O'Reilly logo

.NET Framework Security by Kevin T. Price, Rudi Martin, Matthew Lyons, Sebastian Lange, Brian A. LaMacchia

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using Symmetric Algorithms

Having introduced the cryptographic object model and the operation of CryptoStreams and ICryptoTransforms, we now move on to detailed discussions and examples of using each of the base types defined within the model: symmetric algorithm, cryptographic hash functions, keyed hash functions, random number generators, and asymmetric algorithms. We begin with the secret key ciphers, represented by the SymmetricAlgorithm class and its descendants. Secret key ciphers are most commonly used for bulk encryption—scenarios that require encrypting or decrypting large amounts of data. We start with a discussion of the structure of an object that derives from SymmetricAlgorithm, describe how to create individual instances of SymmetricAlgorithm ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required