Expanded Library

Cryptography in .NET 6

by Stephen Haunts

In this course, you will learn how to use .NET 6 to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication.

What you'll learn

As a software developer, you have a duty to your employer to secure and protect their data. In this course, Cryptography in .NET 6, you will learn how to use the .NET Class Libraries to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication in your applications.

First, you will explore random numbers and understand why they are so important to cryptography. Next, you will look at symmetric and asymmetric encryption, and see how they can work together to overcome each of their downsides. Then, you will explore hashing and authenticated hashing and see how they help satisfy integrity and authentication requirements. Finally, you will learn about digital signatures and how they satisfy the non-repudiation requirements.

When you are finished with this course, you will have the knowledge of building up a working sample application that simulates a 2-way chat system between recipients. You will incorporate all the building blocks covered in the course to create a hybrid encryption-based example that shows you how everything works together when building larger protocols.

Table of contents

Course Overview

About the author

Stephen Haunts is an experienced Software Developer and Leader who has worked across multiple business domains including Computer Games, Finance, and Healthcare Retail and Distribution. Stephen has worked in languages ranging from Assembler, various forms of BASIC, to C and C++, and then finding his love of C# and .NET. Stephen also runs a Software Development and Leadership blog called {Coding in the Trenches} which can be read at http://www.stephenhaunts.com . Stephen also runs a small music ... more

Ready to upskill? Get started