Related resources for Cryptography
  • Cryptography actions with File in Desktop Flow using Microsoft Power Automate6/16/2023 7:19:11 AM. Cryptography actions with File in Desktop Flow using Microsoft Power Automate
  • How To Enable HTTPS On Your Website For Free4/18/2018 5:12:26 AM. How To Enable HTTPS On Your Website For Free
  • Overview Of Cryptography2/14/2017 7:06:06 AM. This article will explain the concept of bad cryptography, which means bad or crackable encryption.
  • AI Caesar Cipher1/8/2017 1:48:09 PM. In this article, you will learn about AI Caesar Cipher.
  • Cryptography - Data Encryption Standard (DES)10/16/2016 12:06:31 PM. In this article, you will learn about cryptography - data encryption standard (DES).
  • Key Based Cryptographic Algorithms9/23/2016 1:30:46 PM. In this article, you will learn about Key based cryptographic algorithms.
  • Simple Columnar Method With Multiple Rounds In Cryptography9/6/2016 6:23:40 PM. In this article, you will learn about Simple Columnar method with Multiple Rounds in Cryptography.
  • Introduction To Cryptography And Caesar Cipher8/25/2016 3:27:49 PM. In this article, you will learn about Cryptography and Caesar Cipher.
  • Encrypt And Decrypt Files In Windows Runtime Apps Using Windows Cryptography Technique4/25/2016 11:24:37 AM. In this article, we will learn how to encrypt and decrypt files in Windows Runtime apps.
  • S-DES or Simplified Data Encryption Standard3/9/2016 10:21:22 AM. In this article you will learn about S-DES or Simplified Data Encryption Standard.
  • PGP (Pretty Good Privacy) Using C#1/25/2016 12:43:31 PM. In this article you will learn about PGP (Pretty Good Privacy) using C#.
  • Efficiently Storing Passwords in .NET Framework7/30/2015 2:46:51 PM. In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
  • Using Cryptography in Portable Xamarin Forms (Windows Phone, Android and IOS)12/23/2014 7:02:32 PM. In this article, I will explain how to use cryptographic algorithms as common code in C# targeting multiple mobile platforms (Windows phone, Android and IOS) using Xamarin forms without depending on native functionality.
  • An Overview of Cryptography5/2/2014 1:37:42 PM. Cryptography is an art and science of secret communications. Cryptography is a technique used to provide security by encoding messages to make them non-readable.
  • Encrypt a File Using Rijndael9/4/2013 5:04:40 PM. In this artical, we will encrypt a file and embed a encrypted key through wich we encrypt that file
  • Cryptography in VB.NET Part 112/1/2012 2:31:01 AM. For any Distributed Framework or Infrastructure to be successful today it has to have an extensive support for developing secured solutions. Microsoft .NET is developed from bottom up with security in mind. It has an eclectic security infrastructure.
  • File Tampering Detection in VB.NET11/8/2012 7:11:59 AM. This article describes an easy approach to determining whether or not two files are exactly the same.
  • SHA-1 Bit Implementation in C#10/20/2012 4:23:19 AM. This is a bit implementation of the SHA-1. It supports messages 2^32 - 65 bits long.
  • Exploring Security in .NET: Part I10/4/2012 9:08:08 AM. This article highlights some of the key concepts of .NET Security like Code Access Security, Evidence based Security and many more.
  • Cryptography in Microsoft.NET Part III: Digital Certificates10/3/2012 10:45:23 AM. Part-I and II of this article discussed the basics of cryptography and its applications in real world enterprise solutions. Part-I discussed the nitty-gritty of encryption and its implementation in Microsoft .NET Framework Class Library (FCL). Part-II discussed the hashing and signature algorithms and their implementation in FCL. It also discussed the two common cryptography applications namely digital envelope & digital signature.
  • Cryptography in Microsoft.NET Part I: Encryption10/3/2012 9:41:46 AM. Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
  • Cryptography in Microsoft.NET Part I: Encryption10/1/2012 9:09:19 AM. In this article, Gowry sheds lights on the basics of cryptography and how it can be implemented in .NET.
  • How Easy Cryptography is in VS.Net10/1/2012 9:02:32 AM. What can be done regarding the security issues? Part of the solution is to secure important data - more specifically, using strong encryption thats what we will see in this article.
