Summary

This chapter covered a lot of ground. You learned how you can create hashes of messages and keys, and what you can do with those hashes. Next, you looked at how you can generate symmetric encryption keys by deriving them from some source data, such as a user-supplied password, as well as how to generate a random encryption key. Finally, you learned how you can use the keys that you've generated to both encrypt and decrypt data, and how you can use hashes of data to verify that the data hasn't been corrupted.

The next chapter will go further into the arena of key generation and encryption. You'll learn how to use public/private key pairs in conjunction with session keys. You'll also learn how to export and import keys, enabling you to ...

Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.