Summary

In this chapter, we focused on understanding cryptography and how we can use symmetric and asymmetric algorithms. We also focused on how we can use these to validate senders, receivers, and the content of messages. We can use the techniques learned in the chapter to validate input data and perform similar operations when working with secure transactions. We also looked at how we can sign messages using digital signatures, and how can we maintain data integrity using hash values. 

In the next chapter, we will focus on .NET assemblies, how we can manage them, and how we can debug C# applications.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.147.193