It is currently considered a mistake to simply encrypt passwords yourself. Often an arbitrary line (called a salt) is added to each password, and then encryption is applied. Basically, it doesn't matter in what order you add the salt and encrypt it. All these combinations are equal in coding strength:
HASH (Pass & Salt) OR HASH (HASH (Pass)+Salt)) OR HASH (HASH (Pass) + HASH (Salt))
Salt is stored in a separate table as plain text. Another thing you can do is to encrypt the same value several times in a row. A small delay for one user will not be noticeable, but it will increase the effort required to brute force the password.
It is also recommended that tables be named so that table names cannot be guessed. This makes blind attacks more difficult when they cannot immediately get the password table.
Regarding the method of encrypting the string.
SQL Server 2000 There are no built-in symmetric functions. There are 2 asymmetric built-in functions: BINARY_CHECKSUM and CHECKSUM .
VB VB provides you with already implemented algorithms as well as tools to carry out your own implementation. The article mentioned by @SuperFunkyMonkey contains links to Secure Space for encryption . Another symmetric algorithm (which you can decode) is Rijndael.
Stoleg
source share