TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Cryptograph
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Sourav Bhattacharya (5)
Ziggy Rafiq (3)
Vijayaragavan S (3)
Gowri S Paramasivam (3)
C# Curator (3)
Nikunj Satasiya (2)
Lokesh Varman (2)
lsitaraman (2)
Muhammad Shakir (2)
Afzaal Ahmad Zeeshan (2)
Gowry S Paramasivam (2)
Scott Lysle (2)
Vignesh Kumar (1)
Douglas Wagner (1)
Jitendra Mesavaniya (1)
Ashish Tiwari (1)
Shubhankar Banerjee (1)
Mahesh Chand (1)
Henry He (1)
Ajay Kumar (1)
Ajay Yadav (1)
Vikas Gupta (1)
Rohatash Kumar (1)
Lalit Bansal (1)
Vijay Pratap Singh (1)
Mariusz Postol (1)
Kjetil Roe (1)
Kuppu Swami (1)
Mohit Mishra (1)
Keyur (1)
Aymen Amri (1)
Mihai Popescu (1)
Nakul Chaudhari (1)
Vikas Hooda (1)
Guest User (1)
Naimish Makwana (1)
John Iwasz (1)
Maruthi Palllamalli (1)
Vinay Ayinapurapu (1)
Sourabh Somani (1)
Saad Aslam (1)
Madhanmohan Devarajan (1)
Ahmad Mozaffar (1)
Gul Md Ershad (1)
Kishor Bikram Oli (1)
Kolowai Baloch (1)
Raj Bandi (1)
Sanjay Singh (1)
Razi Rais (1)
Sushmita Kumari (1)
Abebe Assefa (1)
Jay Tallamraju (1)
Raghavendra Prabhu (1)
Moses Soliman (1)
Nenad Djodievic (1)
Suprotim Agarwal (1)
Saurabh Nandu (1)
Vulpes (1)
Brijesh Jalan (1)
Rajendra Kumar Yerra (1)
Anand Kumar Rao (1)
Shashi Jeevan M P (1)
Related resources for Cryptograph
No resource found
Encryption and Decryption using RSA (asymmetric) in Angular
8/30/2024 8:35:23 AM.
This guide explores implementing RSA asymmetric encryption and decryption in Angular. It covers how to integrate RSA public and private key pairs for secure data transmission.
What is JWS HMAC?
7/29/2024 2:58:59 PM.
Using JWS HMAC in ASP.NET is an effective way to securely handle tokens for authentication and information exchange. It ensures that the tokens are not tampered with and are from a trusted sender, pro
Encrypting and Decrypting Files using .NET Core
7/28/2024 1:06:15 PM.
Learn how to implement AES encryption and decryption in .NET Core with a detailed guide. Secure your sensitive data using systematic file encryption techniques. This comprehensive tutorial will equip
Impact of Quantum Computing on Data Security
7/17/2024 12:15:07 PM.
Explore the transformative effects of quantum computing on data security in this insightful study. Delve into the potential vulnerabilities posed by quantum algorithms to traditional encryption method
Prefer Static HashData Method over ComputeHash in C# .NET
7/8/2024 12:20:33 PM.
In .NET, the HashData method offers a modern, efficient way to perform hashing operations, eliminating the need for instantiating hashing algorithm classes like SHA256. It simplifies code, enhances pe
Everything About NFTs: Creation to Investment Guide
7/1/2024 6:36:48 AM.
Explore NFTs (Non-Fungible Tokens), unique digital assets authenticated by blockchain, enabling ownership of art, music, and more. Discover their role in digital markets, from creation to trading, and
The Role of Nonces in Ethereum and EVM Transactions
6/19/2024 9:33:55 AM.
Explore the role of nonces in EVM-based blockchains like Ethereum. Learn how nonces ensure transaction security, prevent double-spending, and maintain blockchain integrity.
Generating Public/Private Keys In C# And .NET
6/14/2024 10:40:14 AM.
How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvider
Building A Blockchain In .NET Core - Basic Blockchain
6/6/2024 11:46:24 AM.
Blockchain technology is the foundation of the Bitcoin. With the popular of Bitcoin, Blockchain gets popular too. People start to use Blockchain other than cryptocurrency in all kinds of applications.
The Difference Between SSL and TLS
6/5/2024 5:39:35 AM.
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are encryption protocols securing data transmission over networks. TLS succeeded SSL, offering improved security and compatibility. Both f
Bypassing Obfuscation: Ciphered Code Reverse Engineering
5/8/2024 10:13:08 AM.
In this article, we have performed reverse engineering over a protected binary by deep analysis of both obfuscated source code and MSIL assembly code.
Encryption for Data Security: Creating Digital Certificates
5/6/2024 6:15:44 AM.
