Summary

In this chapter we have seen how to use the various cryptography classes to perform data hashing, symmetric key encryption, and public key encryption, as well as to create digital signatures. Most of the classes are wrappers around the underlying CryptoAPI. But the classes have been so well designed that we can use them without needing to be cryptography gurus. If on the other hand, you've enjoyed what you've read here and would like to learn more, I highly recommend Cryptography Decrypted, by H. X. Mel and Doris Baker.

In this chapter, you discovered how the HashAlgorithm-derived classes can be used to generate hash values for a wide variety of hash algorithms. While many of the classes are CryptoAPI wrapper classes, there are also a ...

Get Extending MFC Applications with the .NET Framework now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.