Solved

calculating legth of triple DES  encrypted string

Posted on 2009-04-07
5
487 Views
Last Modified: 2012-05-06
I am encrypting a varchar(30) column and storing in a different column in the database.

I need to calculate what the maximum length of the encrypted text could be so that I can make sure the new column is the right size. How do I calculate the size?

I am using vb.net to do the encryption and SQL server 2005 to store the data.
0
Comment
Question by:darrenwright
  • 3
  • 2
5 Comments
 
LVL 12

Expert Comment

by:udaya kumar laligondla
ID: 24087691
for a 30 character string it will be approximately 36 chars. you can use the following caluculation to calculate the length n + 8 - (n % 8)
where n is the length of the source string
0
 

Author Comment

by:darrenwright
ID: 24088329
I'm get back encryption strings of 88 chars so something not right
0
 
LVL 12

Expert Comment

by:udaya kumar laligondla
ID: 24088695
0
 

Author Comment

by:darrenwright
ID: 24088866
I use encrypttostring function
        Public Overloads Function EncrypttoString(ByVal plainText As String) As String
        Return Convert.ToBase64String(Encrypt(plainText))
    End Function
Public Function Encrypt(ByVal plainText As String) As Byte()
 
        Dim tdes As New TripleDESCryptoServiceProvider()
        Dim encryptor As ICryptoTransform = tdes.CreateEncryptor(mvarTripleDesKey, mvarTripleIV)
        Dim data As Byte() = Encoding.Unicode.GetBytes(plainText)
 
        Return encryptor.TransformFinalBlock(data, 0, data.Length)
 
    End Function

Open in new window

0
 
LVL 12

Accepted Solution

by:
udaya kumar laligondla earned 500 total points
ID: 24093483
you are using three conversions (for 30 chars)
1.  unicode ( 30 *2 = 60)
2.encryption ( 60 +8 (60 % 8) = 64 (63.2))
3. Base64 Encoding (88)  calculated as Base64 = ((64 + 3 - (64 MOD 3)) /3) x 4

0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

It was really hard time for me to get the understanding of Delegates in C#. I went through many websites and articles but I found them very clumsy. After going through those sites, I noted down the points in a easy way so here I am sharing that unde…
As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question