SQL SERVER ENCRYPTION презентация

Service Master Key
 Service Master Key
 Root – Top Level KeyKey Management Hierarchy
 Key Management Hierarchy
 Database Master Keys
 Symmetric key
Key Management HierarchyMS SQL Server Protecting Password
  Avoid storing passwords if possible
MS SQL Server Checklist
 Use either the AES192 or AES256 algorithm
Encryption for Oracle 8i-11g 
 Oracle DBMS Obfuscation Toolkit (DOTK)
 (OnlyOracle DOTK Checklist
 Use only the 3DES encryption rather than DES
Oracle DBMS Obfuscation Toolkit
 DOTK Encryption Procedure:
 DBMS_OBFUSCATION_TOOLKIT.DES3Encrypt( input_string IN VARCHAR2,Oracle DBMS Obfuscation Toolkit
 DOTK Decryption Procedure:
 DBMS_OBFUSCATION_TOOLKIT.DES3Decrypt(
  input_string INOracle DBMS Obfuscation Toolkit
 DOTK DES3 Generate Key Procedure:
 DBMS_OBFUSCATION_TOOLKIT.DES3GetKey(
 Oracle DBMS Crypto Checklist
 Use either the AES192 or AES256 algorithm
Oracle DBMS Crypto Encryption
 Sample Encrypt function
 DBMS_CRYPTO.ENCRYPT(
  src INOracle DBMS Crypto  Encrypt TYP Parameter
 TYP parameter specifies algorithmsOracle DBMS Crypto Encryption
 DBMS Crypto Generate Random Bytes:
 DBMS_CRYPTO.RANDOMBYTES (
Custom Cryptographic functions based on DLLs



Слайды и текст этой презентации
Слайд 1
Описание слайда:


Слайд 2
Описание слайда:
Service Master Key Service Master Key Root – Top Level Key – symmetric key One Service Master key per installation Auto-Generated at time of installation Can not be directly access, Can be regenerated and exported Accessed by SQL Server Service account

Слайд 3
Описание слайда:
Key Management Hierarchy Key Management Hierarchy Database Master Keys Symmetric key One Database Master key per Database Used to encrypt all user keys in the database Copy stored encrypted with Service Master Key Also stored encrypted with a password Recommend removing copy stored with service master key if possible. User Keys May be a certificates, asymmetric keys or symmetric key Generated as needed by DBA or users Stored encrypted with Database Master key

Слайд 4
Описание слайда:
Key Management Hierarchy

Слайд 5
Описание слайда:
MS SQL Server Protecting Password Avoid storing passwords if possible Use LDAP or Active Directory is possible Otherwise use Crypto API to generate secure salted hash: CryptGenRandom() generates a salt CryptCreateHash() creates hash object CryptHashData() generated hash

Слайд 6
Описание слайда:
MS SQL Server Checklist Use either the AES192 or AES256 algorithm Use randomly generated keys and passwords generated by MS SQL Server, or via CryptGenRandom() from MS Crypto API Avoid storing keys or passwords in software Remove the service key encrypted copy of the database master, if possible to reduce risk.

Слайд 7
Описание слайда:

Слайд 8
Описание слайда:

Слайд 9
Описание слайда:

Слайд 10
Описание слайда:

Слайд 11
Описание слайда:

Слайд 12
Описание слайда:
Encryption for Oracle 8i-11g Oracle DBMS Obfuscation Toolkit (DOTK) (Only option for older Oracle 8g & 9g) Oracle DBMS_CRYPTO package Oracle Transparent Data Encryption (TDE) Oracle Advanced Security Option

Слайд 13
Описание слайда:
Oracle DOTK Checklist Use only the 3DES encryption rather than DES Avoid for highly sensitive information, Use DBMS_CRYPTO when available Use a randomly generated key of at least 128 bits generated from DES3GetKey(). Use a good source of entropy for the random seed used for generating the key such as /dev/random on Unix/Linux systems and CryptGenRandom() on MS windows. Use a randomly generated IV (Initialization vector) of 8-16 bytes (64-128 bits) for each encrypted record.

Слайд 14
Описание слайда:
Oracle DBMS Obfuscation Toolkit DOTK Encryption Procedure: DBMS_OBFUSCATION_TOOLKIT.DES3Encrypt( input_string IN VARCHAR2, key_string IN VARCHAR2, encrypted_string OUT VARCHAR2, which IN PLS_INTEGER DEFAULT TwoKeyMode, iv_string IN VARCHAR2 DEFAULT NULL); Also function with output returned Also function & procedures with raw parameters Default Null IV is Dangerous, should be random!

Слайд 15
Описание слайда:
Oracle DBMS Obfuscation Toolkit DOTK Decryption Procedure: DBMS_OBFUSCATION_TOOLKIT.DES3Decrypt( input_string IN VARCHAR2, key_string IN VARCHAR2, decrypted_string OUT VARCHAR2, which IN PLS_INTEGER DEFAULT TwoKeyMode iv_string IN VARCHAR2 DEFAUTL NULL); Also function with output returned Also function & procedures with raw parameters Need the same IV to decrypt.

Слайд 16
Описание слайда:
Oracle DBMS Obfuscation Toolkit DOTK DES3 Generate Key Procedure: DBMS_OBFUSCATION_TOOLKIT.DES3GetKey( which IN PLS_INTEGER DEFAULT TwoKeyMode, seed_string IN VARCHAR2, key OUT VARCHAR2); Also function with output returned Also function & procedure with raw parameters Important to use Random seed.

Слайд 17
Описание слайда:
Oracle DBMS Crypto Checklist Use either the AES192 or AES256 algorithm Use DBMS_CRYPTO.RANDOMBYTES() to generate random keys, not DBMS_RANDOM Use CBC (Cipher Block Chaining) mode. CFB Cipher Feedback Mode and OFB Output Feedback Mode are both ok Do not use ECB Electronic Codebook chaining mode (It is weak) Use PKCS5 for cryptographic padding rather than null padding

Слайд 18
Описание слайда:
Oracle DBMS Crypto Encryption Sample Encrypt function DBMS_CRYPTO.ENCRYPT( src IN RAW, typ IN PLS_INTEGER, key IN RAW, iv IN RAW DEFAULT NULL) RETURN RAW; Also procedure with output as a parameter Important to use Random IV. Decrypt function & procedure are very similar.

Слайд 19
Описание слайда:
Oracle DBMS Crypto Encrypt TYP Parameter TYP parameter specifies algorithms and modifiers

Слайд 20
Описание слайда:
Oracle DBMS Crypto Encryption DBMS Crypto Generate Random Bytes: DBMS_CRYPTO.RANDOMBYTES ( number_bytes IN POSITIVE) RETURN RAW; Use for Random IV and to generate random keys Do not use DBMS_RANDOM, as it’s weak.

Слайд 21
Описание слайда:
Custom Cryptographic functions based on DLLs


Скачать презентацию на тему SQL SERVER ENCRYPTION можно ниже:

Похожие презентации