Summary

This goal of this chapter was to show you how to protect your data and protect communications between applications using security. You saw the symmetric algorithms that use a secret key to encrypt and decrypt data. You saw asymmetric algorithms that use public-private key pairs to produce complex, secure, encrypted data. In addition, you looked at creating hashes and took a whirlwind tour of the Windows Data Protection API (DPAPI).

After having read this chapter, you should be confident in your own ability to protect your application's data and protect information sent to and from your application using various methods. You should also feel fairly comfortable with the different concepts that are critical to encryption, such as key pairs, ...

Get Microsoft® Visual C#® .NET 2003 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.