Protecting Your Data and Applications
This chapter is about protecting your data from being viewed or manipulated by malicious users. You will learn how to protect your data using encryption, hashing, and signing. You will also learn how to properly generate random numbers for use with cryptographic operations, and how to implement basic authentication and authorization for users.
This chapter covers the following topics:
- Understanding the vocabulary of protection
- Encrypting and decrypting data
- Hashing data
- Signing data
- Generating random numbers
- Authenticating and authorizing users
Warning! The code in this chapter covers security primitives for basic educational purposes only. You must not use any of the code in this chapter for production libraries and apps. It is good practice to use libraries implemented by security professionals that are built using these security primitives and that have been hardened for real-world...