Click here to Skip to main content

Cryptography and Security

Great Reads

by Jeffrey Walton
Import and export Cryptographic Keys in PKCS#8 and X.509 formats, using Crypto++, C#, and Java.
by Jeffrey Walton
Perform authenticated encryption with Crypto++.
by Alaa-eddine KADDOURI
iSafePDF is an Open Source software to sign, timestamp, and encrypt PDF documents.
by Corinna John
From tutorial snippets to open source project

Latest Articles

by Igor Ladnik
Technique to obtain in memory code of running .NET application (even wrapped into unmanaged code for binary files anti-reflection) is presented and implemented with workable sample
by Frank T. Clark
A C# .NET 3.5 (Win7) Windows Forms Application with source code
by Mihai MOGA
Learn the basics of Microsoft CryptoAPI Library
by Matthew Givens
Showing how to decrypt files in memory in order to maintain data security.

Research Library

Due to recent innovations in the mobile device industry, demand for...
Read this paper to learn how you can create an intelligent, integrated...
The explosive growth of the mobile apps market presents a tremendous...
Android is on the rise. Unfortunately, popularity can also bring...

Discussions

by programmer expert on Implementing Protected Configuration With...
by rana faiz on article "OTP (One Time Password) Demystified -...
by OriginalGriff on article "Using Encrypted Files Without...
by PiyushVarma on Article "Encryption/ Decryption Function in...
by Amin_DBR on article "Image Cryptography using RSA...

