Related resources for symmetric
  • Encryption and Decryption using AES in .NET Core and .NET Framework9/2/2024 7:24:40 AM. AES (Advanced Encryption Standard) is a symmetric encryption algorithm using the same key for both encryption and decryption. In C#, AES encryption involves setting up a RijndaelManaged instance with
  • RSA Encryption and Decryption in .NET Core and Framework Explained8/30/2024 9:37:27 AM. The RSA algorithm is an asymmetric cryptography method that uses a pair of keys: a public key for encryption and a private key for decryption. This example demonstrates how to use the BouncyCastle lib
  • Encryption and Decryption using RSA (asymmetric) in Angular8/30/2024 8:35:23 AM. This guide explores implementing RSA asymmetric encryption and decryption in Angular. It covers how to integrate RSA public and private key pairs for secure data transmission.
  • Encryption and Decryption using AES (Symmetric) in Angular8/30/2024 5:01:16 AM. AES (Advanced Encryption Standard) is a symmetric encryption algorithm used for secure data transmission. Implement AES in Angular using the crypto-js library, supporting modes like CBC, ECB, and CTR,
  • Generating Public/Private Keys In C# And .NET 6/14/2024 10:40:14 AM. How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvider
  • Introduction To AES And DES Encryption Algorithms In .NET6/5/2024 5:38:31 AM. Explore encryption methods like Symmetric (DES, 3DES, AES) and Asymmetric (RSA, DSA), highlighting key differences in key management, security, and performance. Understand DES vulnerabilities and adva
  • How Secure Sockets Layer (SSL) Protects Data Online?5/7/2024 5:53:30 AM. Learn how SSL works in a step-by-step guide for beginners and professionals, ensuring secure internet communication and data protection.
  • Encryption for Data Security: Creating Digital Certificates5/6/2024 6:15:44 AM. Encryption secures data by converting it into unreadable ciphertext using algorithms and keys, preventing unauthorized access. SSL/TLS certificates enable secure communication between websites and use
  • Text Encrypt and Decrypt With a Specified Key4/25/2024 8:05:19 AM. Encrypting and decrypting text with a specified key involves using cryptographic algorithms to convert plain text into cipher text and vice versa, ensuring data security. The key serves as the paramet
  • Cybersecurity of External Streaming Data - Non-repudiation2/14/2024 4:13:22 AM. This article which is a continuation of a discussion related to external streaming data will focus on using cybersecurity to protect the confidentiality of bitstreams. It is the third and last part co
  • Cybersecurity of External Streaming Data - Confidentiality2/14/2024 4:02:06 AM. This comprehensive article delves into cybersecurity considerations for external data, focusing on streaming bitstreams. It covers encryption fundamentals, emphasizing symmetric cryptography and pract
  • TripleDES Encryption and Decryption in C#10/16/2023 5:35:37 AM. Encryption is the process of rendering data unreadable to safeguard it from unauthorized access. It's widely applied in banking, e-commerce, communication, and security. TripleDES (Triple Data Enc
  • Introduction To Symmetric Encryption10/11/2023 5:01:07 AM. In this article, you will learn about Symetric Engryption.
  • Check if Binary Tree is Symmetric6/15/2023 8:36:09 AM. This code is a C# implementation of a solution to the problem of checking if a binary tree is symmetric or not. A binary tree is symmetric if it is a mirror image of itself along the center.
  • Encryption And Decryption Using A Symmetric Key In C#1/30/2023 6:21:47 AM. In this article, we are going to learn how to use the symmetric key for encrypting and decrypting data in C#.
  • Encrypt and Decrypt in SQL Server: Part 51/19/2023 9:12:44 AM. In this article, we will create a symmetric key and encrypt and decrypt string using this key.
  • SETS In Python6/28/2022 12:42:31 AM. This article is dedicated to concepts of SETS in Python. Sets are one the built-in Data Structure of Python.
  • Symmetrical Repository Pattern - Data Access Made Easy In .NET5/29/2022 3:39:55 AM. In this article, I will describe an interesting pattern that can be implemented to make it trivial to perform CRUD/RESTful data access across a full-stack .net system, with this technique that abstrac
  • C# SortedSet with Example10/28/2021 6:11:38 AM. In any programming language, collections play a very important role. Many times we need Sorted collections, so I felt to discuss SortedSet collections in this article. This article can be used by begi
  • C# - Hashset With Example10/22/2021 12:42:33 PM. In this article, you will learn about C# - Hashset with Example.
  • Cryptography In The Digital Era9/9/2020 1:41:06 PM. This article covers different cryptographic techniques that ensure data Confidentiality, Integrity and Availability.Information Security involves preventing or at least reducing the probability of una
  • Authentication And Authorization Using JSON Web Tokens In .NET CORE 3.15/21/2020 8:25:23 PM. In this article, we will discuss authentication and authorization using JSON web Tokens in.NET core 3.1.
  • Generating Symmetric Private Key In C# and .NET1/8/2019 12:32:15 AM. Generating Symmetric Private Key In C# and .NET. Major symmetric algorithms are AES, DES, RC2, Rijndael, and TripleDES. The GenerateKey and GenerateIV methods return the private secret key and initial
  • Implement Symmetric And Asymmetric Cryptography Algorithms With C#12/9/2017 1:33:12 PM. How to encrypt and decrypt data using Symmetric and Asymmetric algorithms using C# Programming language
  • Encryption Technique Using SQL Server 20141/15/2016 2:41:55 PM. This article will tell you about using Symmetric and Asymmetric encryption techniques to secure your private data or sensitive information.
  • Database Table Encryption Using Symmetric Key in SQL Server 2008 R21/23/2015 4:55:53 PM. In this article you will learn about Database Table Encryption using Symmetric Key in SQL Server 2008 R2.
  • An Overview of Cryptography5/2/2014 1:37:42 PM. Cryptography is an art and science of secret communications. Cryptography is a technique used to provide security by encoding messages to make them non-readable.
  • Cryptography in VB.NET Part 112/1/2012 2:31:01 AM. For any Distributed Framework or Infrastructure to be successful today it has to have an extensive support for developing secured solutions. Microsoft .NET is developed from bottom up with security in mind. It has an eclectic security infrastructure.
  • Building Assemblies using VB.NET11/10/2012 2:39:37 AM. This article discusses how to build assemblies and secure them from being tampered.
  • Using Symmetric Algorithms to Encrypt Data10/4/2012 9:40:25 AM. In this article, I will propose a method of how to encrypt data and store it using symmetric algorithms whose are, in fact, four integrated classes within the .Net framework, namely DES,RC2,Rijndael and TripleDES but I will perform the task using the two last ones as they are the mostly used in real time cases.
  • Cryptography in Microsoft.NET Part I: Encryption10/3/2012 9:41:46 AM. Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
  • Cryptography in Microsoft.NET Part I: Encryption10/1/2012 9:09:19 AM. In this article, Gowry sheds lights on the basics of cryptography and how it can be implemented in .NET.
  • Key Issue of sharing 9/29/2012 8:34:26 AM. Describing how can we share a key from one place to another.
  • Symmetric Encryptor Beta15/13/2012 3:05:06 AM. Free to use Encrypt/Decrypt using 2 Symmetric Algorithms 'DES' and 'RC2' coded in C#.
  • Cryptography in Asp.net9/7/2007 4:28:07 AM. This article explains what is Cryptography? Why it is needed? and the types of Cryptography.