Related resources for Cryptography
  • Encryption and Decryption using RSA (asymmetric) in Angular8/30/2024 8:35:23 AM. This guide explores implementing RSA asymmetric encryption and decryption in Angular. It covers how to integrate RSA public and private key pairs for secure data transmission.
  • What is JWS HMAC?7/29/2024 2:58:59 PM. Using JWS HMAC in ASP.NET is an effective way to securely handle tokens for authentication and information exchange. It ensures that the tokens are not tampered with and are from a trusted sender, pro
  • Encrypting and Decrypting Files using .NET Core7/28/2024 1:06:15 PM. Learn how to implement AES encryption and decryption in .NET Core with a detailed guide. Secure your sensitive data using systematic file encryption techniques. This comprehensive tutorial will equip
  • Impact of Quantum Computing on Data Security7/17/2024 12:15:07 PM. Explore the transformative effects of quantum computing on data security in this insightful study. Delve into the potential vulnerabilities posed by quantum algorithms to traditional encryption method
  • Prefer Static HashData Method over ComputeHash in C# .NET7/8/2024 12:20:33 PM. In .NET, the HashData method offers a modern, efficient way to perform hashing operations, eliminating the need for instantiating hashing algorithm classes like SHA256. It simplifies code, enhances pe
  • Everything About NFTs: Creation to Investment Guide7/1/2024 6:36:48 AM. Explore NFTs (Non-Fungible Tokens), unique digital assets authenticated by blockchain, enabling ownership of art, music, and more. Discover their role in digital markets, from creation to trading, and
  • The Role of Nonces in Ethereum and EVM Transactions6/19/2024 9:33:55 AM. Explore the role of nonces in EVM-based blockchains like Ethereum. Learn how nonces ensure transaction security, prevent double-spending, and maintain blockchain integrity.
  • Generating Public/Private Keys In C# And .NET 6/14/2024 10:40:14 AM. How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvider
  • Building A Blockchain In .NET Core - Basic Blockchain6/6/2024 11:46:24 AM. Blockchain technology is the foundation of the Bitcoin. With the popular of Bitcoin, Blockchain gets popular too. People start to use Blockchain other than cryptocurrency in all kinds of applications.
  • The Difference Between SSL and TLS6/5/2024 5:39:35 AM. SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are encryption protocols securing data transmission over networks. TLS succeeded SSL, offering improved security and compatibility. Both f
  • Bypassing Obfuscation: Ciphered Code Reverse Engineering5/8/2024 10:13:08 AM. In this article, we have performed reverse engineering over a protected binary by deep analysis of both obfuscated source code and MSIL assembly code.
  • Encryption for Data Security: Creating Digital Certificates5/6/2024 6:15:44 AM. Encryption secures data by converting it into unreadable ciphertext using algorithms and keys, preventing unauthorized access. SSL/TLS certificates enable secure communication between websites and use
  • Security ASP.net Core MVC (C#) Encryption and Decryption4/9/2024 6:14:18 PM. On the topic of "Security in ASP.NET Core MVC (C#): Encryption and Decryption," Ziggy Rafiq has written an insightful article. As Ziggy explores encryption and decryption techniques, he offe
  • Best Practices for Maintaining Security and Preventing Vulnerabilities in C#4/9/2024 5:54:03 PM. Explore essential security practices in C# programming with Ziggy Rafiq, covering password hashing, input validation, SQL injection prevention, cryptography, HTTPS, secret management, and staying upda
  • Generate Random Password in ASP.NET4/3/2024 10:46:55 AM. Generate Random Password in ASP.NET: Enhance security with ASP.NET by creating a randomized password generator. Utilize built-in features or custom code to generate strong, unpredictable passwords, bo
  • The Best Decentralized Apps of 20244/3/2024 8:30:18 AM. Explore the world of decentralized applications (DApps) and their impact on various industries. Learn about the benefits of DApps, including privacy, security, and cost-effective transactions. Discove
  • What is New in .NET 93/4/2024 8:06:59 AM. .NET 9, succeeding .NET 8, places particular emphasis on cloud-native applications and enhancing performance. It will receive standard-term support (STS) for 18 months.