All Articles

Sort by Score

Cryptography 

5 Jun 2008
Jeffrey Walton
Import and export Cryptographic Keys in PKCS#8 and X.509 formats, using Crypto++, C#, and Java.
23 Mar 2009
Jeffrey Walton
Perform authenticated encryption with Crypto++.
8 Jan 2012
Simon Bridge
Generating encryption keys using Cellular Automata.
8 Jan 2013
orouit
This article presents a format to exchange encrypted documents and the C# code that can handle the encryption and the decryption of the data.
20 Oct 2009
Jeffrey Walton
Sign and verify messages using Crypto++, Java, and C#.
27 Mar 2009
Jeffrey Walton
Yet another C++ class wrapper for AES and Windows CAPI.
12 Jun 2007
Jeffrey Walton
A Compact Product Key System Based on AES and Crypto++
3 Jan 2003
George Anescu
Presenting the C++ implementation of some known and efficient Message-Digest algorithms (MD, RIPEMD, SHA) and a full FileDigest program that is applying the mentioned algorithms.
18 Jul 2012
Raphael Amorim
Generally it's very important to obtain the value of session keys. However, the Microsoft Cryptographic Providers (Base and Enhanced) do not support this feature. CryptExportKey() and CryptImportKey() require a valid key handle to encrypt and decrypt the session key, respectively.
6 Jun 2007
Jeffrey Walton
Validate Product Keys using RSA Signing Functions and Crypto++
24 Oct 2009
Paulo Zemek
The article explains how to create a secure stream that uses asymmetric cryptography to connect and symmetric cryptography to continue without the need for SSL or Certificates
26 Sep 2001
George Anescu
An article presenting a C++ implementation of the Blowfish encryption/decryption method
26 Mar 2014
Don Fizachi
A C# implementation of the SCRAM SHA-1 (RFC 5802) authentication protocol.
7 Jan 2008
Jarl Ostensen
A finite field EC and simple ECC scheme in C++ to help understand the principles.
4 Nov 2004
Rob Manderson
A simple set of classes to encrypt data
15 Nov 2007
Jeffrey Walton
Dynamically Detect Code Alterations and Repair In-Memory Executable Files Using Hashing and Crypto++
24 May 2008
Efi Merdler
The purpose of this article is to explain how a secure channel is built. The article will explain the structure of a Very Simple Secured Protocol (VSSP) that sits above the TCP/IP layer.
6 Apr 2008
Jeffrey Walton
Encrypt data using Block Ciphers with Crypto++.
29 Aug 2009
CyberTrone
This article presents a new cryptography algorithm based on neural networks. Here, you can find some theory and a demo project.
3 Jul 2007
Dave Kerr
An article showing how to use the Crypto API to make a simple MFC class that can encrypt and decrypt different types of data
22 Dec 2006
Toby Emden
An introduction to key cryptographic concepts supported by the .NET Framework.
2 Apr 2010
Apriorit Inc, Tatyana Khitrova
The article is devoted to the development of the library that implements the Diffie – Hellman cryptographic algorithm of key exchange.
25 Feb 2011
Mario Majčica
Creating the X509 based on certificate and key in PEM format
28 Oct 2007
Murat Firat
Need to learn further on cryptology? This article takes an overview of common cryptosystems, along with a step by step description of the Data Encryption Standard and the Advanced Encryption Standard.
7 Nov 2002
George Anescu
An article presenting a C++ implementation of the Rijndael (AES) encryption/decryption method.
22 Jul 2005
Jessn
How to make hashing using the Win32 Crypto API.
9 Jan 2001
Jim Howard
This C++ class serves as a wrapper for the Message Digest 5 code described in the Internet RFC 1321.
30 Mar 2009
Jeffrey Walton
A C++ class providing encryption and authentication using Windows CAPI.
22 Feb 2011
Apriorit Inc, Eugene Wineblat
