Cryptographic primitive | Use |
---|---|
Secret-key encryption (symmetric cryptography) | Performs a transformation on data to keep it from being read by third parties. This type of encryption uses a single shared, secret key to encrypt and decrypt data. |
Public-key encryption (asymmetric cryptography) | Performs a transformation on data to keep it from being read by third parties. This type of encryption uses a public/private key pair to encrypt and decrypt data. |
Cryptographic signing | Helps verify that data originates from a specific party by creating a digital signature that is unique to that party. This process also uses hash functions. |
Cryptographic hashes | Maps data from any length to a fixed-length byte sequence. Hashes are statistically unique; a different two-byte sequence will not hash to the same value. |
XOR
) operation with the previous ciphertext block before it is encrypted. Each ciphertext block is therefore dependent on all previous blocks. When this system is used, common message headers that might be known to an unauthorized user cannot be used to reverse-engineer a key.Title | Description |
---|---|
Cryptography Model | Describes how cryptography is implemented in the base class library. |
Walkthrough: Creating a Cryptographic Application | Demonstrates basic encryption and decryption tasks. |
Configuring Cryptography Classes | Describes how to map algorithm names to cryptographic classes and map object identifiers to a cryptographic algorithm. |