Want to build the ChatGPT based Apps? Start here
Become a member
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
TECHNOLOGIES
ANSWERS
LEARN
NEWS
BLOGS
VIDEOS
INTERVIEW PREP
BOOKS
EVENTS
Training
Live
JOBS
MORE
CAREER
MEMBERS
About Cryptograph
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Sourav Bhattacharya (5)
Gowri S Paramasivam (3)
C# Curator (3)
Muhammad Shakir (2)
Afzaal Ahmad Zeeshan (2)
Gowry S Paramasivam (2)
Scott Lysle (2)
lsitaraman (2)
Naimish Makwana (1)
John Iwasz (1)
Maruthi Palllamalli (1)
Aymen Amri (1)
Vinay Ayinapurapu (1)
Vikas Hooda (1)
Sourabh Somani (1)
Saad Aslam (1)
Lokesh Varman (1)
Mahesh Chand (1)
Madhanmohan Devarajan (1)
Ahmad Mozaffar (1)
Gul Md Ershad (1)
Kishor Bikram Oli (1)
Kolowai Baloch (1)
Raj Bandi (1)
Sanjay Singh (1)
Mihai Popescu (1)
Razi Rais (1)
Sushmita Kumari (1)
Abebe Assefa (1)
Jay Tallamraju (1)
Raghavendra Prabhu (1)
Moses Soliman (1)
Nenad Djodievic (1)
Suprotim Agarwal (1)
Saurabh Nandu (1)
Vulpes (1)
Brijesh Jalan (1)
Rajendra Kumar Yerra (1)
Anand Kumar Rao (1)
kjetilroe (1)
Shashi Jeevan M P (1)
Related resources for Cryptograph
No resource found
Various Ways To Secure Sensitive Data In C#
2/13/2023 5:43:29 AM.
In this article we will see Various ways to secure sensitive data in C# with example.
Introduction To Homomorphic Encryption With Microsoft SEAL
12/20/2022 5:05:57 AM.
Homomorphic encryption allows third-party providers to perform computations on encrypted data without decrypting the data. This capability is opening new opportunities to provide services while preser
PGP (Pretty Good Privacy) Using C#
11/18/2022 6:31:02 AM.
In this article you will learn about PGP (Pretty Good Privacy) using C#.
Introduction To Symetric Encryption
9/21/2022 4:05:26 PM.
In this article, you will learn about Symetric Engryption.
Encrypt a File Using Rijndael
8/22/2022 8:52:57 AM.
In this article, we will encrypt a file and embed an encrypted key through which we encrypt that file.
Setting Up OpenSSL On Windows 10 Machine
7/17/2022 1:37:05 PM.
This article explains what openssl is and steps to install properly in windows 10 machines.
How To Configure SMTP O365 Migration Using TLS 1.2 For SQL Database Mail
6/7/2022 2:08:26 PM.
This article will explain to you how exactly you need to configure TLS 1.2 as a default protocol and setup SMTP O365 migration using SQL 2012 Database mail and above versions for Windows Server 2012 a
How To Enable HTTPS On Your Website For Free
1/10/2021 5:08:30 PM.
Today, a website security is one of the top priorities for developers and HTTPS is the firs step. This step by step walk-through tutorial teaches how to implement the SSL on a Website for free in 10 m
Simple Columnar Method With Multiple Rounds In Cryptography
11/11/2020 10:41:47 AM.
In this article, you will learn about Simple Columnar method with Multiple Rounds in Cryptography.
Cryptography In The Digital Era
9/9/2020 1:41:06 PM.
This article covers different cryptographic techniques that ensure data Confidentiality, Integrity and Availability.Information Security involves preventing or at least reducing the probability of una
Activation Link Vulnerability
4/22/2020 8:00:01 AM.
Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
Generating Public/Private Keys In C# And .NET
1/8/2019 12:30:25 AM.