In this article, the use of open source OpenSSL library for file and disk encryption is described
26 Nov 2003
Adore C++
How to hide a text file in a bmp file
20 Dec 2008
Michael Pauli
Easy to use crypto class that uses TEA, XTEA and XXTEA standards
20 Dec 2007
PTJA
An article on how to use a code-signing key to sign other data
29 Jun 2012
ErnestoNet
DLL for native encryption and compression (using Crypto++). Includes RSA Key Generator in C#, and encryption and compression in ASP.NET (C#).
25 Mar 2008
Jonathan C Dickinson
Generate an encryption key between two parties and foil the eavesdropper
5 Jul 2005
Douglas R. Keesler
A file encryption/decryption class with built in MD5 string and file hashing.
14 Nov 2008
Griffter UK
An example of how an encryption key can be shared by two users using the Diffie-Hellman key exchange approach.
8 Aug 2005
.rich.w
An MFC implementation of hashing files and strings with CRC32, GOST-Hash, MD2, MD4, MD5, SHA-1 and SHA-2 (256/384/512).
17 Feb 2013
Biswas, Sumit
CryptBox helps to encrypt and decrypt files using Password Based Encryption (PBE)
8 Jun 2001
George Anescu
An article presenting a new block ciphering method called XOR256
1 May 2009
logicchild
How to use the CAPICOM component in C++ to encrypt and decrypt files.
18 May 2009
Jasmin Muharemovic
A C# class for creating a custom sized FNV hash.
8 Sep 2005
Jessn
How to encrypt using the Win32 Crypto API.
13 Jul 2007
Alexandre Ravey
A C++ class implementation of the pseudorandom number generator Blum Blum Shub (BBS)
20 Sep 2010
SpaceSoft
To simply encrypt\decrypt your data...
14 Jul 2002
Mingming Lu
RC6 is an evolutionary improvement of RC5, designed to meet the requirements of the Advanced Encryption Standard (AES).
27 Nov 2003
Neil Xu
Hide a file in a BMP file: extended from the author Ahmed Osama's article.
30 Mar 2004
Shinde Vikram V.
A program which generates the various Message Digests using only one Class, also including the different techniques for Base 64 Encoding And Decoding
24 May 2002
Darroll Walsh
Extremely simple crypto class
3 Mar 2004
citadel
A C++ component to generate cryptographically secure pseudo random numbers using the Fortuna Algorithm
28 Jan 2010
Ted Ehrich
A simple DES/Triple DES implementation in VB.NET that doesn't have instantiation overhead.
24 Dec 2008
nbugalia
Only the user can see the words on screen
20 Jun 2006
Eugene Podkopaev
The tool-at-hand of any system administrator to generate pronounceable and random passwords, secured against brute-force dictionary attacks.
24 Feb 2002
shanthu
Explains the encryption algorithm selection process.
28 Jul 2002
Shrishail Rana
A simple secure algorithm that can be used in your programs
31 May 2003
mdgray
How Zip CRCs work and how to create a specific file CRC
29 Aug 2002
Victor M. Valenzuela
Use Windows Crypto API to calculate a MD5 string.
25 Feb 2004
jithus
Simple classes to perform crypt and registry operations
20 Nov 2000
Shaun Wilde
Encode binary data to and from hexadecimal format using the Crypto++ library
25 Jun 2007
defconomicron
Uses pseudo-random bit rotations and xor on 32-bit integer blocks to encrypt/decrypt files.
20 Sep 2003
Tahir Naeem
This is an encryption tool which encrypts all files and can embed the encrypted data in an image. For encryption three ciphers are used ASG, SG, RC4.
13 Mar 2005
AdrienP
A single class implementation of SHA1 Digest in Unix/Win - simple and fast.
22 Sep 2007
gripmaster
This short article explains how to create a cryptographic checksum (a hash) with the help of the hashlib++ library.
10 Jul 2005
Jessn
The RC4 algorithm within a COM component made with C++ and ATL.
2 Jan 2007
joejoeiscool
What it says on the tin.
Sort by Score

