Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

calculating legth of triple DES  encrypted string

Posted on 2009-04-07
5
Medium Priority
?
502 Views
Last Modified: 2012-05-06
I am encrypting a varchar(30) column and storing in a different column in the database.

I need to calculate what the maximum length of the encrypted text could be so that I can make sure the new column is the right size. How do I calculate the size?

I am using vb.net to do the encryption and SQL server 2005 to store the data.
0
Comment
Question by:darrenwright
  • 3
  • 2
5 Comments
 
LVL 12

Expert Comment

by:udaya kumar laligondla
ID: 24087691
for a 30 character string it will be approximately 36 chars. you can use the following caluculation to calculate the length n + 8 - (n % 8)
where n is the length of the source string
0
 

Author Comment

by:darrenwright
ID: 24088329
I'm get back encryption strings of 88 chars so something not right
0
 
LVL 12

Expert Comment

by:udaya kumar laligondla
ID: 24088695
0
 

Author Comment

by:darrenwright
ID: 24088866
I use encrypttostring function
        Public Overloads Function EncrypttoString(ByVal plainText As String) As String
        Return Convert.ToBase64String(Encrypt(plainText))
    End Function
Public Function Encrypt(ByVal plainText As String) As Byte()
 
        Dim tdes As New TripleDESCryptoServiceProvider()
        Dim encryptor As ICryptoTransform = tdes.CreateEncryptor(mvarTripleDesKey, mvarTripleIV)
        Dim data As Byte() = Encoding.Unicode.GetBytes(plainText)
 
        Return encryptor.TransformFinalBlock(data, 0, data.Length)
 
    End Function

Open in new window

0
 
LVL 12

Accepted Solution

by:
udaya kumar laligondla earned 2000 total points
ID: 24093483
you are using three conversions (for 30 chars)
1.  unicode ( 30 *2 = 60)
2.encryption ( 60 +8 (60 % 8) = 64 (63.2))
3. Base64 Encoding (88)  calculated as Base64 = ((64 + 3 - (64 MOD 3)) /3) x 4

0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question