How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvider
The technology Behind Bitcoin [Cryptography and Blockchain]
3/19/2018 3:42:10 AM.
Have tried to provide the overview of the technology behind the Bitcoin.
Implement Symmetric And Asymmetric Cryptography Algorithms With C#
12/9/2017 1:33:12 PM.
How to encrypt and decrypt data using Symmetric and Asymmetric algorithms using C# Programming language
Overview Of Cryptography
2/14/2017 7:06:06 AM.
This article will explain the concept of bad cryptography, which means bad or crackable encryption.
AI Caesar Cipher
1/8/2017 1:48:09 PM.
In this article, you will learn about AI Caesar Cipher.
Cryptography - Data Encryption Standard (DES)
10/16/2016 12:06:31 PM.
In this article, you will learn about cryptography - data encryption standard (DES).
Key Based Cryptographic Algorithms
9/23/2016 1:30:46 PM.
In this article, you will learn about Key based cryptographic algorithms.
Introduction To Cryptography And Caesar Cipher
8/25/2016 3:27:49 PM.
In this article, you will learn about Cryptography and Caesar Cipher.
Encrypt And Decrypt Files In Windows Runtime Apps Using Windows Cryptography Technique
4/25/2016 11:24:37 AM.
In this article, we will learn how to encrypt and decrypt files in Windows Runtime apps.
S-DES or Simplified Data Encryption Standard
3/9/2016 10:21:22 AM.
In this article you will learn about S-DES or Simplified Data Encryption Standard.
Guide For Building C# Apps On Ubuntu: Cryptographic Helpers
1/21/2016 11:40:56 PM.
In this article you will learn to build C# apps on Ubuntu.
Efficiently Storing Passwords in .NET Framework
7/30/2015 2:46:51 PM.
In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
Using Cryptography in Portable Xamarin Forms (Windows Phone, Android and IOS)
12/23/2014 7:02:32 PM.
In this article, I will explain how to use cryptographic algorithms as common code in C# targeting multiple mobile platforms (Windows phone, Android and IOS) using Xamarin forms without depending on native functionality.
An Overview of Cryptography
5/2/2014 1:37:42 PM.
Cryptography is an art and science of secret communications. Cryptography is a technique used to provide security by encoding messages to make them non-readable.
Cryptography in VB.NET Part 1
12/1/2012 2:31:01 AM.
For any Distributed Framework or Infrastructure to be successful today it has to have an extensive support for developing secured solutions. Microsoft .NET is developed from bottom up with security in mind. It has an eclectic security infrastructure.
File Tampering Detection in VB.NET
11/8/2012 7:11:59 AM.
This article describes an easy approach to determining whether or not two files are exactly the same.
SHA-1 Bit Implementation in C#
10/20/2012 4:23:19 AM.
This is a bit implementation of the SHA-1. It supports messages 2^32 - 65 bits long.
Exploring Security in .NET: Part I
10/4/2012 9:08:08 AM.
This article highlights some of the key concepts of .NET Security like Code Access Security, Evidence based Security and many more.
Cryptography in Microsoft.NET Part III: Digital Certificates
10/3/2012 10:45:23 AM.
Part-I and II of this article discussed the basics of cryptography and its applications in real world enterprise solutions. Part-I discussed the nitty-gritty of encryption and its implementation in Microsoft .NET Framework Class Library (FCL). Part-II discussed the hashing and signature algorithms and their implementation in FCL. It also discussed the two common cryptography applications namely digital envelope & digital signature.
Cryptography in Microsoft.NET Part I: Encryption
10/3/2012 9:41:46 AM.
Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
Cryptography in Microsoft.NET Part I: Encryption
10/1/2012 9:09:19 AM.
In this article, Gowry sheds lights on the basics of cryptography and how it can be implemented in .NET.
How Easy Cryptography is in VS.Net
10/1/2012 9:02:32 AM.
What can be done regarding the security issues? Part of the solution is to secure important data - more specifically, using strong encryption thats what we will see in this article.