.NET - Encryption 

3 Jun 2010
Alaa-eddine KADDOURI
iSafePDF is an Open Source software to sign, timestamp, and encrypt PDF documents.
2 Oct 2013
Dnyaneshwar Pawar
Implementation of AES in C# and SQL Server 2008.
3 Dec 2012
Mika Wendelius
Article describes how to encrypt a dataset using AES. Optionally the dataset is compressed before the encryption.
14 Jul 2014
Matthew Givens
Showing how to decrypt files in memory in order to maintain data security.
15 Jul 2010
Pete Everett
Send signed and encrypted e-mail in accordance with RFC 2633
23 Nov 2005
Heath Stewart
Use XML Digital Signatures for a request- and signing-based licensing mechanism for your applications.
6 Jun 2013
Fernando E. Braz
This is an alternative for "Secret Key Encryption Demo"
11 Oct 2011
Scott Clayton
Set up encrypted secure communication between C# and PHP using the AES and RSA algorithms.
29 Apr 2014
Don Fizachi
A C# implementation of the OTR protocol.
28 Jul 2014
Frank T. Clark
A C# .NET 3.5 (Win7) Windows Forms Application with source code
28 Jan 2007
wumpus1
A simple, string-oriented class for symmetric encryption, asymmetric encryption, and hashing.
27 Sep 2008
Günther M. FOIDL
Class for encrypting/decrypting files using a Vernam chipher.
19 Mar 2011
Paul Sanders (AlpineSoft)
This article provides a way to use RSA public key encryption in scripts running on a Web server hosted by a shared hosting company. It also demonstrates how to use RSA in .NET to solve the 'real world' problem of signing license codes so that they cannot be forged.
13 Aug 2009
Waleed Elkot
Sample application describing how to use the MD5 and SHA1 classes.
4 Feb 2012
Dudi Bedner
How to encrypt data using a private key in .NET.
24 Jun 2013
Vasudevan Deepak Kumar
This is an alternative for "XCrypt - Encryption and decryption class wrapper".
6 Jan 2013
David Rogers Dev
Encrypting and Decrypting Files with GnuPG
31 Oct 2008
ladenedge
An implementation of the RFC3394 AES key-wrapping algorithm.
25 Dec 2003
DotNetThis
Well documented code showing how to do crypto in C# and the .NET framework.
4 Nov 2005
Thad Van den Bosch
How to encrypt and decrypt files using Rijndael.
26 Jun 2010
Dr. Song Li
This article introduces a .NET encryption library and demonstrates how to use the library with a WPF application.
29 Jan 2007
Mathew John Schlabaugh
1024/2048 bit RSA cryptography in a "Notepad style" program.
5 Jul 2010
Ismail JH
Implementing a simplified version of the DES block cipher algorithm – which was the standard encryption algorithm before the AES, using C# to encrypt and decrypt binary files.
20 Sep 2005
ediazc
This article shows how the MD5 collisions can be used to tamper software distribution schemas.
28 Aug 2006
Alex Perepletov
An article on protecting a stream with a password by means of symmetic encryption.
4 Mar 2013
Shubham Choudhary
This software allows you to encrypt and decrypt text with a specified key.
21 Feb 2008
Lovely M
Sample program for simple encryption and decryption of strings
10 Mar 2012
mastamac
A Tiger hash Implementation for C#, based on .NET's HashAlgorithm class.
9 May 2014
adriancs
A C# universal AES Encryption Library.
27 May 2006
Andrey Dryazgov
An effective implementation of the CAST-128 algorithm (ECB and CBC modes).
20 Jan 2006
kasik
A simple utility for encrypting files using 256 bit Rijndael (AES). Also, adds menu items to Windows Explorer's file context menu for easy access.
29 Dec 2005
HanreG
This is a VB.NET wrapper for the .NET framework cryptography classes (HashAlgorithm, SymmetricAlgorithm) for working with strings and files.
20 Jun 2012
Bruno Tabbia
Encription algorithm that uses mandelbrot fractal to expand the encryption key
18 Aug 2003
pdwolf
1 alternative  
A generic encryption & decryption class wrapper for C#.
26 Jun 2009
logicchild
An article that describes the beginning steps to encryption using the .NET Framework.
9 Jun 2004
Frederico Daupias de Alcochete
A .NET class Library to handle the encoding/decoding of QuotedPrintable, UUEncode, Base64 and Yenc algorithms.
2 Jul 2009
qxcjust
Encrypt any file easily
20 Sep 2005
ediazc
The cracking of MD5 is making it useless?
5 Mar 2003
Sameers.ME
Use the .NET Framework's Cryptography Classes to secure your data.
1 Aug 2005
ediazc
Shows a simple class for digital signature generation and verificacion.
14 Jul 2005
ediazc
Describes an implementation of a MD5 function compatible with the PHP function.
5 Apr 2008
Atanu Maity
Protect any file by encryption and decryption with password. It encrypts the file and saves as secure XML with binary format, and stores file password as custom PK encrypter routine.
19 Nov 2003
Steven Campbell
Describes some underlying concepts and techniques that are helpful when needing to copy data securely and efficiently.
11 Dec 2007
Kurt Mang
How To: Automate decryption of PGP / GnuPG encrypted files.
1 Nov 2005
Wil Peck
An article on creating a simple, but robust cryptographically strong password generator.
10 Aug 2006
mohamed.elbatah
Data Compression and Data Encryption
14 Mar 2002
Frank Fang
A .NET SymmetricAlgorithm security class wrapper for in memory encryption/decryption with a private key
22 Jul 2008
Tom Stone
Enhanced encryption algorthim for data storage (console app)
25 Jul 2008
CS Rocks
This application demonstrates how to perform secret encryption using VB.NET and the .NET Framework 3.0.
27 Nov 2004
Adnan Samuel
Implemnts secret key encryption.
23 Feb 2008
Imran A Momin
Triple Data Encryption Standard algorithms from which all TripleDES implementations must derive.
2 Nov 2006
Deobrat Singh
This article implements Caesar Cipher (shift by 3) in VB.NET.
25 Jul 2005
ediazc
Show how to generate and store your keys for cryptography in safe mode
12 Jun 2005
Adnan Samuel
Encrypt and sign data using PKCS #12 certificates.
23 Aug 2007
cute-solutions
Encrypt and decrypt simple strings using the Rijndael algorithm.
18 Jul 2007
meibella
XTEA was designed by David Wheeler and Roger Needham of the Cambridge Computer Laboratory. This implementation is written in VB.NET, but the core algorithm is in C# (referred from http://www.codeproject.com/KB/windows/teaencryption.aspx).
30 Aug 2010
Jan Mojzis
Experimental crypt
20 Dec 2004
AtulMalhotra
Cryptography classes available in .NET.
7 Mar 2006
Frazell
A MD5 class library for .NET supporting advanced features like random Salt values embedded in the MD5 hash.
Sort by Score

