Summary
This chapter introduced basic cryptographic terminology, concepts, and mathematical foundations that are required for understanding several upcoming chapters. To accomplish this, several simple classical cryptographic algorithms were reviewed as examples. In the next two chapters, we look more closely at modern symmetric and asymmetric ciphers, which form the basis of secure storage and communications, supporting privacy, confidentiality, authenticity, integrity, and nonrepudiation.
Beyond this chapter, the book takes an applied approach, focusing on specific Windows and .NET platform functionality. Therefore, we will not cover a great deal more on fundamental concepts. For further reading on fundamental concepts, please see the excellent ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access