The Java and .NET frameworks contain all the algorithms you need to keep your users' data secret from prying eyes. Web servers like Apache, Tomcat, and IIS, combined with tools like OpenSSL, keep your users secure online. But to use these tools correctly, and to avoid mistakes of the past, you must understand how cryptography works. Learn the math behind encryption and digital signatures. Study examples of how it has been misused, and explore the possibilities that cryptography enables in digital currency and collaboration.
Mathematician and software developer, Michael L Perry applies formal proof to creating reliable software. He has developed a method starting from the works of the greats (Meyer, Rumbaugh, Knuth), and embodied it in his open-source frameworks (Update Controls and Correspondence).
Algorithms Welcome back to Cryptography Fundamentals for Java and. NET Developers. In this module we'll be talking about the various algorithms of cryptography. Cryptography algorithms come in three basic flavors. We've got symmetric algorithms, asymmetric algorithms, and hash functions. Each of these different types of algorithms serves a different purpose, but put them together and you've got a cryptographic system. Let's dive into the symmetric algorithms first.