  • Cybersecurity of External Streaming Data - Confidentiality2/14/2024 4:02:06 AM. This comprehensive article delves into cybersecurity considerations for external data, focusing on streaming bitstreams. It covers encryption fundamentals, emphasizing symmetric cryptography and pract
  • Xite Encryption1/31/2024 10:06:02 AM. This code provides an easy-to-use encryption and decryption solution in C#. It utilizes RSA cryptography, allowing seamless integration into Visual Studio projects. This class contains methods/functio
  • Understanding the One-Way Nature of HASHBYTES in SQL1/5/2024 10:48:17 AM. This article delves into the cryptographic world of hashing algorithms, emphasizing the irreversible nature of these functions. Learn why HASHBYTES, a widely-used function for creating hash values in
  • Secure Password Hashing with SHA-256 and Salt in Python12/7/2023 5:46:50 AM. In this article, we have discussed SHA-256 and salt. In this article, we unravel the intricacies of a clever strategy to fortify passwords—SHA-256 with salt. SHA-256, part of the SHA-2 family, transfo
  • TripleDES Encryption and Decryption in C#10/16/2023 5:35:37 AM. Encryption is the process of rendering data unreadable to safeguard it from unauthorized access. It's widely applied in banking, e-commerce, communication, and security. TripleDES (Triple Data Enc
  • Introduction To Symmetric Encryption10/11/2023 5:01:07 AM. In this article, you will learn about Symetric Engryption.
  • SHA-1 Bit Implementation In C#9/25/2023 6:30:24 AM. This is a bit implementation of the SHA-1. It supports messages 2^32 - 65 bits long.
  • C# Security: Best Practices for Secure Coding8/31/2023 5:05:34 PM. In this article, we will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to
  • Activation Link Vulnerability8/24/2023 9:15:31 AM. Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
  • Understanding SSH Authentication8/10/2023 4:57:38 AM. Unveil the significance of SSH (Secure Shell) in securing network communication. Explore SSH authentication's core concepts, methods, and integration into .NET Core applications for fortified remo
  • XML Signatures in Microsoft .NET7/18/2023 5:26:02 AM. In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
  • How To Configure SMTP O365 Migration Using TLS 1.2 For SQL Database Mail7/6/2023 4:49:23 AM. This article will explain to you how exactly you need to configure TLS 1.2 as a default protocol and setup SMTP O365 migration using SQL 2012 Database mail and above versions for Windows Server 2012 a
  • Rivest Shamir Adleman(RSA) Algorithm and Functions6/19/2023 7:13:37 AM. In Java, you can leverage the built-in cryptographic libraries to generate RSA key pairs, encrypt and decrypt messages, and perform digital signatures. This article explores the RSA application and it
  • Cryptography actions with Hashing in Desktop flow using Microsoft Power Automate6/19/2023 7:06:18 AM. Reading this article, you can learn how to apply hashing using Hash text action, Hash from file action, Hash text with key action and Hash from file with key action with Desktop flow in Microsoft Powe
  • Cryptography actions with File in Desktop flow using Microsoft Power Automate6/16/2023 7:31:15 AM. Reading this article, you can learn how to encrypt or decrypt a file using Encrypt from file with AES action and Decrypt to file with AES action with the Desktop flow in Microsoft Power Automate
  • Cryptography Actions with Plain Text in Desktop Flow using Microsoft Power Automate6/15/2023 4:42:49 AM. Reading this article, you can learn how to encrypt or decrypt plain text using Encrypt text with AES action and Decrypt text with AES action with Desktop flow in Microsoft Power Automate.
  • Various Ways To Secure Sensitive Data In C#2/13/2023 5:43:29 AM. In this article we will see Various ways to secure sensitive data in C# with example.
  • Introduction To Homomorphic Encryption With Microsoft SEAL12/20/2022 5:05:57 AM. Homomorphic encryption allows third-party providers to perform computations on encrypted data without decrypting the data. This capability is opening new opportunities to provide services while preser
  • PGP (Pretty Good Privacy) Using C#11/18/2022 6:31:02 AM. In this article you will learn about PGP (Pretty Good Privacy) using C#.