Cryptography in Microsoft.NET Part II: Digital Envelop and Digital Signatures
10/1/2012 8:59:24 AM.
Part-I of this article covered cryptography in the context of encryption. This part continues from where part-I left. It assumes that the reader understands the purpose of encryption, knows about the two types of encryption namely asymmetric encryption and symmetric encryption and the fundamental differences between them. It also assumes that the reader understands encryption-decryption classes in System.Security.Cryptography namespace and the stream based encryption model in. NET framework class library (FCL).
System.Security.Cryptography.Xml Namespace
9/30/2012 2:47:56 AM.
In this article I will explain you about the System.Security.Cryptography.Xml Namespace.
Key Issue of sharing
9/29/2012 8:34:26 AM.
Describing how can we share a key from one place to another.
XML Signatures in Microsoft .NET
9/29/2012 7:34:26 AM.
In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
Cryptography in .NET
9/29/2012 6:01:01 AM.
In this article I will explain you about Cryptography in .NET.
System.Security.Cryptography Namespace in .NET
9/29/2012 5:55:42 AM.
In this article I will explain you about System.Security.Cryptography Namespace in .NET.
Case Study: Demo Networking Financial System
9/23/2012 6:13:38 AM.
In this tutorial I will discuss some of the design and development issues that one might consider when using .NET framework for developing Network affiliated applications.
XML Signatures in Microsoft .NET
5/19/2012 7:14:40 AM.
In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
Developer Roadmap For Building Smart Client Applications
5/19/2012 6:11:44 AM.
This article is a developer Roadmap For Building Smart Client Applications.
Grypto-Grid Solution to Digital Signatures
5/15/2012 6:28:33 PM.
This article describes as to how a Grid middleware can be easily used for a Cryptography problem.
Using the DPAPI through ProtectedData Class in .Net Framework 2.0
5/13/2012 3:21:02 AM.
The objective of this tutorial is to show how the DPAPI can be used to encrypt and decrypt data. Encrypt some data using ProtectedData Class in System.Security.Cryptography namespace and save it to a file. Show that the data can be decrypted using the same class but deferent method. Login as a different user,and show that the data cannot be decrypted.
File Encryption
5/13/2012 3:14:24 AM.
The classes in the .Net Framework cryptography namespace manage many details of cryptography for you.
Cryptography in .NET
5/13/2012 3:07:25 AM.
This article gives a brief overview of Cryptography and the Cryptography support provided by the .NET Framework. I begin by introducing Cryptography and then proceed to examine the various types of it. In particular, I review and analyze the various cryptography algorithms and objects supported by .NET. I conclude after proposing and briefly discussing the algorithmic technique that would work best for you.
Symmetric Encryptor Beta1
5/13/2012 3:05:06 AM.
Free to use Encrypt/Decrypt using 2 Symmetric Algorithms 'DES' and 'RC2' coded in C#.
Implementing the Chaocipher in C#
11/16/2011 8:46:30 AM.
Whilst doing some research on cryptography, I came across the Chaocipher.
Public Key Encryption (RSA Method) for Encryption and Decryption in ASP.Net
8/19/2010 4:32:06 AM.
In this article we will learn how use Public Key Encryption for Encryption and Decryption in ASP.Net
Cryptography in Asp.net
9/7/2007 4:28:07 AM.
This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
File Tampering Detection
3/6/2007 12:31:43 AM.
This article describes an easy approach to determining whether or not two files are exactly the same.
Enterprise Library 1.0
2/1/2006 7:15:49 AM.
Enterprise Library is a set of tested, reusable application blocks that address common problems developers face when developing enterprise-based applications.
Xite Encryption
12/29/2005 12:42:25 AM.
This class contains methods/functions for easily decrypting and encrypting data.
Public Key Token Generation Algorithm
12/16/2005 5:32:55 AM.
The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.