.NET - Security 

2 Aug 2006
Corinna John
From tutorial snippets to open source project
5 Oct 2011
orouit
How to use smartcard certificates in your .NET application
25 Oct 2011
orouit
This article demonstrates how to write a licensing provider for .NET licensing that gets licenses from a Gemalto .NET Card V2.
12 Sep 2013
David Rogers Dev
Authentication and Authorisation with MembershipReboot and Thinktecture.IdentityModel.45
16 Apr 2006
Corinna John
How to zip and unzip files, avoiding the central directory.
7 Sep 2009
Foolomon
Describes the implementation of a key registration, installation, and validation methodology for Windows applications.
21 Sep 2009
Foolomon
Describes the implementation of a key registration, installation, and validation methodology for Windows applications
23 Jan 2014
adriancs, Taylor Hornby
Securing Password by Hashing with Salt
9 Nov 2008
Josh_Jackson
A look into what goes into the area of preventing reverse engineering, and gives developers some functions and ideas about preventing reversing engineering of their programs.
29 Nov 2004
Corinna John
Merging the pieces into one application.
5 Sep 2013
Graeme Douglas
Program for providing an encrypted TCP tunnel.
4 Jun 2005
Corinna John
How to hide data of any kind inside a sound, and keep it alive on an analog medium.
18 Sep 2003
Emmanuel Kartmann
This article provides a C# wrapper class (GnuPGWrapper) that will enable use of GnuPG (the OpenPGP Internet encryption standard) within a .NET application.
13 Mar 2008
Corinna John
Some ideas on how to hide binary data in text documents
5 Aug 2004
Corinna John
An article about hiding bytes in the Program Change events of a MIDI file
7 Jun 2003
gek_at
SharpPrivacy is an OpenPGP implementation in C#. It can be used to encrypt and sign data, created OpenPGP compatible keys, and a lot more. This article explains how to use the library in your own .NET application or webpage to encrypt, sign, decrypt or verify OpenPGP messages.
20 Jan 2013
M. Hudak
This secure textbox deceptive keyloggers
31 Mar 2013
anoopk01
This is a custom developed tool for generating a digital certificate.
19 May 2004
Corinna John
An article about hiding bytes in the bitmap frames of uncompressed AVI files.
14 Jan 2004
UB
A full length article on .NET Code Access Security
25 Nov 2004
Jan Seda (Skilldrive.com)
.NET Strong Name technology explained
6 Aug 2003
Dana Epp
An article demonstrating a better Password Dialog box in C#
22 Feb 2012
Sergey Chepurin
How to sign code with digital signatures and associating them with files
10 Sep 2009
Foolomon
Describes the implementation of a key registration, installation, and validation methodology for Windows applications.
26 Oct 2013
Igor Ladnik
Article presents a technique allowing developers to protect their .NET code from reverse engineering by reflection of executable files
8 Oct 2011
orouit
How to use a Gemalto .NET V2 smartcard to create security applications in .NET
3 Apr 2004
Corinna John
An article about spreading hidden data over many images.
22 Jan 2005
Corinna John
A simple way to hide binary data in any kind of list
29 Sep 2006
Stefan Prodan
Password Manager is a System.Security usage example using SecureString and SymmetricAlgorithms.
12 Jul 2006
Corinna John
Define regions inside an image to keep smooth colours free from hidden data.
31 Jul 2003
Scott Burgett
An article that shows the basic steps to programmatically adding an IP address to the IIS deny access list.
9 Oct 2003
* Sandeep Alur
This article introduces the concept behind Principal and Indentity objects in .NET and proposes a security model adopting these objects in a .NET application.
25 Jun 2004
Corinna John
Hiding data of any kind in indexed Bitmaps like PNG and GIF.
18 Sep 2008
Josh_Jackson
A brief introduction into Windows anti-debugging techniques.
15 Nov 2007
Tony Selke
A generic helper class that exposes simplified Encrypt and Decrypt functionality for strings, byte arrays and streams for any SymmetricAlgorithm derivative (DES, RC2, Rijndael, TripleDES, etc.)
28 Jul 2006
Marc Sweetgall
Implementing the G711 µ-law and a-law codecs in C#.
16 Sep 2009
Foolomon
Describes the implementation of a key registration, installation, and validation methodology for Windows applications
