TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Cryptography
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Sourav Bhattacharya (5)
Scott Lysle (4)
Gowri S Paramasivam (3)
Puran Mehra (3)
Rajendra Kumar Yerra (3)
Muhammad Shakir (2)
Gowry S Paramasivam (2)
lsitaraman (2)
Kittu Bharti (1)
Aman Singh (1)
Gul Md Ershad (1)
Kishor Bikram Oli (1)
Kolowai Baloch (1)
Maruthi Palllamalli (1)
Afzaal Ahmad Zeeshan (1)
Raj Bandi (1)
Sanjay Singh (1)
Mihai Popescu (1)
Razi Rais (1)
Sushmita Kumari (1)
Abebe Assefa (1)
Jay Tallamraju (1)
Raghavendra Prabhu (1)
Moses Soliman (1)
Nenad Djodievic (1)
Suprotim Agarwal (1)
Saurabh Nandu (1)
Vulpes (1)
Brijesh Jalan (1)
Anand Kumar Rao (1)
kjetilroe (1)
Shashi Jeevan M P (1)
Related resources for Cryptography
No resource found
Cryptography actions with File in Desktop Flow using Microsoft Power Automate
6/16/2023 7:19:11 AM.
Cryptography actions with File in Desktop Flow using Microsoft Power Automate
How To Enable HTTPS On Your Website For Free
4/18/2018 5:12:26 AM.
How To Enable HTTPS On Your Website For Free
Overview Of Cryptography
2/14/2017 7:06:06 AM.
This article will explain the concept of bad cryptography, which means bad or crackable encryption.
AI Caesar Cipher
1/8/2017 1:48:09 PM.
In this article, you will learn about AI Caesar Cipher.
Cryptography - Data Encryption Standard (DES)
10/16/2016 12:06:31 PM.
In this article, you will learn about cryptography - data encryption standard (DES).
Key Based Cryptographic Algorithms
9/23/2016 1:30:46 PM.
In this article, you will learn about Key based cryptographic algorithms.
Simple Columnar Method With Multiple Rounds In Cryptography
9/6/2016 6:23:40 PM.
In this article, you will learn about Simple Columnar method with Multiple Rounds in Cryptography.
Introduction To Cryptography And Caesar Cipher
8/25/2016 3:27:49 PM.
In this article, you will learn about Cryptography and Caesar Cipher.
Encrypt And Decrypt Files In Windows Runtime Apps Using Windows Cryptography Technique
4/25/2016 11:24:37 AM.
In this article, we will learn how to encrypt and decrypt files in Windows Runtime apps.
S-DES or Simplified Data Encryption Standard
3/9/2016 10:21:22 AM.
In this article you will learn about S-DES or Simplified Data Encryption Standard.
PGP (Pretty Good Privacy) Using C#
1/25/2016 12:43:31 PM.
In this article you will learn about PGP (Pretty Good Privacy) using C#.
Efficiently Storing Passwords in .NET Framework
7/30/2015 2:46:51 PM.
In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
Using Cryptography in Portable Xamarin Forms (Windows Phone, Android and IOS)
12/23/2014 7:02:32 PM.
In this article, I will explain how to use cryptographic algorithms as common code in C# targeting multiple mobile platforms (Windows phone, Android and IOS) using Xamarin forms without depending on native functionality.
An Overview of Cryptography
5/2/2014 1:37:42 PM.
Cryptography is an art and science of secret communications. Cryptography is a technique used to provide security by encoding messages to make them non-readable.
Encrypt a File Using Rijndael
9/4/2013 5:04:40 PM.
In this artical, we will encrypt a file and embed a encrypted key through wich we encrypt that file
Cryptography in VB.NET Part 1
12/1/2012 2:31:01 AM.
For any Distributed Framework or Infrastructure to be successful today it has to have an extensive support for developing secured solutions. Microsoft .NET is developed from bottom up with security in mind. It has an eclectic security infrastructure.
File Tampering Detection in VB.NET
11/8/2012 7:11:59 AM.
This article describes an easy approach to determining whether or not two files are exactly the same.
SHA-1 Bit Implementation in C#
10/20/2012 4:23:19 AM.
This is a bit implementation of the SHA-1. It supports messages 2^32 - 65 bits long.
Exploring Security in .NET: Part I
10/4/2012 9:08:08 AM.
This article highlights some of the key concepts of .NET Security like Code Access Security, Evidence based Security and many more.
Cryptography in Microsoft.NET Part III: Digital Certificates
10/3/2012 10:45:23 AM.
Part-I and II of this article discussed the basics of cryptography and its applications in real world enterprise solutions. Part-I discussed the nitty-gritty of encryption and its implementation in Microsoft .NET Framework Class Library (FCL). Part-II discussed the hashing and signature algorithms and their implementation in FCL. It also discussed the two common cryptography applications namely digital envelope & digital signature.
