O'Reilly logo

Extending MFC Applications with the .NET Framework by Nishant Sivakumar, Tom Archer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Combining Symmetric Encryption, Asymmetric Encryption, and Hash Codes

At this point, I've spoken generically about how symmetric and asymmetric encryption can be combined to present an efficient yet secure means of encrypting data. However, because the demos are written for a single user, it might not be obvious exactly how this all ties together. Therefore, let's review some of the things you've read in this chapter:

  • With symmetric encryption two parties each share a private key that is used both to encrypt and decrypt data. Algorithms using this technique are very fast, but not as secure as with asymmetric encryption. In addition, with symmetric encryption alone, there is no secure means by which the person generating the key can get it to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required