Chapter 15. Cryptography and Data Protection


In This Chapter

  • Introduction to Cryptography

  • Using Secret-Key Encryption

  • Using Public-Key Encryption

  • Working with Hashes and Digital Signatures

  • Using the Data Protection API (DPAPI)

Protecting the data used and generated by your application has become exceedingly important in this day and age. The spread of viruses throughout the Internet is so commonplace that most consumers with PCs own some form of virus protection. When designing and building applications that will be exposed to the Internet, one of the primary concerns is security: preventing theft of valuable data as well as controlling damage from malicious attackers.

If you send data over a clear channel that anyone else can read, you can bet that someone is trying to glean some useful information out of the data you're sending. This chapter introduces you to the concepts and programming techniques that you will need to prevent people from reading your private data, as well as techniques that you can use to validate whether data has changed and whether data was sent from a legitimate source. All of this is possible with cryptography and data protection.



Microsoft Visual C# 2005 Unleashed
Microsoft Visual C# 2005 Unleashed
ISBN: 0672327767
EAN: 2147483647
Year: 2004
Pages: 298

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net