Chapter 12

Using Encryption and Managing Assemblies

What You Will Learn in This Chapter

  • Understanding encryption
  • Using symmetric encryption
  • Using asymmetric encryption
  • Signing and hashing data
  • Creating strong name assemblies
  • Deploying assemblies in the GAC


You can find the code downloads for this chapter at on the Download Code tab. The code is in the chapter12 download and individually named according to the names throughout the chapter.

When you deal with sensitive data, you must protect it from unauthorized access or modification, and for that you need to use techniques such as encryption, digital signatures, and hashing of data. One application of digital signatures and hashing of data used often by .NET is with strong name assemblies.

This chapter begins by going through different technologies that you can use to ensure privacy, integrity, and authenticity of your data. You will look at both symmetric and asymmetric algorithms. In the second part of this chapter you will look in details at how you can ensure the integrity of you assemblies by using digital signatures.

Table 12-1 introduces you to the exam objectives covered in this chapter.

Table 12-1: 70-483 Exam Objectives Covered in This Chapter

ObjectiveContent Covered
Perform symmetric and asymmetric encryptionChoose an appropriate encryption algorithm. This includes discussing the symmetric and asymmetric algorithms. Manage and create ...

Get MCSD Certification Toolkit (Exam 70-483): Programming in C# now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.