O'Reilly logo

APIs at Work, Second Edition by Ron Hawkins, Doug Pence, Bruce Vining

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Encrypting Data

Before we start looking at the encryption and decryption APIs, it is important to point out that you should read all of this chapter before incorporating cryptographic operations into your applications. This section is intended to introduce the APIs that are used for encryption and decryption. In order to not initially overwhelm you with a large number of APIs, these first sample programs make a very simplifying assumption about how a cryptographic key is used—namely, that the key used for encryption and decryption is actually stored, unencrypted, as a variable within the sample program. You will not want to take this approach when actually working with confidential data.

Having the key value as a variable within the program gives ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required