Enterprise Library Step by Step Series (13) encryption Application Block

Source: Internet
Author: User
Tags hash

A Overview: Enterprise Library Cryptography Application Block simplifies the way developers integrate encryption functionality into their applications. Applications can use application blocks to perform various tasks, such as encrypting information, creating hashes from data, and comparing hash values to verify that data has been changed. The cryptographic Application Block has the following features: It reduces the need to write boilerplate code to perform standard tasks, providing implementations that can be used to troubleshoot common application encryption problems. It helps maintain consistent encryption practices across applications and throughout the enterprise. Take advantage of the consistent architectural model that covers the various functional areas provided, allowing developers to take fewer detours in the learning process. It provides an implementation that can be used to troubleshoot common application encryption issues. It is extensible and supports other implementations of cryptographic providers. Developers often write applications that require encryption and hashing capabilities to meet the security requirements of their organization. It is often necessary to encrypt the data created and maintained by the application as well as the configuration information. In addition, you need to hash the password used to access the application's functionality or data. Cryptographic application Blocks simplify the work of developers by abstracting application code from specific cryptographic providers. You can change the underlying provider by changing the configuration without changing the underlying application code. It also encapsulates the best practices for encrypting common challenges such as encrypting and retaining cryptographic keys.

Two Use the Step Wizard 1. To create a configuration for the cryptography Application Block using the Configuration tool

We see that after creating a cryptography Application block, the default is two Provider:hash Provider and Sysmmetric Provider. 2. If you want to create a hash value, right-click the hash Provider and select an encryption algorithm to

For creating a hash value, there is one need to configure, that is, you can choose the time to add salt

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.