Summary

This chapter introduced basic cryptographic terminology, concepts, and mathematical foundations that are required for understanding several upcoming chapters. To accomplish this, several simple classical cryptographic algorithms were reviewed as examples. In the next two chapters, we look more closely at modern symmetric and asymmetric ciphers, which form the basis of secure storage and communications, supporting privacy, confidentiality, authenticity, integrity, and nonrepudiation.

Beyond this chapter, the book takes an applied approach, focusing on specific Windows and .NET platform functionality. Therefore, we will not cover a great deal more on fundamental concepts. For further reading on fundamental concepts, please see the excellent ...

Get .NET Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.