  • Cryptography in Microsoft.NET Part II: Digital Envelop and Digital Signatures10/1/2012 8:59:24 AM. Part-I of this article covered cryptography in the context of encryption. This part continues from where part-I left. It assumes that the reader understands the purpose of encryption, knows about the two types of encryption namely asymmetric encryption and symmetric encryption and the fundamental differences between them. It also assumes that the reader understands encryption-decryption classes in System.Security.Cryptography namespace and the stream based encryption model in. NET framework class library (FCL).
  • System.Security.Cryptography.Xml Namespace 9/30/2012 2:47:56 AM. In this article I will explain you about the System.Security.Cryptography.Xml Namespace.
  • Key Issue of sharing 9/29/2012 8:34:26 AM. Describing how can we share a key from one place to another.
  • XML Signatures in Microsoft .NET9/29/2012 7:34:26 AM. In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
  • Cryptography in .NET 9/29/2012 6:01:01 AM. In this article I will explain you about Cryptography in .NET.
  • System.Security.Cryptography Namespace in .NET 9/29/2012 5:55:42 AM. In this article I will explain you about System.Security.Cryptography Namespace in .NET.
  • Case Study: Demo Networking Financial System 9/23/2012 6:13:38 AM. In this tutorial I will discuss some of the design and development issues that one might consider when using .NET framework for developing Network affiliated applications.
  • XML Signatures in Microsoft .NET5/19/2012 7:14:40 AM. In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
  • Developer Roadmap For Building Smart Client Applications5/19/2012 6:11:44 AM. This article is a developer Roadmap For Building Smart Client Applications.
  • Grypto-Grid Solution to Digital Signatures5/15/2012 6:28:33 PM. This article describes as to how a Grid middleware can be easily used for a Cryptography problem.
  • Using the DPAPI through ProtectedData Class in .Net Framework 2.05/13/2012 3:21:02 AM. The objective of this tutorial is to show how the DPAPI can be used to encrypt and decrypt data. Encrypt some data using ProtectedData Class in System.Security.Cryptography namespace and save it to a file. Show that the data can be decrypted using the same class but deferent method. Login as a different user,and show that the data cannot be decrypted.
  • File Encryption5/13/2012 3:14:24 AM. The classes in the .Net Framework cryptography namespace manage many details of cryptography for you.
  • Cryptography in .NET5/13/2012 3:07:25 AM. This article gives a brief overview of Cryptography and the Cryptography support provided by the .NET Framework. I begin by introducing Cryptography and then proceed to examine the various types of it. In particular, I review and analyze the various cryptography algorithms and objects supported by .NET. I conclude after proposing and briefly discussing the algorithmic technique that would work best for you.
  • Symmetric Encryptor Beta15/13/2012 3:05:06 AM. Free to use Encrypt/Decrypt using 2 Symmetric Algorithms 'DES' and 'RC2' coded in C#.
  • Implementing the Chaocipher in C#11/16/2011 8:46:30 AM. Whilst doing some research on cryptography, I came across the Chaocipher.
  • Public Key Encryption (RSA Method) for Encryption and Decryption in ASP.Net8/19/2010 4:32:06 AM. In this article we will learn how use Public Key Encryption for Encryption and Decryption in ASP.Net
  • Cryptography in Asp.net9/7/2007 4:28:07 AM. This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
  • Cryptography in Asp.net9/7/2007 4:28:07 AM. This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
  • Cryptography in Asp.net9/7/2007 4:28:07 AM. This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
  • File Tampering Detection3/6/2007 12:31:43 AM. This article describes an easy approach to determining whether or not two files are exactly the same.
  • File Tampering Detection3/6/2007 12:31:43 AM. This article describes an easy approach to determining whether or not two files are exactly the same.
  • File Tampering Detection3/6/2007 12:31:43 AM. This article describes an easy approach to determining whether or not two files are exactly the same.
  • Enterprise Library 1.02/1/2006 7:15:49 AM. Enterprise Library is a set of tested, reusable application blocks that address common problems developers face when developing enterprise-based applications.
  • Xite Encryption12/29/2005 12:42:25 AM. This class contains methods/functions for easily decrypting and encrypting data.
  • Public Key Token Generation Algorithm12/16/2005 5:32:55 AM. The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.
C# Language Specification 5.0
This book provides a complete description of the C# language 5.0.
Download