Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

VB Script - VBA - ActiveX - Encryption/Cryptography question

Posted on 2013-11-25
3
Medium Priority
?
1,089 Views
Last Modified: 2016-11-27
Background :      The company is currently using a "discontinued ActiveX control" (CAPICOM)  and considering WIN7 deprecation issues we've been asked to come up with a plan to migrate off of the  "discontinued ActiveX control" cryptographic library.  

Note :  The business unit currently use SHA1 hashing and AES256 encryption.  

The solution we're seeking to migrate to must use a standard library to implement cryptography.


Microsoft discusses Alternatives to Using Capicom here but we do not see anything that applies to VBA:  http://msdn.microsoft.com/en-us/library/cc778518(VS.85).aspx

 
Question  :    Is there a standard way in VBA code in MS Access or Excel to implement hashing and encryption by setting a reference (early or late binding) or a call to Windows API or some other way?

 i.e..

Call a Windows API function by Declaration:  eg: Private Declare Function GetSystemMenu Lib "user32" (ByVal hWnd As Long, ByVal wRevert As Long) As Long

Early-bind a library by setting a References in Tools.References

Late-bind a library:  Set objVar = CreateObject(“ObjectName.Here”)
0
Comment
Question by:lblinc
  • 2
3 Comments
 

Author Comment

by:lblinc
ID: 39676703
All :     There is no wrong answer here...    Looking for any suggestions, or recommendations.  

I've been doing some research on this issue and have found very little, other than some interesting posts re:  others facing close to a similar task(s)  ...      seeking to migrate off the CAPICOM cryptographic library.
0
 
LVL 46

Accepted Solution

by:
aikimark earned 1500 total points
ID: 39680020
There are several options.  In no particular order, you can...
* use Windows Crypto API calls
* use .Net methods, since the encryption namespace has a COM wrapper
* add a module to your project with the code to do the hashing and encryption.
I use Ken Isaacs (kenaso) module in one of my projects.
http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=73500&lngWId=1
0
 
LVL 46

Expert Comment

by:aikimark
ID: 41903356
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month11 days, 13 hours left to enroll

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question