Solved

What level of encryption does MS Access use?

Posted on 2007-11-28
4
457 Views
Last Modified: 2010-05-18
I developed an Access 2003 application that has been distributed to customer sites.  The database has been encrypted using MS Access/Tools/Security  -  Encoce/Decode database.

I have to answer a customer survey that asks "What bit-level of encryption protects the stored data".

Does anyone know what bit level of encryption is used by MS Access 2003?
0
Comment
Question by:hi2way
  • 2
  • 2
4 Comments
 
LVL 77

Expert Comment

by:peter57r
ID: 20365373
I doubt if there is a proper answer to that Q.
Access encryption is pretty meaningless anyway.  It only protects the data against it being looked at in something other than Access.  Any copy of Access will see the data in clear form.
0
 

Author Comment

by:hi2way
ID: 20373189
Thanks.  I figured that was the case.  Still though, I would like to know the bit-level that Access uses for encryption.  Even though the data can be viewed by others with Access and even if it is a weak bit-level, I'm thinking that it must still use some bit level.  Any thoughts on that?
0
 
LVL 77

Accepted Solution

by:
peter57r earned 125 total points
ID: 20373321
I don't know the answer I'm afraid.

The only other 'fact' I know about Access encryption is that it use some sort of algorithm based on the RC4 standard, but I have no knowledge (or interest in it) beyond that.  I assume RC4 sets a bit level in its definition?

0
 

Author Closing Comment

by:hi2way
ID: 31411412
Thanks.  That response was good enough to give me a little more google fuel to go on.  I found out that it is 32 bit encryption.  Your other points were also reinforced.

Thanks again.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Regardless of which version on MS Access you are using, one of the harder data-entry forms to create is one where most data from previous entries needs to be appended to new records, especially when there are numerous fields and records involved.  W…
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
Familiarize people with the process of utilizing SQL Server views from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Microsoft Access…
Using Microsoft Access, learn some simple rules for how to construct tables in a relational database. Split up all multi-value fields into single values: Split up fields that belong to other things into separate tables: Make sure that all record…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question