2 Apr 2014
Alaric Dailey
Simple code and explanations to enable secure password authentication.
12 Jul 2004
Corinna John
Hiding all kinds of data in the pixels of bitmaps.
17 Aug 2007
mmsinclair
Encrypt in .NET and decrypt in Crypto++, a cryptography newbie's journey.
22 Oct 2004
Nathan Blomquist
This article describes how to use C# and the .NET Framework to encrypt/decrypt files, and use hash algorithms to verify that the decrypted file is valid.
19 Aug 2005
Domenic
Shows how to implement an RSA encryption algorithm on a server and client environement, even through a web browser!
29 Apr 2011
adi_clepcea
This article shows the inner workings of the German Enigma machine used during the WWII, translated to C#.
17 Sep 2007
Michael Demeersseman
An article about creating a public/private key encrypted internet messenger
13 Nov 2003
raymond.fung, Norman Fung
CCryptoTokenizer
29 Aug 2006
Hameer Saleem
How to use the ProtectedConfiguration API to protect sensitive information in your application’s configuration file.
19 Oct 2005
Silviu Gologan
Learn how to encrypt IM (Instant Messenger) conversations.
10 Nov 2011
Yonghwi Kwon
This article explains how the SetParent function can be used to deceive users and incurs a catastrophe. Also, it suggests protection techniques against attacks presented here.
3 Apr 2004
Corinna John
An article about hiding each byte of a message bit-by-bit in eight pixels.
26 Feb 2005
Fatih KIHTIR
Modifying CAPICOM Runtime Callable Wrapper (RCW) generated by TlbImp.exe to enable CAPICOM to process digital signatures with UTF8/ASCII content (mostly signed by Java).
27 Feb 2007
Orka
This article describes how to get information about digital certificates stored on your local machine. It also shows how to search certificates by name, and retrieve a certificate hash.
1 Aug 2009
Corinna John
Encode a message as waypoints in a GPX file.
22 Nov 2003
Corinna John
An article about hiding instructions at the end of methods in an .NET Assembly
29 Nov 2003
Sriram Chitturi
The article discusses a strategy to securely configure and administer a set of connection strings which can be maintained environment wise. It also talks about distributing this information securely in a huge environment to be used by authorized clients only.
26 Oct 2004
Shaheryar Ch.
This tutorial is an effort to overcome problems faced by the developers who want to sign data using Java Key Store and want to verify it on .NET platform. The tutorial demonstrates how to export the Public Key using Java to .NET compatible Public Key (XML format).
12 Apr 2004
Steven Campbell
A fully tested component capable of encoding and decoding yEnc data.
9 Oct 2002
Manuel Permuy
Cryptography in .NET using the Windows PKI
24 Jan 2008
Luigi Grilli, Michela Carriero - Lyra
Vista: what to do when storing common data is needed?
17 Jul 2008
Nowak Alexander
The ASP.NET provider framework for Membership, Role, and Profile functionality in .NET 3.5 is made available for non-ASP.NET consumers in the form of Client Application Services. This means that, for example, in a WinForms application, you can implement Forms Authentication as easy as in an ASP.NET
3 Sep 2013
michaelas
The article discusses .NET code protection methods.
29 Nov 2004
Corinna John
Unsafe pixel modification and bitmaps from the clipboard.
1 Jun 2010
Dylan Morley
Describes how to use a custom principal implementation with the AspNetDb security database in a WinForms application.
4 Aug 2009
Sần Hải Quang
A free PHP encoder application.
9 Apr 2012
Corinna John
How to hide data of any kind inside a sound.
13 Jul 2011
openpage
Security attacks risk are minimised by careful planning of application design. If the application is distributed in nature, the challenges becomes manyfold. This article will try to give one way of doing so.
12 Aug 2004
Chidi Ezeukwu
An article on symmetric cryptography and hashing.
5 Jan 2009
Sunny Ahuwanya
How to prevent your configuration sections from unauthorized modification (includes a nifty configuration file editor)
14 Dec 2006
Filip Waeytens
A class that returns all possible combinations of a given subset, without using recursion.
6 Aug 2012