  • Encrypt a File Using Rijndael8/22/2022 8:52:57 AM. In this article, we will encrypt a file and embed an encrypted key through which we encrypt that file.
  • Setting Up OpenSSL On Windows 10 Machine7/17/2022 1:37:05 PM. This article explains what openssl is and steps to install properly in windows 10 machines.
  • How To Enable HTTPS On Your Website For Free1/10/2021 5:08:30 PM. Today, a website security is one of the top priorities for developers and HTTPS is the firs step. This step by step walk-through tutorial teaches how to implement the SSL on a Website for free in 10 m
  • Simple Columnar Method With Multiple Rounds In Cryptography11/11/2020 10:41:47 AM. In this article, you will learn about Simple Columnar method with Multiple Rounds in Cryptography.
  • Cryptography In The Digital Era9/9/2020 1:41:06 PM. This article covers different cryptographic techniques that ensure data Confidentiality, Integrity and Availability.Information Security involves preventing or at least reducing the probability of una
  • The technology Behind Bitcoin [Cryptography and Blockchain] 3/19/2018 3:42:10 AM. Have tried to provide the overview of the technology behind the Bitcoin.
  • Implement Symmetric And Asymmetric Cryptography Algorithms With C#12/9/2017 1:33:12 PM. How to encrypt and decrypt data using Symmetric and Asymmetric algorithms using C# Programming language
  • Overview Of Cryptography2/14/2017 7:06:06 AM. This article will explain the concept of bad cryptography, which means bad or crackable encryption.
  • AI Caesar Cipher1/8/2017 1:48:09 PM. In this article, you will learn about AI Caesar Cipher.
  • Cryptography - Data Encryption Standard (DES)10/16/2016 12:06:31 PM. In this article, you will learn about cryptography - data encryption standard (DES).
  • Key Based Cryptographic Algorithms9/23/2016 1:30:46 PM. In this article, you will learn about Key based cryptographic algorithms.
  • Introduction To Cryptography And Caesar Cipher8/25/2016 3:27:49 PM. In this article, you will learn about Cryptography and Caesar Cipher.
  • Encrypt And Decrypt Files In Windows Runtime Apps Using Windows Cryptography Technique4/25/2016 11:24:37 AM. In this article, we will learn how to encrypt and decrypt files in Windows Runtime apps.
  • S-DES or Simplified Data Encryption Standard3/9/2016 10:21:22 AM. In this article you will learn about S-DES or Simplified Data Encryption Standard.
  • Efficiently Storing Passwords in .NET Framework7/30/2015 2:46:51 PM. In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
  • Using Cryptography in Portable Xamarin Forms (Windows Phone, Android and IOS)12/23/2014 7:02:32 PM. In this article, I will explain how to use cryptographic algorithms as common code in C# targeting multiple mobile platforms (Windows phone, Android and IOS) using Xamarin forms without depending on native functionality.
  • An Overview of Cryptography5/2/2014 1:37:42 PM. Cryptography is an art and science of secret communications. Cryptography is a technique used to provide security by encoding messages to make them non-readable.
  • Cryptography in VB.NET Part 112/1/2012 2:31:01 AM. For any Distributed Framework or Infrastructure to be successful today it has to have an extensive support for developing secured solutions. Microsoft .NET is developed from bottom up with security in mind. It has an eclectic security infrastructure.
  • File Tampering Detection in VB.NET11/8/2012 7:11:59 AM. This article describes an easy approach to determining whether or not two files are exactly the same.
  • Exploring Security in .NET: Part I10/4/2012 9:08:08 AM. This article highlights some of the key concepts of .NET Security like Code Access Security, Evidence based Security and many more.
  • Cryptography in Microsoft.NET Part III: Digital Certificates10/3/2012 10:45:23 AM. Part-I and II of this article discussed the basics of cryptography and its applications in real world enterprise solutions. Part-I discussed the nitty-gritty of encryption and its implementation in Microsoft .NET Framework Class Library (FCL). Part-II discussed the hashing and signature algorithms and their implementation in FCL. It also discussed the two common cryptography applications namely digital envelope & digital signature.
