Combining Symmetric Encryption, Asymmetric Encryption, and Hash Codes
At this point, I've spoken generically about how symmetric and asymmetric encryption can be combined to present an efficient yet secure means of encrypting data. However, because the demos are written for a single user, it might not be obvious exactly how this all ties together. Therefore, let's review some of the things you've read in this chapter:
With symmetric encryption two parties each share a private key that is used both to encrypt and decrypt data. Algorithms using this technique are very fast, but not as secure as with asymmetric encryption. In addition, with symmetric encryption alone, there is no secure means by which the person generating the key can get it to ...
Get Extending MFC Applications with the .NET Framework now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.