dawmail333
An example of how to implement and validate non-personal CD-Keys (ideal for distribution on the back of CD cases)
14 Apr 2004
Alex Getman
An article on cryptography in C#
28 May 2005
Dragon Slayer
Crack the Modified Caesar Cipher using only relative frequency English letters.
12 Aug 2008
Yasser M. Jaffal
This article guides you to simply, yet effectively, prevent your software customers from copying your product without your authorization. I admit it is not a top-security solution, and it will be easy to crack without protecting your compiled code, but it is just for conveying the idea.
15 Nov 2006
rmortega77
Sample code for setting ACE on file and directory DACLs just as the OS does.
11 Jul 2004
Marcello Cantelmo
Hide (crypt) string with a polymorphic dynamic code ("game" with the class Stack!).
22 Mar 2004
Brad Vincent
Simple class wrappers that encapsulate all the built in .NET functionality of both the symmetric encryption classes and the hashing classes.
6 Aug 2008
Rehan Ahmad Abbasi
Posting data to HTTPS (a secure connection) URL from a Windows application (.NET) by attaching a digital certificate and getting the response back.
4 Jul 2004
Marcin Cuprjak
There is a lot of .NET cryptography articles but not many sample applications using it. This article (part 2) introduces an application to encrypt files on your hard disk to keep them secret and unreadable to others.
9 Apr 2004
Corinna John
Another article about hiding bytes at the end of methods in a .NET Assembly.
28 Apr 2006
Alex Getman
An article on the .NET framework security model.
21 Apr 2004
Khalid A1
Developing a secure solution using Commerce Server 2002 and .NET.
11 Sep 2008
nimeshmca
Custom digital signatures using iTextSharp
5 Sep 2007
Babak Ansari
Execute applications with a Windows Service and ensure its existance.
4 May 2011
Günter Bergmann
An example of blocking access to USB Memory and CD
8 May 2007
--==## Andy74 ##==--
How to use a certification to connect to an SSL channel and use a web service
11 Mar 2005
jqd2001
.NET Authorization using Windows Identity, X509 Certificate or ASP.NET Forms
25 Apr 2007
Daniel Kuettel
This article shows a simply method of encrypting connection strings for windows applications
30 Jun 2004
Marcin Cuprjak
There is a lot of .NET cryptography articles but not many sample applications using it. This article (part 1) introduces an application that enables to send secure messages via email.
14 Jun 2007
Dwight Johnson
Use the .Net Framework to find the lastLogon for every user across all domain controllers
25 Jul 2004
Mark van den Broek
A Wepkey generator for protecting your wireless LAN.
18 Feb 2004
benjaminwootton
Looking at Code Access Security From the Perspective of the Developer and Administrator
4 Apr 2005
Thoughthopper
An article on password protection for applications that need them.
21 Feb 2008
Fady Anwar
An article demonstrating why you should not rely on obfuscation to protect your .NET applications.
3 Jul 2005
Nishith Pathak
Encryption of configuration file in Whidbey.
19 Mar 2004
WillemM
This article explains how to use CryptoStream for simple on the fly cryptography.
21 Oct 2005
AtulMalhotra
Making .NET assemblies secure for an enterprise.
25 Aug 2006
Levan Midodashvili
Some possible ways to encrypt and store connection strings in an ADO.NET application.
25 Oct 2004
larryjf
Describes symmetric and asymmetric encryption, then shows how to combine them.
5 Oct 2003
Vasudevan Deepak Kumar
Here we would briefly see how to keep accounts (signups) in online websites in a more secure way.
10 Oct 2003
Vasudevan Deepak Kumar
In this article, we will discuss a very brief technique and an overall idea of how to keep passwords sufficiently strong, so that a brute force generation and hack attempt could be blocked easily.
7 Jul 2005
razi bin rais
Exploring security features in .NET.
15 Apr 2013
Vasudevan Deepak Kumar
This is an alternative for "Simple Password Manager Using System.Security"
5 Apr 2008
gyllbert
Authentication to a phpbb based forum using C#.
9 Jul 2010
Ahmed Kahwaji
Use HTTPs in BizTalk 2009 on Windows 2008 R2
7 Jul 2013
Alexander Stavonin
Little explanation of TrustedBSD framework usage on Mac OS X
Sort by Score

