Summary

Although this chapter didn't cover as much ground as the preceding chapter, it still covered quite a lot of material. You learned about the different aspects of encryption key types and how salt and padding are used within encryption to make encryption keys and encrypted data more secure. You also learned how you can generate new salt values, along with how to extract and replace the salt values that an encryption key is using. Finally, you learned how you can export and import encryption keys to exchange them with other users.

In the next chapter, you will look at digital certificates and the role they play in building secure communications. You'll learn how you can use a couple of Microsoft-provided controls to request and receive digital ...

Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.