Encryption secures data by converting it into unreadable ciphertext using algorithms and keys, preventing unauthorized access. SSL/TLS certificates enable secure communication between websites and use
Security ASP.net Core MVC (C#) Encryption and Decryption
4/9/2024 6:14:18 PM.
On the topic of "Security in ASP.NET Core MVC (C#): Encryption and Decryption," Ziggy Rafiq has written an insightful article. As Ziggy explores encryption and decryption techniques, he offe
Best Practices for Maintaining Security and Preventing Vulnerabilities in C#
4/9/2024 5:54:03 PM.
Explore essential security practices in C# programming with Ziggy Rafiq, covering password hashing, input validation, SQL injection prevention, cryptography, HTTPS, secret management, and staying upda
Generate Random Password in ASP.NET
4/3/2024 10:46:55 AM.
Generate Random Password in ASP.NET: Enhance security with ASP.NET by creating a randomized password generator. Utilize built-in features or custom code to generate strong, unpredictable passwords, bo
The Best Decentralized Apps of 2024
4/3/2024 8:30:18 AM.
Explore the world of decentralized applications (DApps) and their impact on various industries. Learn about the benefits of DApps, including privacy, security, and cost-effective transactions. Discove
What is New in .NET 9
3/4/2024 8:06:59 AM.
.NET 9, succeeding .NET 8, places particular emphasis on cloud-native applications and enhancing performance. It will receive standard-term support (STS) for 18 months.
Cybersecurity of External Streaming Data - Confidentiality
2/14/2024 4:02:06 AM.
This comprehensive article delves into cybersecurity considerations for external data, focusing on streaming bitstreams. It covers encryption fundamentals, emphasizing symmetric cryptography and pract
Xite Encryption
1/31/2024 10:06:02 AM.
This code provides an easy-to-use encryption and decryption solution in C#. It utilizes RSA cryptography, allowing seamless integration into Visual Studio projects. This class contains methods/functio
Understanding the One-Way Nature of HASHBYTES in SQL
1/5/2024 10:48:17 AM.
This article delves into the cryptographic world of hashing algorithms, emphasizing the irreversible nature of these functions. Learn why HASHBYTES, a widely-used function for creating hash values in
Secure Password Hashing with SHA-256 and Salt in Python
12/7/2023 5:46:50 AM.
In this article, we have discussed SHA-256 and salt. In this article, we unravel the intricacies of a clever strategy to fortify passwords—SHA-256 with salt. SHA-256, part of the SHA-2 family, transfo
TripleDES Encryption and Decryption in C#
10/16/2023 5:35:37 AM.
Encryption is the process of rendering data unreadable to safeguard it from unauthorized access. It's widely applied in banking, e-commerce, communication, and security. TripleDES (Triple Data Enc
Introduction To Symmetric Encryption
10/11/2023 5:01:07 AM.
In this article, you will learn about Symetric Engryption.
SHA-1 Bit Implementation In C#
9/25/2023 6:30:24 AM.
This is a bit implementation of the SHA-1. It supports messages 2^32 - 65 bits long.
C# Security: Best Practices for Secure Coding
8/31/2023 5:05:34 PM.
In this article, we will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to
Activation Link Vulnerability
8/24/2023 9:15:31 AM.
Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
Understanding SSH Authentication
8/10/2023 4:57:38 AM.
Unveil the significance of SSH (Secure Shell) in securing network communication. Explore SSH authentication's core concepts, methods, and integration into .NET Core applications for fortified remo
XML Signatures in Microsoft .NET
7/18/2023 5:26:02 AM.
In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
How To Configure SMTP O365 Migration Using TLS 1.2 For SQL Database Mail
7/6/2023 4:49:23 AM.
This article will explain to you how exactly you need to configure TLS 1.2 as a default protocol and setup SMTP O365 migration using SQL 2012 Database mail and above versions for Windows Server 2012 a
Rivest Shamir Adleman(RSA) Algorithm and Functions
6/19/2023 7:13:37 AM.
In Java, you can leverage the built-in cryptographic libraries to generate RSA key pairs, encrypt and decrypt messages, and perform digital signatures. This article explores the RSA application and it
Cryptography actions with Hashing in Desktop flow using Microsoft Power Automate
6/19/2023 7:06:18 AM.
Reading this article, you can learn how to apply hashing using Hash text action, Hash from file action, Hash text with key action and Hash from file with key action with Desktop flow in Microsoft Powe
Cryptography actions with File in Desktop flow using Microsoft Power Automate
6/16/2023 7:31:15 AM.
