Summary

In this chapter, you learned about the "simplified" functions available in the Crypto API. You saw how you can use these functions to, in a single function call, perform what would have taken a significant amount of code given what you knew a few chapters ago. This functionality is all keyed on using certificates as a means to exchange public keys and is thus dependent on the information you learned in the previous few chapters, which dealt with how to get, manage, and validate certificates.

Now you know how, after you have your certificates and the key exchange certificates of the people you want to send messages to, you can send and receive messages in a secure manner. You also can verify that the message came from the other person ...

Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.