17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Summary ........................................................................................ 146Chapter 7: One-Way Encryption ............................................. 147How One-Way Encryption Works ............................................... 148Benefits and Disadvantages of One-Way Encryption ................ 149Known Vulnerabilities ................................................................... 150Dictionary Attack Vulnerability ................................................. 150Rainbow Table Attack Vulnerability .......................................... 151Hash Collision Vulnerability ...................................................... 153<strong>Red</strong>ucing Vulnerability: Salting a Hash ...................................... 155Implementing One-Way Encryption ............................................ 157Create the Primary Hash Column............................................... 158Create a Secondary Hash Column for Searching ....................... 159Populate the Hash Columns ....................................................... 160Verify the Implementation .......................................................... 161Drop the Unencrypted Column .................................................. 162Creating the Interface ................................................................... 162Creating the View ....................................................................... 163Creating the Stored Procedures .................................................. 164Setting and Verifying Permissions to the Stored Procedures ..... 167Summary ........................................................................................ 169Chapter 8: Obfuscation ............................................................. 171Development Environment Considerations ................................ 171Obfuscation Methods .................................................................... 172Character Scrambling ................................................................. 174Repeating Character Masking .................................................... 177

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!