Reading this article, you can learn how to encrypt or decrypt a file using Encrypt from file with AES action and Decrypt to file with AES action with the Desktop flow in Microsoft Power Automate
Cryptography Actions with Plain Text in Desktop Flow using Microsoft Power Automate
6/15/2023 4:42:49 AM.
Reading this article, you can learn how to encrypt or decrypt plain text using Encrypt text with AES action and Decrypt text with AES action with Desktop flow in Microsoft Power Automate.
Generating Cryptographic Hashes with SHA-256 in JavaScript
6/12/2023 6:53:43 AM.
Various Ways To Secure Sensitive Data In C#
2/13/2023 5:43:29 AM.
In this article we will see Various ways to secure sensitive data in C# with example.
Introduction To Homomorphic Encryption With Microsoft SEAL
12/20/2022 5:05:57 AM.
Homomorphic encryption allows third-party providers to perform computations on encrypted data without decrypting the data. This capability is opening new opportunities to provide services while preser
PGP (Pretty Good Privacy) Using C#
11/18/2022 6:31:02 AM.
In this article you will learn about PGP (Pretty Good Privacy) using C#.
Encrypt a File Using Rijndael
8/22/2022 8:52:57 AM.
In this article, we will encrypt a file and embed an encrypted key through which we encrypt that file.
Setting Up OpenSSL On Windows 10 Machine
7/17/2022 1:37:05 PM.
This article explains what openssl is and steps to install properly in windows 10 machines.
How To Enable HTTPS On Your Website For Free
1/10/2021 5:08:30 PM.
Today, a website security is one of the top priorities for developers and HTTPS is the firs step. This step by step walk-through tutorial teaches how to implement the SSL on a Website for free in 10 m
Simple Columnar Method With Multiple Rounds In Cryptography
11/11/2020 10:41:47 AM.
In this article, you will learn about Simple Columnar method with Multiple Rounds in Cryptography.
Cryptography In The Digital Era
9/9/2020 1:41:06 PM.
This article covers different cryptographic techniques that ensure data Confidentiality, Integrity and Availability.Information Security involves preventing or at least reducing the probability of una
The technology Behind Bitcoin [Cryptography and Blockchain]
3/19/2018 3:42:10 AM.
Have tried to provide the overview of the technology behind the Bitcoin.
Implement Symmetric And Asymmetric Cryptography Algorithms With C#
12/9/2017 1:33:12 PM.
How to encrypt and decrypt data using Symmetric and Asymmetric algorithms using C# Programming language
Overview Of Cryptography
2/14/2017 7:06:06 AM.
This article will explain the concept of bad cryptography, which means bad or crackable encryption.
AI Caesar Cipher
1/8/2017 1:48:09 PM.
In this article, you will learn about AI Caesar Cipher.
Cryptography - Data Encryption Standard (DES)
10/16/2016 12:06:31 PM.
In this article, you will learn about cryptography - data encryption standard (DES).
Key Based Cryptographic Algorithms
9/23/2016 1:30:46 PM.
In this article, you will learn about Key based cryptographic algorithms.
Introduction To Cryptography And Caesar Cipher
8/25/2016 3:27:49 PM.
In this article, you will learn about Cryptography and Caesar Cipher.
Encrypt And Decrypt Files In Windows Runtime Apps Using Windows Cryptography Technique
4/25/2016 11:24:37 AM.
In this article, we will learn how to encrypt and decrypt files in Windows Runtime apps.
S-DES or Simplified Data Encryption Standard
3/9/2016 10:21:22 AM.
In this article you will learn about S-DES or Simplified Data Encryption Standard.
Guide For Building C# Apps On Ubuntu: Cryptographic Helpers
1/21/2016 11:40:56 PM.
In this article you will learn to build C# apps on Ubuntu.
Efficiently Storing Passwords in .NET Framework
7/30/2015 2:46:51 PM.
In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
Using Cryptography in Portable Xamarin Forms (Windows Phone, Android and IOS)
12/23/2014 7:02:32 PM.
In this article, I will explain how to use cryptographic algorithms as common code in C# targeting multiple mobile platforms (Windows phone, Android and IOS) using Xamarin forms without depending on native functionality.
An Overview of Cryptography
5/2/2014 1:37:42 PM.
Cryptography is an art and science of secret communications. Cryptography is a technique used to provide security by encoding messages to make them non-readable.
Cryptography in VB.NET Part 1
12/1/2012 2:31:01 AM.
For any Distributed Framework or Infrastructure to be successful today it has to have an extensive support for developing secured solutions. Microsoft .NET is developed from bottom up with security in mind. It has an eclectic security infrastructure.
File Tampering Detection in VB.NET
11/8/2012 7:11:59 AM.
This article describes an easy approach to determining whether or not two files are exactly the same.
