Cryptography and CryptoAPI

CryptoAPI provides all the necessary functionality to ensure authentication, privacy, and integrity in network communication.

Authentication in CryptoAPI is ensured by digital certificates, which are the digital equivalent of photo IDs. A computer program, user, or other entity uses the certificate to prove its authenticity. Authentication algorithms such as Kerberos are also available to developers through CryptoAPI.

Integrity comes from digital signatures and hashes. A hash ensures that nobody has changed the message or data. A digital signature protects the hash and demonstrates the identity of the user or program that signed the data.

Providing privacy for communications and data is possible with the use of encryption. ...

Get Microsoft® Windows® 2000 Security Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.