  • Cryptography in Microsoft.NET Part I: Encryption10/3/2012 9:41:46 AM. Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
  • Cryptography in Microsoft.NET Part I: Encryption10/1/2012 9:09:19 AM. In this article, Gowry sheds lights on the basics of cryptography and how it can be implemented in .NET.
  • How Easy Cryptography is in VS.Net10/1/2012 9:02:32 AM. What can be done regarding the security issues? Part of the solution is to secure important data - more specifically, using strong encryption thats what we will see in this article.
  • Cryptography in Microsoft.NET Part II: Digital Envelop and Digital Signatures10/1/2012 8:59:24 AM. Part-I of this article covered cryptography in the context of encryption. This part continues from where part-I left. It assumes that the reader understands the purpose of encryption, knows about the two types of encryption namely asymmetric encryption and symmetric encryption and the fundamental differences between them. It also assumes that the reader understands encryption-decryption classes in System.Security.Cryptography namespace and the stream based encryption model in. NET framework class library (FCL).
  • System.Security.Cryptography.Xml Namespace 9/30/2012 2:47:56 AM. In this article I will explain you about the System.Security.Cryptography.Xml Namespace.
  • Key Issue of sharing 9/29/2012 8:34:26 AM. Describing how can we share a key from one place to another.
  • Cryptography in .NET 9/29/2012 6:01:01 AM. In this article I will explain you about Cryptography in .NET.
  • System.Security.Cryptography Namespace in .NET 9/29/2012 5:55:42 AM. In this article I will explain you about System.Security.Cryptography Namespace in .NET.
  • Case Study: Demo Networking Financial System 9/23/2012 6:13:38 AM. In this tutorial I will discuss some of the design and development issues that one might consider when using .NET framework for developing Network affiliated applications.
  • XML Signatures in Microsoft .NET5/19/2012 7:14:40 AM. In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
  • Developer Roadmap For Building Smart Client Applications5/19/2012 6:11:44 AM. This article is a developer Roadmap For Building Smart Client Applications.
  • Grypto-Grid Solution to Digital Signatures5/15/2012 6:28:33 PM. This article describes as to how a Grid middleware can be easily used for a Cryptography problem.
  • Using the DPAPI through ProtectedData Class in .Net Framework 2.05/13/2012 3:21:02 AM. The objective of this tutorial is to show how the DPAPI can be used to encrypt and decrypt data. Encrypt some data using ProtectedData Class in System.Security.Cryptography namespace and save it to a file. Show that the data can be decrypted using the same class but deferent method. Login as a different user,and show that the data cannot be decrypted.
  • File Encryption5/13/2012 3:14:24 AM. The classes in the .Net Framework cryptography namespace manage many details of cryptography for you.
  • Cryptography in .NET5/13/2012 3:07:25 AM. This article gives a brief overview of Cryptography and the Cryptography support provided by the .NET Framework. I begin by introducing Cryptography and then proceed to examine the various types of it. In particular, I review and analyze the various cryptography algorithms and objects supported by .NET. I conclude after proposing and briefly discussing the algorithmic technique that would work best for you.
  • Symmetric Encryptor Beta15/13/2012 3:05:06 AM. Free to use Encrypt/Decrypt using 2 Symmetric Algorithms 'DES' and 'RC2' coded in C#.
  • Implementing the Chaocipher in C#11/16/2011 8:46:30 AM. Whilst doing some research on cryptography, I came across the Chaocipher.
  • Public Key Encryption (RSA Method) for Encryption and Decryption in ASP.Net8/19/2010 4:32:06 AM. In this article we will learn how use Public Key Encryption for Encryption and Decryption in ASP.Net
  • Cryptography in Asp.net9/7/2007 4:28:07 AM. This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
  • File Tampering Detection3/6/2007 12:31:43 AM. This article describes an easy approach to determining whether or not two files are exactly the same.
  • Enterprise Library 1.02/1/2006 7:15:49 AM. Enterprise Library is a set of tested, reusable application blocks that address common problems developers face when developing enterprise-based applications.
  • Public Key Token Generation Algorithm12/16/2005 5:32:55 AM. The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.