Chapter 4. Public/Private Key Communications
IN THIS CHAPTER
Block Versus Stream Algorithms
Generating, Saving, and Retrieving Public/Private Keys
Exporting and Importing Keys
Building a Secure Messaging Utility
Being able to protect files from snooping eyes by encrypting them with a password is all fine and good, but it doesn't do anything for those occasions when you need to exchange information with another user in a secure manner. You could give the other user the password to decrypt the messages you send, but then how do you send the password so that it is secure?
When you get right down to it, password-based key generation isn't good for much more than protecting files on your computer, or network, from people who shouldn't have access to ...
Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.