Protecting Your Data and Applications
This chapter is about protecting your data from being viewed by malicious users using encryption, and from being manipulated or corrupted using hashing and signing.
In .NET Core 2.1, Microsoft introduced new Span<T>
-based cryptography APIs for hashing, random number generation, asymmetric signature generation and processing, and RSA encryption.
Cryptographic operations are performed by operating system implementations so that when an OS has a security vulnerability fixed, then .NET apps benefit immediately. But this means that those .NET apps can only use features that an OS supports.
More Information: You can read about which features are supported by which OS at the following link: https://docs.microsoft.com/en-us/dotnet/standard/security/cross-platform-cryptography
This chapter covers the following topics:
- Understanding the vocabulary of protection
- Encrypting and decrypting data
- Hashing...