Exploring Security in .NET: Part I
10/4/2012 9:08:08 AM.
This article highlights some of the key concepts of .NET Security like Code Access Security, Evidence based Security and many more.
Cryptography in Microsoft.NET Part III: Digital Certificates
10/3/2012 10:45:23 AM.
Part-I and II of this article discussed the basics of cryptography and its applications in real world enterprise solutions. Part-I discussed the nitty-gritty of encryption and its implementation in Microsoft .NET Framework Class Library (FCL). Part-II discussed the hashing and signature algorithms and their implementation in FCL. It also discussed the two common cryptography applications namely digital envelope & digital signature.
Cryptography in Microsoft.NET Part I: Encryption
10/3/2012 9:41:46 AM.
Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
Cryptography in Microsoft.NET Part I: Encryption
10/1/2012 9:09:19 AM.
In this article, Gowry sheds lights on the basics of cryptography and how it can be implemented in .NET.
How Easy Cryptography is in VS.Net
10/1/2012 9:02:32 AM.
What can be done regarding the security issues? Part of the solution is to secure important data - more specifically, using strong encryption thats what we will see in this article.
Cryptography in Microsoft.NET Part II: Digital Envelop and Digital Signatures
10/1/2012 8:59:24 AM.
Part-I of this article covered cryptography in the context of encryption. This part continues from where part-I left. It assumes that the reader understands the purpose of encryption, knows about the two types of encryption namely asymmetric encryption and symmetric encryption and the fundamental differences between them. It also assumes that the reader understands encryption-decryption classes in System.Security.Cryptography namespace and the stream based encryption model in. NET framework class library (FCL).
System.Security.Cryptography.Xml Namespace
9/30/2012 2:47:56 AM.
In this article I will explain you about the System.Security.Cryptography.Xml Namespace.
Key Issue of sharing
9/29/2012 8:34:26 AM.
Describing how can we share a key from one place to another.
Cryptography in .NET
9/29/2012 6:01:01 AM.
In this article I will explain you about Cryptography in .NET.
System.Security.Cryptography Namespace in .NET
9/29/2012 5:55:42 AM.
In this article I will explain you about System.Security.Cryptography Namespace in .NET.
Case Study: Demo Networking Financial System
9/23/2012 6:13:38 AM.
In this tutorial I will discuss some of the design and development issues that one might consider when using .NET framework for developing Network affiliated applications.
XML Signatures in Microsoft .NET
5/19/2012 7:14:40 AM.
In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
Developer Roadmap For Building Smart Client Applications
5/19/2012 6:11:44 AM.
This article is a developer Roadmap For Building Smart Client Applications.
Grypto-Grid Solution to Digital Signatures
5/15/2012 6:28:33 PM.
This article describes as to how a Grid middleware can be easily used for a Cryptography problem.
Using the DPAPI through ProtectedData Class in .Net Framework 2.0
5/13/2012 3:21:02 AM.
The objective of this tutorial is to show how the DPAPI can be used to encrypt and decrypt data. Encrypt some data using ProtectedData Class in System.Security.Cryptography namespace and save it to a file. Show that the data can be decrypted using the same class but deferent method. Login as a different user,and show that the data cannot be decrypted.
File Encryption
5/13/2012 3:14:24 AM.
The classes in the .Net Framework cryptography namespace manage many details of cryptography for you.
Cryptography in .NET
5/13/2012 3:07:25 AM.
This article gives a brief overview of Cryptography and the Cryptography support provided by the .NET Framework. I begin by introducing Cryptography and then proceed to examine the various types of it. In particular, I review and analyze the various cryptography algorithms and objects supported by .NET. I conclude after proposing and briefly discussing the algorithmic technique that would work best for you.
Symmetric Encryptor Beta1
5/13/2012 3:05:06 AM.
Free to use Encrypt/Decrypt using 2 Symmetric Algorithms 'DES' and 'RC2' coded in C#.
Implementing the Chaocipher in C#
11/16/2011 8:46:30 AM.
Whilst doing some research on cryptography, I came across the Chaocipher.
Public Key Encryption (RSA Method) for Encryption and Decryption in ASP.Net
8/19/2010 4:32:06 AM.
In this article we will learn how use Public Key Encryption for Encryption and Decryption in ASP.Net
Cryptography in Asp.net
9/7/2007 4:28:07 AM.
This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
File Tampering Detection
3/6/2007 12:31:43 AM.
This article describes an easy approach to determining whether or not two files are exactly the same.
Enterprise Library 1.0
2/1/2006 7:15:49 AM.
Enterprise Library is a set of tested, reusable application blocks that address common problems developers face when developing enterprise-based applications.
Public Key Token Generation Algorithm
12/16/2005 5:32:55 AM.
The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.