Summary

In this chapter, you learned how the Microsoft CryptoAPI provides you with maximum encryption flexibility by allowing you to plug in any Cryptographic Service Provider (CSP) that you need. Doing so enables the CryptoAPI to support new encryption algorithms as they become available. You also learned how you can determine which CSPs are installed on a computer and which CSP types are available.

In the next chapter, you'll learn about the basics of encryption using the CryptoAPI. You'll learn how to generate and use hashes of messages and files. You'll also learn how to generate symmetric encryption keys and how to use those keys for encrypting and decrypting data. This next chapter will cover a lot of ground, so fasten your seatbelt and ...

Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.