Chapter 3. Symmetric and Password Encryption

IN THIS CHAPTER

  • Generating Hashes of Strings and Messages

  • Generating Symmetric Keys

  • Understanding Basic Encryption and Decryption

  • Building a Simple Encryption Application

  • Building a File Encryption/Decryption Utility

Knowing how to determine which encryption engines are available for your use is all well and good, but just knowing about them doesn't quite do the job when it comes to keeping data secure. To keep your data safe, you need to be able to take the next step and use the functionality of the CSPs on your system to actually encrypt something.

One of the original forms of key-based encryption is symmetric encryption, in which the same key is used to both encrypt and decrypt the data. To this day, ...

Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.