a fixed length binary digest of a document. Read on to see what additional requirements turn an ordinary hash function into a cryptographic hash function and what use cases require the use of cryptographic hash functions.
Certificates are containers for asymmetric encryption keys that can be used to establish a chain of trust between communicating parties. Read on to see how this works in practice.