Solved

calculating legth of triple DES  encrypted string

Posted on 2009-04-07
5
485 Views
Last Modified: 2012-05-06
I am encrypting a varchar(30) column and storing in a different column in the database.

I need to calculate what the maximum length of the encrypted text could be so that I can make sure the new column is the right size. How do I calculate the size?

I am using vb.net to do the encryption and SQL server 2005 to store the data.
0
Comment
Question by:darrenwright
  • 3
  • 2
5 Comments
 
LVL 12

Expert Comment

by:udayakumarlm
ID: 24087691
for a 30 character string it will be approximately 36 chars. you can use the following caluculation to calculate the length n + 8 - (n % 8)
where n is the length of the source string
0
 

Author Comment

by:darrenwright
ID: 24088329
I'm get back encryption strings of 88 chars so something not right
0
 
LVL 12

Expert Comment

by:udayakumarlm
ID: 24088695
0
 

Author Comment

by:darrenwright
ID: 24088866
I use encrypttostring function
        Public Overloads Function EncrypttoString(ByVal plainText As String) As String
        Return Convert.ToBase64String(Encrypt(plainText))
    End Function
Public Function Encrypt(ByVal plainText As String) As Byte()
 
        Dim tdes As New TripleDESCryptoServiceProvider()
        Dim encryptor As ICryptoTransform = tdes.CreateEncryptor(mvarTripleDesKey, mvarTripleIV)
        Dim data As Byte() = Encoding.Unicode.GetBytes(plainText)
 
        Return encryptor.TransformFinalBlock(data, 0, data.Length)
 
    End Function

Open in new window

0
 
LVL 12

Accepted Solution

by:
udayakumarlm earned 500 total points
ID: 24093483
you are using three conversions (for 30 chars)
1.  unicode ( 30 *2 = 60)
2.encryption ( 60 +8 (60 % 8) = 64 (63.2))
3. Base64 Encoding (88)  calculated as Base64 = ((64 + 3 - (64 MOD 3)) /3) x 4

0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google A…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now