Cryptography in Microsoft.NET Part I: Encryption
10/3/2012 9:41:46 AM.
Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
Cryptography in Microsoft.NET Part I: Encryption
10/1/2012 9:09:19 AM.
In this article, Gowry sheds lights on the basics of cryptography and how it can be implemented in .NET.
How Easy Cryptography is in VS.Net
10/1/2012 9:02:32 AM.
What can be done regarding the security issues? Part of the solution is to secure important data - more specifically, using strong encryption thats what we will see in this article.
Cryptography in Microsoft.NET Part II: Digital Envelop and Digital Signatures
10/1/2012 8:59:24 AM.
Part-I of this article covered cryptography in the context of encryption. This part continues from where part-I left. It assumes that the reader understands the purpose of encryption, knows about the two types of encryption namely asymmetric encryption and symmetric encryption and the fundamental differences between them. It also assumes that the reader understands encryption-decryption classes in System.Security.Cryptography namespace and the stream based encryption model in. NET framework class library (FCL).
System.Security.Cryptography.Xml Namespace
9/30/2012 2:47:56 AM.
In this article I will explain you about the System.Security.Cryptography.Xml Namespace.
Key Issue of sharing
9/29/2012 8:34:26 AM.
Describing how can we share a key from one place to another.
XML Signatures in Microsoft .NET
9/29/2012 7:34:26 AM.
In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
Cryptography in .NET
9/29/2012 6:01:01 AM.
In this article I will explain you about Cryptography in .NET.
System.Security.Cryptography Namespace in .NET
9/29/2012 5:55:42 AM.
In this article I will explain you about System.Security.Cryptography Namespace in .NET.
Case Study: Demo Networking Financial System
9/23/2012 6:13:38 AM.
In this tutorial I will discuss some of the design and development issues that one might consider when using .NET framework for developing Network affiliated applications.
XML Signatures in Microsoft .NET
5/19/2012 7:14:40 AM.
In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
Developer Roadmap For Building Smart Client Applications
5/19/2012 6:11:44 AM.
This article is a developer Roadmap For Building Smart Client Applications.
Grypto-Grid Solution to Digital Signatures
5/15/2012 6:28:33 PM.
This article describes as to how a Grid middleware can be easily used for a Cryptography problem.
Using the DPAPI through ProtectedData Class in .Net Framework 2.0
5/13/2012 3:21:02 AM.
The objective of this tutorial is to show how the DPAPI can be used to encrypt and decrypt data. Encrypt some data using ProtectedData Class in System.Security.Cryptography namespace and save it to a file. Show that the data can be decrypted using the same class but deferent method. Login as a different user,and show that the data cannot be decrypted.
File Encryption
5/13/2012 3:14:24 AM.
The classes in the .Net Framework cryptography namespace manage many details of cryptography for you.
Cryptography in .NET
5/13/2012 3:07:25 AM.
This article gives a brief overview of Cryptography and the Cryptography support provided by the .NET Framework. I begin by introducing Cryptography and then proceed to examine the various types of it. In particular, I review and analyze the various cryptography algorithms and objects supported by .NET. I conclude after proposing and briefly discussing the algorithmic technique that would work best for you.
Symmetric Encryptor Beta1
5/13/2012 3:05:06 AM.
Free to use Encrypt/Decrypt using 2 Symmetric Algorithms 'DES' and 'RC2' coded in C#.
Implementing the Chaocipher in C#
11/16/2011 8:46:30 AM.
Whilst doing some research on cryptography, I came across the Chaocipher.
Public Key Encryption (RSA Method) for Encryption and Decryption in ASP.Net
8/19/2010 4:32:06 AM.
In this article we will learn how use Public Key Encryption for Encryption and Decryption in ASP.Net
Cryptography in Asp.net
9/7/2007 4:28:07 AM.
This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
Cryptography in Asp.net
9/7/2007 4:28:07 AM.
This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
Cryptography in Asp.net
9/7/2007 4:28:07 AM.
This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
File Tampering Detection
3/6/2007 12:31:43 AM.
This article describes an easy approach to determining whether or not two files are exactly the same.
File Tampering Detection
3/6/2007 12:31:43 AM.
This article describes an easy approach to determining whether or not two files are exactly the same.
File Tampering Detection
3/6/2007 12:31:43 AM.
This article describes an easy approach to determining whether or not two files are exactly the same.
Enterprise Library 1.0
2/1/2006 7:15:49 AM.
Enterprise Library is a set of tested, reusable application blocks that address common problems developers face when developing enterprise-based applications.
Xite Encryption
12/29/2005 12:42:25 AM.
This class contains methods/functions for easily decrypting and encrypting data.
Public Key Token Generation Algorithm
12/16/2005 5:32:55 AM.
The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.
- Ebook
C# Language Specification 5.0
This book provides a complete description of the C# language 5.0.
Download