© Stephen Haunts 2019
Stephen HauntsApplied Cryptography in .NET and Azure Key Vaulthttps://doi.org/10.1007/978-1-4842-4375-6_4

4. Hashing and Hashed Message Authentication Codes

Stephen Haunts1 
(1)
Belper, Derbyshire, UK
 

Now that you know the importance of random numbers in cryptography and how to generate them, let’s look at one of the pillars of cryptography. In Chapter 2, I mentioned the four pillars of modern cryptography: cryptography, integrity, authentication, and non-repudiation. In this chapter, we explore integrity and authentication by looking at the various hashing and authenticated hashing operations available in .NET. Let’s start with integrity and hashing.

Hashing and Integrity

A hash function in cryptography is an algorithm that takes ...

Get Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.