Practical Cryptography in .NET
As a software developer you have a duty to your employer to secure and protect their data. In this course, you will learn how to use the .NET Framework to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication.
As a software developer you have a duty to your employer to secure and protect their data. In this course, you will learn how to use the .NET Framework to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication. This course covers random number generation, hashing, authenticated hashing, and password based key derivation functions. The course also covers both symmetric and asymmetric encryption using DES, Triple DES, AES, and RSA. You then learn how to combine these all together to product a hybrid encryption scheme which includes AES, RSA, HMACS, and Digital Signatures.
Author Name: Stephen Haunts
Author Description:
Stephen Haunts is an experienced Software Developer and Leader who has worked across multiple business domains including Computer Games, Finance, and Healthcare Retail and Distribution. Stephen has worked in languages ranging from Assembler, various forms of BASIC, to C and C++, and then finding his love of C# and .NET. Stephen also runs a Software Development and Leadership blog called {Coding in the Trenches} which can be read at http://www.stephenhaunts.com . Stephen also runs a small music … more
Table of Contents
- Introduction
16mins - Cryptographic Random Numbers
9mins - Hashing Algorithms
21mins - Secure Password Storage
28mins - Symmetric Encryption
49mins - Asymmetric Encryption
33mins - Hybrid Encryption
28mins - Digital Signatures
18mins - SecureString
13mins - Course Summary
19mins
There are no reviews yet.