Chapter 4. Public/Private Key Communications

IN THIS CHAPTER

  • Block Versus Stream Algorithms

  • Generating, Saving, and Retrieving Public/Private Keys

  • Exporting and Importing Keys

  • Building a Secure Messaging Utility

Being able to protect files from snooping eyes by encrypting them with a password is all fine and good, but it doesn't do anything for those occasions when you need to exchange information with another user in a secure manner. You could give the other user the password to decrypt the messages you send, but then how do you send the password so that it is secure?

When you get right down to it, password-based key generation isn't good for much more than protecting files on your computer, or network, from people who shouldn't have access to ...

Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.