10

Protecting Your Data and Applications

This chapter is about protecting your data from being viewed by malicious users using encryption, and from being manipulated or corrupted using hashing and signing.

In .NET Core 2.1, Microsoft introduced new Span<T>-based cryptography APIs for hashing, random number generation, asymmetric signature generation and processing, and RSA encryption.

Cryptographic operations are performed by operating system implementations so that when an OS has a security vulnerability fixed, then .NET apps benefit immediately. But this means that those .NET apps can only use features that an OS supports.

More Information: You can read about which features are supported by which OS at the following link: https://docs.microsoft.com/en-us/dotnet/standard/security/cross-platform-cryptography ...

Get C# 9 and .NET 5 – Modern Cross-Platform Development - Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.