Click here to Skip to main content
Click here to Skip to main content
Go to top

Data encryption with DPAPI

, 21 May 2002
Rate this:
Please Sign up or sign in to vote.
A wrapper class for the Data Protection API

Windows Data Protection

DPAPI - Data Protection Application Programming Interface; most probably the smallest API available under Win32. It contains just two functions.

Beginning with Windows 2000, Microsoft introduced the DPAPI. It wasn't well known or documented until Windows XP came out.

The DPAPI is a pretty well thought-out mechanism to allow any application to do simple and yet powerful encryption for its data. It has good recovery methods - in case the password gets lost, fully supports enterprise or home use and is based on the Cryptographic Services available under Win32.

So, what does it actually do?? Simple - it encrypts or decrypts a block of data.

And it does it without asking much for settings, cryptographic keys, algorithms and other hocus-pocus. Sounds like a ideal function for securing sensitive data? Definitely. There are some options that you can set but it goes even without them.

Here are some highlights:

  • user bound encryption (using users credentials)
  • machine bound encryption (using the machines credentials)
  • application supplied pass phrase
  • optional user supplied password
  • transparent mode (no user-interface at all)
  • optional security auditing
  • operating on standards - PKCS#5v2, RFC-2404, RSA etc.

MSDN contains a very well written article explaining the guts of DPAPI and is for sure worth reading if you are into security.

While DPAPI isn't generally difficult to use it has some pitfalls which you can avoid with the CProtectedData class

The class makes all necessary conversions if needed (DPAPI takes only UNICODE strings) and handles filling the data structures, allocating/freeing memory and so on. But at the end its just a wrapper class.

It provides one function in many flavors to perform the encryption and another one for decryption. Sanity checks on parameters are performed.

User interface

As you can see on the pictures, the CryptoAPI provides some dialog boxes with information and options to the user. It allows the user to modify encryption strength, choose a custom password and view information about the data to be encrypted.

Its important to remember when the user is allowed to choose a password, he most probably will forget it. In this case there is no way to retrieve this lost password and the data is not recoverable.

The main dialog when the UI is enabled.

The "Set security level..." dialog.

Changing to High Security mode enables the password. If you don't supply a description, the user can enter a description on his own.

The "Details..." dialog.

How to use?

Create an instance of CProtectedData, call its SetData() member function, if needed set some options and finally call one of the ProtectData() or UnprotectData() functions. Both return a pointer to a DATA_BLOB structure. The DATA_BLOB structure contains the size of the resulting data and a pointer to the data. If the cbData member is 0 the encryption/decryption failed and you can call ::GetLastError() to retrieve the reason.

Be aware that this functions may fail when you enable the user interface because the user can cancel the operation while normally the functions succeed.

CProtectedData pd;
pd.SetData(pPlainData, dwPlainDataSize);

const DATA_BLOB* pData = pd.ProtectData();
if(pData->cbData)
    // well, use the data in pData->pbData

For convenience there are two derived classes CUserProtectedData and CMachineProtectedData. While the first is equal to the CProtectedData class, the second class just sets the appropriate option to encrypt with machine credentials. They are just provided for code cleanness.

The DPAPI uses optional entropy data which is supplied by the application. If you supply entropy data, it will - simply expressed - be taken as a part of the password and included in key generation. In other words, it increases security. Data encrypted without entropy data can be decrypted by any other application too.

One last thing is up to you in order to avoid memory leaks: when you retrieve the description string from the encrypted data by supplying UnprotectData() with a pointer to a LPTSTR variable it will place the description into this variable and you must call ::LocalFree() when you don't need it anymore.

Sample Application

The sample application shows how to use any and all of the available options and performs multiple full cycles of encryption/decryption with and without user intervention. Anyway, it does not save the encrypted data to disk.

Compatibility

All classes are fully MBCS/Unicode enabled. The sample contains all configurations. Written, compiled and tested under VC7 but should also compile with VC6 and below. The header file automatically add linking with crypt32.lib. Remember that you need Windows 2000 or Windows XP to use DPAPI.

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Share

About the Author

No Biography provided

Comments and Discussions

 
QuestionCompiling in MBCS, not UNICODE, gives error [modified] Pinmemberehaerim11-Jul-11 19:32 
GeneralExtended DPAPI Pinmemberdaves_0513-Mar-11 4:22 
GeneralFailed encryption And Corrupted decryption [modified] Pinmemberehaerim27-Feb-07 9:36 
GeneralVS 2005 (VS8) Decrypted Data always returned broken PinmemberAmit22034-Feb-07 23:39 
GeneralRe: VS 2005 (VS8) Decrypted Data always returned broken Pinmemberehaerim27-Feb-07 9:41 
GeneralRe: VS 2005 (VS8) Decrypted Data always returned broken PinmemberAmit220328-Feb-07 10:01 
QuestionWhat about file size? Pinmemberesquijarosa29-Dec-04 15:44 
QuestionHow to decrypt on a different machine? PinmemberXavier John12-Nov-03 12:50 
AnswerRe: How to decrypt on a different machine? PinmemberSaurweinAndreas12-Nov-03 13:14 
As long as you use user credentials to encrypt, you can decrypt it on any machine on which the user is accredited.
If you use a local user or machine credentials, there is no way to decrypt on another machine.
 

Finally moved to Brazil
GeneralRe: How to decrypt on a different machine? PinmemberXavier John12-Nov-03 15:00 
GeneralRe: How to decrypt on a different machine? PinmemberSaurweinAndreas13-Nov-03 0:09 
GeneralRe: How to decrypt on a different machine? PinmemberXavier John13-Nov-03 5:58 
GeneralRe: How to decrypt on a different machine? PinmemberSaurweinAndreas13-Nov-03 6:08 
GeneralBug with wrong entropy code PinmemberGeorge Montemayor30-Sep-03 8:44 
QuestionHow did you guys run this sample? PinmemberBeer10-Dec-02 13:36 
AnswerRe: How did you guys run this sample? PinmemberAndreas Saurwein11-Dec-02 1:44 
GeneralRe: How did you guys run this sample? PinmemberBeer11-Dec-02 6:28 
GeneralRe: How did you guys run this sample? PinmemberAndreas Saurwein11-Dec-02 10:47 
GeneralRe: How did you guys run this sample? PinmemberBeer11-Dec-02 11:56 
GeneralRe: How did you guys run this sample? PinsussAnonymous8-Jul-03 5:42 
QuestionThanks and ideas on software protection? Pinmemberdswigger28-May-02 8:26 
AnswerRe: Thanks and ideas on software protection? PinmemberAndreas Saurwein28-May-02 8:54 
GeneralRe: Thanks and ideas on software protection? Pinmemberdswigger28-May-02 9:45 
GeneralRe: Thanks and ideas on software protection? PinmemberAndreas Saurwein28-May-02 10:04 
GeneralRe: Thanks and ideas on software protection? Pinmemberdswigger28-May-02 10:20 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.

| Advertise | Privacy | Mobile
Web04 | 2.8.140926.1 | Last Updated 22 May 2002
Article Copyright 2002 by Andreas S. Franci Gonçalves
Everything else Copyright © CodeProject, 1999-2014
Terms of Service
Layout: fixed | fluid