General 

22 Sep 2011
smoore4
Loop through all files in a folder/subfolders and run a checksum that is stored in a database. E-mail descrepancies and results.
15 Jul 2012
Arpan Jati
RSA encryption library with full OAEP padding and private key encryption support.
20 Sep 2012
Marius Bancila
This article proposes a C++ implementation for computing hashes (SHA1, MD5, MD4 and MD2) on Windows with the Microsoft CryptoAPI library.
5 Aug 2014
Igor Ladnik
Technique to obtain in memory code of running .NET application (even wrapped into unmanaged code for binary files anti-reflection) is presented and implemented with workable sample
5 May 2010
fhrdina
An article on Windows XP logon process modification
30 May 2011
Simon Bridge
Implementing License Protection using RSA
10 Apr 2014
Fabio Ottavi
An implementatio of an ISO 7816 Virtual SmartCard
5 Oct 2010
John Simmons / outlaw programmer
One way to create a completely random encryption key, and sharing it with a client application
26 May 2013
orouit
This article shows how an OTP generator works.
1 Sep 2013
Espen Harlinn
Cyber warfare: It’s a brave new world
28 Feb 2013
Paul Stovell
Secure alternative to WCF. JSON-RPC meets SSL meets .NET and Mono.
5 Aug 2010
Apriorit Inc, Sergii Bratus
This article is devoted to the development of the key licensing system for the applications.
9 Mar 2014
R.selvam
This article explains about Strsafe, Secured C run time library (CRT) and safe STL functions.
28 Jan 2013
Bruno Tabbia
Encrypt your C# classes and compile them during run-time (hiding their code in the exe file).
4 May 2011
R.selvam
This article explains the usage of function pointer and callback in Windows application programming Interface (API).
20 Sep 2012
Palavos
x8086 assembly program that encrypts/decrypts text input from the keyboard by using basic assembly language ideas
13 Feb 2012
Mustafa Chelik
Calculates NTLM hash of given string in pure C/C++
22 Apr 2010
logicchild
An article that demonstrates how to encrypt your directory files
28 Jul 2014
Mihai MOGA
Learn the basics of Microsoft CryptoAPI Library
18 Aug 2008
trecool999
Advanced/Not-So Advanced string and password hash.
20 Aug 2011
sk saini
This article has been written for small individual developers who really face demo crack problem before launching their application.
26 Nov 2012
Palavos
A tutorial of PL/I basic concepts based on an encryption example
Sort by Score

Steganography 

20 Sep 2012
Palavos
A paradigm of Noiseless Steganography for secretely transmitting messages via Excel graphs.
22 Apr 2013
Grant Curell
Performing steganography on PNG images
7 Apr 2012
Phoenix Roberts
An introduction to Steganography using bitmap files.


Advertise | Privacy | Mobile
Web04 | 2.8.140827.1 | Last Updated 2 Sep 2014
Copyright © CodeProject, 1999-2014
All Rights Reserved. Terms of Service
Layout: fixed | fluid