A symmetric key encryption algorithm is a cryptographic algorithm the uses the same secret key for the encryption and the decryption step. Common examples include DES, RC4 and AES of which only AES can be recommended for use.
Cryptographic terminology can be sometimes somewhat “cryptic”. This post starts out a series to provide a glossary of cryptographic terms. Each post in this series will cover one cryptographic expression in detail.
While not perfect, the T-SQL function CRYPT_GEN_RANDOM() generates cryptographically secure random number values using the Windows Crypt-API. Read on to get all the details on how to use it and when to avoid it.
Ownership chaining is a powerful tool for permission management. However, in some situations it can be misused to gain unauthorized access to a securable. Read on to see this in action.
The ownership chain enables us to setup guarded access in SQL Server. Guarded access means to grant securable access only through a procedure or view. That module can then be used to enforce additional security requirements. Read on to see how the ownership chain makes this possible.